What's your point about mac addresses? Are you saying you've observed that data going to and from the server? Are you saying you're unaware of their spoofability? Are you pretending that there wouldn't be black actors who are also aware of how packets are formed? You're either a party to the investigation which means you're shit at opsec, or you're picking the fact that every IP address has a mac address in it SUPPOSEDLY from and to somewhere. Like everything in tech, you just need to know about it to spoof it. But are you saying that maybe black hats did observe and spoof successfully?
Bingo.
Usually what happens is you have to have claims to make, sources to back it up, and if you'd stop being defango for a bit, maybe you'll drop the endless aggrowhining. 100% contracted shadowboxer.
Correct, but it's just as spoofable, as the rest of packet data. Not only that, it doesn't stay the same between each hop in the network. You don't see multiple mac addresses in a pathway a packet takes, correct? So once you spoof it before it reaches your gateway you're good, AND if you have ANY MITM fuckery, then good luck making the conjecture that mac addresses were the same before and after over how many years now? Is that what you're saying? That you know the mac address is the same between users even know to know that you would be misinformed about how it works before and after a gateway node and secondarily, I bet Jim appreciates your talking about it before he laid out what he's found. Very strange though, to act like mac addresses can't change and can't differentiate based on tor node used. Are you saying FBI is logging the tor user and that now the new fake Q is fucked?
Quite absurd isn't it? Almost like this poster found a word to use to feign superiority and hasn't realized how that looks.
DEVICE ID DOES NOT PERSIST FROM START NODE UNTIL END NODE YOU RETARD. YOU'RE ARGUING BULLSHIT AND SUGGESTING TELECOM LEVEL TAGGING AND LOGGING. JIM IS NOT A TELECOM.