Jump to content

Korwyn

Premium Member
  • Posts

    4
  • Joined

  • Last visited

Nexus Mods Profile

About Korwyn

Profile Fields

  • Country
    United States
  • Currently Playing
    Skyrim, Civ IV, Civ V, Galactic Civilizations (Twilight)
  • Favourite Game
    Galactic Civilization (Twilight)

Korwyn's Achievements

Newbie

Newbie (1/14)

  • First Post
  • Week One Done
  • One Month Later
  • One Year In
  • Conversation Starter

Recent Badges

0

Reputation

  1. ROLF...your sig just cracked me up! To answer your question, yes (IMO) it does afford some greater degree of protection. But if you are under that degree of scrutiny (or are concerned about it) then you probably already have a custom variant of TDSS rootkit on your laptop installed by some three-letter agency. :) Seriously though, if you are in a situation where you as an individual need to be tracked (in the opinion of a governmental authority) your mobile phone is the main key in most situations. They will simply request a location track history (which has nothing to do with the GPS on your phone) from your cell service provider and then hit all your frequent coffee shops/bars internet service providers with information disclosure orders and a gag letter. *Edited: On that note I thought this might be an appropriate image to link! http://wattsupwiththat.files.wordpress.com/2012/03/fat-cat-tinfoil.jpg?w=160
  2. Exposing IP is dangerous more because the risk of troll stalking of script-kid hacker willing to "make a name"... now that part about FBI and such made me laugh as if they depend on those statistics to "get their man"... or something like this I don't know how to express in your particular jargon or language. You can laugh if you want, but they acutally do use IP information. Official requirements for data retention (dhcp lease/mac/user account) are not there, but unofficially in the industry you will get a heads-up from a law-enforcement agency that they want you to begin retaining records on a particular item (user account, ip, etc.). It is expected that you begin retaining for up to 90 days prior to them actually obtaining a warrant. However, that doesn't apply to DOMSEC (Department of Homeland Security). Under the real-word implementation of the Patriot Act (and all of its unintended consequences) all they have to do is state that they are investigating something that may be related to a terrorist investigation, and they get whatever data they want. They can enter a public library and request the checkout and/or search records for a patron, and the library is prohibited from even telling you they had to hand them over. Same for banking, medical, ISP, etc. DomSec doesn't need a warrant. That reflects a common misapprehension from end users. It is very easy (click of a couple buttons, couple additions to a user account config) to assign a 'DHCP' pool of addresses to a specific user account that will ONLY be handed out to that user account. So a user under investigation does a release/renew or reboots their modem/router and voila, they have a new IP. What they don't realize is that they now have a private pool of say 50 addresses assigned to them. They will be the ONLY account that will get assigned those addresses. So IP address rotation isn't quite as secure as it seems. A number of TOR exit nodes are run by various government agencies. If using TOR you should never allow exit nodes in your ip's country of origin. Actually not entirely true, you should selectively allow exit nodes in your COO depending in your activity. And what does having a password have to do with you being on a router? You seem to have at least a basic understanding of some safe internet practices, but I don't think you really understand the architecture of the internet or how ISPs actually work. And anti-virus/personal security (kapersky, etc) doesn't offer any protection against the initial concern the OP brought up. Depends on why you are mining the data. Yes deriving a specific user back from only the nexus stats would be virtually impossible. However depending on the aggregate amount of data being mined it could certainly add to the confidence level if attempting to determine a specific target IP traffic patterns, habits, behaviors, etc. It all depends on what you want the data for. I agree that the OPs concern about being identified as themselves specifically from the web traffic stats is misplaced, but data is data. And all data tells us something if you know what questions to ask.
  3. Actually that isn't entirely accurate. The requirements to obtain exact user account info from the client IP depend on your particular jurisdiction and regulatory framework. Here in the US under the Patriot ACT, it actually requires very little for the FBI or DHS to track back to a particular user. The 'judicial oversight' laws have been completely gutted in the last 12 years. All of that aside, unless you are using a TOR or similar anonymiser system you shouldn't expect any privacy on the net anyway.
  4. I took this idea from Appbrain. It would be a cool feature to link your NMM install with the nexus mods so that you can mark mods to be automatically downloaded to NMM at next run. So if you're browsing from your ipad, phone, or a PC somewhere and you see a mod (or 10) you really like and don't want to forget to d/l it 6 hours later after school you can mark it and when you get home and run NMM it will grab the queued list and download them for you. I did a quick skim through the thread and didn't see anything like this suggested.
×
×
  • Create New...