Democratic Underground Latest Greatest Lobby Journals Search Options Help Login
Google

Interesting...thought this was ALREADY possible...

Printer-friendly format Printer-friendly format
Printer-friendly format Email this thread to a friend
Printer-friendly format Bookmark this thread
This topic is archived.
Home » Discuss » Archives » General Discussion (Through 2005) Donate to DU
 
lonestarnot Donating Member (1000+ posts) Send PM | Profile | Ignore Sun Mar-06-05 11:24 PM
Original message
Interesting...thought this was ALREADY possible...
How to track a PC anywhere it connects to the Net --Anonymous Internet access is now a thing of the past. A doctoral student at the University of California has conclusively fingerprinted computer hardware remotely, allowing it to be tracked wherever it is on the Internet.

www.legitgov.org
Printer Friendly | Permalink |  | Top
phusion Donating Member (1000+ posts) Send PM | Profile | Ignore Sun Mar-06-05 11:28 PM
Response to Original message
1. How do they tie the hardware to you?
Edited on Sun Mar-06-05 11:28 PM by phusion
Seems to me that if you buy your computer w/ cash no one is going to know anything:)

But, it's very hard to surf anonymously...Especially if you visit personal sites, check email addresses that are linked to you, etc.

And you're right, I thought this was already done w/ CPU ID's?

Printer Friendly | Permalink |  | Top
 
lonestarnot Donating Member (1000+ posts) Send PM | Profile | Ignore Sun Mar-06-05 11:31 PM
Response to Reply #1
4. Beats me...n/t
Printer Friendly | Permalink |  | Top
 
pabloseb Donating Member (510 posts) Send PM | Profile | Ignore Sun Mar-06-05 11:37 PM
Response to Reply #1
6. They haven't been able to impose CPU ID's yet

This method works on all computers, whether they have a CPU ID or not. And it seems to work whatever IP number you're using (including proxies, etc).
Printer Friendly | Permalink |  | Top
 
K-W Donating Member (1000+ posts) Send PM | Profile | Ignore Sun Mar-06-05 11:48 PM
Response to Reply #1
11. its like a fingerprint
Edited on Sun Mar-06-05 11:48 PM by K-W
they dont neccessarily know its you, but once they do they can id you anywhere, just like your firngerprint cant id you until they can connect the print to the name
Printer Friendly | Permalink |  | Top
 
pabloseb Donating Member (510 posts) Send PM | Profile | Ignore Sun Mar-06-05 11:29 PM
Response to Original message
2. Specific link?

Wasn't able to find it in www.legitgov.org .
The assertion seems difficult to believe in full generality.
Printer Friendly | Permalink |  | Top
 
lonestarnot Donating Member (1000+ posts) Send PM | Profile | Ignore Sun Mar-06-05 11:30 PM
Response to Reply #2
3. It's there you just have to read. Today's news....
Printer Friendly | Permalink |  | Top
 
pabloseb Donating Member (510 posts) Send PM | Profile | Ignore Sun Mar-06-05 11:33 PM
Response to Reply #3
5. Scary

:scared:

Here's a direct link: http://www.zdnet.com.au/news/security/0,2000061744,39183346,00.htm

Looks awful.

:scared::scared:
Printer Friendly | Permalink |  | Top
 
lonestarnot Donating Member (1000+ posts) Send PM | Profile | Ignore Sun Mar-06-05 11:47 PM
Response to Reply #5
9. Thanks for the link.
:scared:
Printer Friendly | Permalink |  | Top
 
Lone_Star_Dem Donating Member (1000+ posts) Send PM | Profile | Ignore Sun Mar-06-05 11:37 PM
Response to Original message
7. Here's a link from LBN
Edited on Sun Mar-06-05 11:38 PM by Lone_Star_Dem
Printer Friendly | Permalink |  | Top
 
lonestarnot Donating Member (1000+ posts) Send PM | Profile | Ignore Sun Mar-06-05 11:48 PM
Response to Reply #7
12. Thanks for the link. n/t
Printer Friendly | Permalink |  | Top
 
Ignoramus Donating Member (610 posts) Send PM | Profile | Ignore Sun Mar-06-05 11:46 PM
Response to Original message
8. clock skew...
Hopefully there is software between the clock and what creates the information, so software could be written to introduce noise to disguies the clock skew.
Printer Friendly | Permalink |  | Top
 
skids Donating Member (1000+ posts) Send PM | Profile | Ignore Sun Mar-06-05 11:48 PM
Response to Original message
10. The pros will circumvent this.

