Anonymous ID: 9c1f1d June 28, 2022, 7:53 a.m. No.16545372   🗄️.is 🔗kun   >>5451

>>16545243

>>16545297

What's your point about mac addresses? Are you saying you've observed that data going to and from the server? Are you saying you're unaware of their spoofability? Are you pretending that there wouldn't be black actors who are also aware of how packets are formed? You're either a party to the investigation which means you're shit at opsec, or you're picking the fact that every IP address has a mac address in it SUPPOSEDLY from and to somewhere. Like everything in tech, you just need to know about it to spoof it. But are you saying that maybe black hats did observe and spoof successfully?

Anonymous ID: 9c1f1d June 28, 2022, 8:01 a.m. No.16545432   🗄️.is 🔗kun

>>16545389

Usually what happens is you have to have claims to make, sources to back it up, and if you'd stop being defango for a bit, maybe you'll drop the endless aggrowhining. 100% contracted shadowboxer.

Anonymous ID: 9c1f1d June 28, 2022, 8:16 a.m. No.16545530   🗄️.is 🔗kun   >>5551

>>16545451

Correct, but it's just as spoofable, as the rest of packet data. Not only that, it doesn't stay the same between each hop in the network. You don't see multiple mac addresses in a pathway a packet takes, correct? So once you spoof it before it reaches your gateway you're good, AND if you have ANY MITM fuckery, then good luck making the conjecture that mac addresses were the same before and after over how many years now? Is that what you're saying? That you know the mac address is the same between users even know to know that you would be misinformed about how it works before and after a gateway node and secondarily, I bet Jim appreciates your talking about it before he laid out what he's found. Very strange though, to act like mac addresses can't change and can't differentiate based on tor node used. Are you saying FBI is logging the tor user and that now the new fake Q is fucked?