Anonymous ID: d0e6ed Jan. 3, 2025, 2:40 p.m. No.22287304   🗄️.is 🔗kun   >>7357 >>7370

>>22287020

Every NIC, ever made, copies your MAC address onto "padding" on every single layer two datagram ever sent.

 

There is NO EXCEPTION to this rule.

 

Around 2002, NMAP enabled users to spoof that MAC address, and this prompted FCC to demand a second UID to be encoded into every NIC made after that.

 

The UID is part of the firmware, and it cannot be removed or altered.

 

Every packet sent, either has your MAC address, or after 2002, your UID on to it.

 

As well as this, there is a two bit field, that are the GCSB and NSA checkbits, and every packet ever sent, gets copied, and relayed to these two agencies.

 

Remember when "Corona" got shut down?

 

Bude sent a distress signal?

 

This is because they lost access to the data stream, and now it only goes to the whitehats.

 

But make no mistake, every packet you have ever sent, ends up on some agency hard drive.

Anonymous ID: d0e6ed Jan. 3, 2025, 2:51 p.m. No.22287357   🗄️.is 🔗kun   >>7370 >>7459

>>22287304

Now the way the internet actually works, is that when you first turn on your PC, even before the POST test is complete, and the OS starts to boot, you NIC will connect to the upstram server.

 

Don't believe me?

 

Turn of your PC, turn it around and turn it back on.

 

See the NIC lights going off?

 

Three blips, as it makes the TCP/IP handshake, and then a data dump.

 

What is happening, is that the NIC has made contact with your ISP, and it "reserves" a port for you, and creates a tunnel, and all communications go down this tunnel.

 

Its how connectionless protocols work, they don't require address info, because its just goes down the tunnel.

 

Even if you encrypt your data, and browser, they can still do ARP table lookups, and they can trace you from source to desktop in real time.

Anonymous ID: d0e6ed Jan. 3, 2025, 2:56 p.m. No.22287389   🗄️.is 🔗kun

>>22287370

Makes no difference at all, encryption, VPN its all bullshit, because the TCP/IP protocol was built from the ground up, to allow access to the Agencies.

 

LEO requires a search warrent, but the agencies just collect it all.

 

You know…

 

"we have it all"

Anonymous ID: d0e6ed Jan. 3, 2025, 3:10 p.m. No.22287459   🗄️.is 🔗kun

>>22287357

However, just because they can trace your connections, using ARP lookups, if you are using HTTPS they cant see what you are sending, only that you are sending and receiving.

 

But remember, HTTPS always sends address info in cleartext, even if you encrypt everything else.

 

The way to avoid this, is to use an encrypted browser, that will make a connection to their servers, and then they proxy the last step, and this hides the clear text HTTPS handshake.

 

This is the reason for the Data centers, they are going to store everything, in the hope that one day they can get AI or Quantum to decode all this information.