Someone will tie spread spectrum network clocking into the Linux kernel in short order. Everyone running an off-the-shelf OS really cannot be seriously worried enough about security that this will make any difference whatsoever to them. If spyware comanies can 0wn you the NSA could years before.



Printer Friendly | Permalink |  | Top
 
pabloseb Donating Member (510 posts) Send PM | Profile | Ignore Sun Mar-06-05 11:53 PM
Response to Reply #10
13. Yes, but the problem is that it can be done

In this case, since it was part of a doctoral dissertation, we get to know the details - so it'll be possible to come up with an antidote.

But for all we know the government (or anyone else) can modify the code without letting anyone know. The article makes it clear that the computer being tracked has no way of finding out. In fact, this may be happening already.
Printer Friendly | Permalink |  | Top
 
pabloseb Donating Member (510 posts) Send PM | Profile | Ignore Sun Mar-06-05 11:54 PM
Response to Reply #13
14. 500 posts... whew!

:party:
Printer Friendly | Permalink |  | Top
 
lonestarnot Donating Member (1000+ posts) Send PM | Profile | Ignore Mon Mar-07-05 12:03 AM
Response to Reply #14
16. Welcome to DU!
:) :toast: :party: :hippie: :smoke: :wow:
Printer Friendly | Permalink |  | Top
 
pabloseb Donating Member (510 posts) Send PM | Profile | Ignore Mon Mar-07-05 12:05 AM
Response to Reply #16
18. Wow... thanks!

:toast: :hi:
Printer Friendly | Permalink |  | Top
 
skids Donating Member (1000+ posts) Send PM | Profile | Ignore Mon Mar-07-05 12:19 AM
Response to Reply #13
19. Oh I assure you it is happenning already.
Most people don't conceal their addresses in any way that would require these advanced techniques. We've been able to trace past firewalls/NATs with paratrace and to fingerprint operating systems for several years now. It is not very hard at all to figure out what IP sessions belong to what machines with these trivial methods -- this advanced stuff is simply not required to track your average internet user.

The only people that need to be concerned about these new techniques are people who have a high level of technical expertise and have been trying to conceal their sessions. Such people already know what to do about this, and if they were competant about it they wouldn't have been sourcing their traffic from the same IP stack to begin with. In fact, they would likely be using someone else's machine. Perhaps your desktop, even, to source IP packets.

If they haven't been competant about it, once they read this article they will simply discard their computers and get new ones.




Printer Friendly | Permalink |  | Top
 
walldude Donating Member (1000+ posts) Send PM | Profile | Ignore Sun Mar-06-05 11:59 PM
Response to Original message
15. For the average computer user
Edited on Mon Mar-07-05 12:03 AM by walldude
this doesn't make a bit of difference. Have you ever bought something online? Do you use your ISP provided e-mail account? You are so easily tracked online it's not even funny. How do you think the RIAA tracked all those downloaders they sued? Want to know how easy it is to track someone on the web? Check out this link. http://www.e-spy-software.com/ For 40 bucks you can track the keystrokes of any computer connected to the internet. The keystrokes. 40 bucks. There is no privacy on the web for the average computer user.

