Win / Conspiracies
Conspiracies
Communities Topics Log In Sign Up
Sign In
Hot
All Posts
Settings
All
Profile
Saved
Upvoted
Hidden
Messages

Your Communities

General
AskWin
Funny
Technology
Animals
Sports
Gaming
DIY
Health
Positive
Privacy
News
Changelogs

More Communities

frenworld
OhTwitter
MillionDollarExtreme
NoNewNormal
Ladies
Conspiracies
GreatAwakening
IP2Always
GameDev
ParallelSociety
Privacy Policy
Terms of Service
Content Policy
DEFAULT COMMUNITIES • All General AskWin Funny Technology Animals Sports Gaming DIY Health Positive Privacy
Conspiracies Conspiracy Theories & Facts
hot new rising top

Sign In or Create an Account

88
()
posted 4 years ago by StrngerDngerMaus 4 years ago by StrngerDngerMaus +93 / -5
29 comments share
29 comments share save hide report block hide replies
You're viewing a single comment thread. View all comments, or full comment thread.
Comments (29)
sorted by:
▲ 2 ▼
– DZP1 2 points 4 years ago +2 / -0

Any VM runs on physical hardware that will have Ethernet hardware, and ALL Ethernet hardware at its PHY layer each has a unique ID. That means the VM and any other OS on the machine all have to talk to the same IDed hardware regardless. So a VM does not buy you true anonymity. Plus, any tool that can find a way to query the machine's BIOS can get the unique MAC address and then you're identifiable. The MAC address cannot be changed, it is permanent. Also, packets contain that unique ID; with a VPN, the provider does know your MAC address, so a corrupt provider can give info on you if an agency demands it.

For more info read: https://stackoverflow.com/questions/23935095/how-are-mac-addresses-used-in-routing-packets#23935402

permalink parent save report block reply
▲ 1 ▼
– VesemirsPotions0317 1 point 4 years ago +1 / -0

MAC address can be changed though? You can do this in the network settings of the virtualization software. I use virtualbox so at least I am certain you can with it. Also, there are tools to spoof your MAC address.

permalink parent save report block reply
▲ 1 ▼
– DZP1 1 point 4 years ago +1 / -0

Yes. I guess a dedicated person could find the right tools to implement this. The average person though with no specialized tools would be vulnerable.

permalink parent save report block reply

GIFs

Conspiracies Wiki & Links

Conspiracies Book List

External Digital Book Libraries

Mod Logs

Honor Roll

Conspiracies.win: This is a forum for free thinking and for discussing issues which have captured your imagination. Please respect other views and opinions, and keep an open mind. Our goal is to create a fairer and more transparent world for a better future.

Community Rules: <click this link for a detailed explanation of the rules

Rule 1: Be respectful. Attack the argument, not the person.

Rule 2: Don't abuse the report function.

Rule 3: No excessive, unnecessary and/or bullying "meta" posts.

To prevent SPAM, posts from accounts younger than 4 days old, and/or with <50 points, wont appear in the feed until approved by a mod.

Disclaimer: Submissions/comments of exceptionally low quality, trolling, stalking, spam, and those submissions/comments determined to be intentionally misleading, calls to violence and/or abuse of other users here, may all be removed at moderator's discretion.

Moderators

  • Doggos
  • axolotl_peyotl
  • trinadin
  • PutinLovesCats
  • clemaneuverers
  • C
Message the Moderators

Terms of Service | Privacy Policy

2025.03.01 - qpl2q (status)

Copyright © 2024.

Terms of Service | Privacy Policy