**edit** BTW that I-Spy software was sort of mentioned in the article, it's basically what the FBI was doing with Carnivore. Tracking what people were typing while on the net. 10 years ago it was high tech top secret stuff, now you can buy it on the net for 40 bucks. :eyes:
Printer Friendly | Permalink |  | Top
 
pabloseb Donating Member (510 posts) Send PM | Profile | Ignore Mon Mar-07-05 12:04 AM
Response to Reply #15
17. That's not quite true

Someone has to install the keylogging software on the remote computer. The program can send an e-mail with the installer attached, but the receiver has to be dumb enough to open the attachment. And the remote version costs $90 rather $40 (not that it makes a big difference).

I cannot understand how this can be legal except under some heavily regulated exceptional situations.
Printer Friendly | Permalink |  | Top
 
skids Donating Member (1000+ posts) Send PM | Profile | Ignore Mon Mar-07-05 12:35 AM
Response to Reply #17
22. Noone has to do anything.
Trust me, if your computer is of the variety that "I Spy" works on, someone knows how to install similar software without your knowlege or even participation. The only stupid thing you have to do to expose yourself to keystroke logging is to run an sufficiently insecure system, like 90+ percent of your fellow Internet users do today. Let's not even get into the insecurity of mobile gadgets, people pay even less attention to that, and for all they know their cell phone may allow the battery to be overloaded and spark a nice 4am bedroom fire remotely.

People don't care. They say they do, but they really don't.

A computer is only secure when it is powered off, unplugged, and preferably locked in a safe. What you could buy yourself by using a more secure operating systems is only to restrict the level of expertise required to compromise your system. These days, by my estimate, a fully patched and up-to-date Windows system is relatively safe from curious high-school kids 340 days out of the year, whereas it is probably never safe from organized crime and definitely not safe from governments.

Only people who seriously know what they are doing can harden their systems to the point of invulnerability, and to do so they must limit their own functionality, a sacrifice most users wouldn't be willing to make even if they knew how.



Printer Friendly | Permalink |  | Top
 
Warpy Donating Member (1000+ posts) Send PM | Profile | Ignore Mon Mar-07-05 12:20 AM
Response to Original message
20. No, the best you can do through ARIN and others
is to track the geographical location, and possibly the ISP name.

If this guy has cracked it to an address, there's going to be a boom in hosting companies. Buy stock.

I doubt if he'll be able to do much with dynamic addresses, though.
Printer Friendly | Permalink |  | Top
 
lonestarnot Donating Member (1000+ posts) Send PM | Profile | Ignore Mon Mar-07-05 12:23 AM
Response to Reply #20
21. Warpy... you so smart.... think I will buy stock. n/t
Printer Friendly | Permalink |  | Top
 
skids Donating Member (1000+ posts) Send PM | Profile | Ignore Mon Mar-07-05 12:41 AM
Response to Reply #20
23. He did more than the address.
He's linked it to the actual hardware. You could be using multiple dynamic addresses and even various tunnels and he'd still be able to tell all the packets were coming from you. The only way to avoid it would be to pass out of IP inside someone else's box, change sockets in a daemon, and come back up through the zombie's IP stack to start a new session where the timestamps bear the clock skew signature of the zombie.

Since most illicit users launch their attacks from compromised computers and do not tunnel IP through them, though, they are safe.

Printer Friendly | Permalink |  | Top
 
DU AdBot (1000+ posts) Click to send private message to this author Click to view 
this author's profile Click to add 
this author to your buddy list Click to add 
this author to your Ignore list Fri Apr 26th 2024, 06:56 PM
Response to Original message
Advertisements [?]
 Top

Home » Discuss » Archives » General Discussion (Through 2005) Donate to DU

Powered by DCForum+ Version 1.1 Copyright 1997-2002 DCScripts.com
Software has been extensively modified by the DU administrators


Important Notices: By participating on this discussion board, visitors agree to abide by the rules outlined on our Rules page. Messages posted on the Democratic Underground Discussion Forums are the opinions of the individuals who post them, and do not necessarily represent the opinions of Democratic Underground, LLC.

Home  |  Discussion Forums  |  Journals |  Store  |  Donate

About DU  |  Contact Us  |  Privacy Policy

Got a message for Democratic Underground? Click here to send us a message.

© 2001 - 2011 Democratic Underground, LLC