How to get someones physical address from their IP, + a defense.
Notice the below html code ( if this page gets moved and display's
html, you'll just see a dot this image doesn't even look like an
Seems harmless enough right?
However, upon viewing, my webserver logs your IP address using this
And while I have no interest, others might use that data to get your
physical address or access to your hardware ( which is most probably
insecure ..(bet your not running WinDoze Magizia HyperTurbo
OS ))...and you would probably never notice..
However, there is an easy fix. It's called tunneling http over ssh
through a remote server.
That way, I would get the remote server's IP instead of yours. (also,
the people near you sniffing packets wouldn't as easily know exactly
what your doing)..
If this is new to you, or you cannot find a server that offers shell
accounts with ssh tunneling...
....and you want one (some people don't care how insecure they are)..
....goto my site, currently http://magizian.dyndns.org:20080
and request for a free ssh tunneling account
That's right, happens to be one of the many services I provide free of
Hunter Reon Barnes
K, so by now you may be wondering, can someone really get my physical
address from my IP? or just the government?
Well, your not gonna be able to do it with a google search..lol.
Anyone can if they know how, can do the math, and have the resources.
It can be done easily via triangulation, the more hardware you have
surrounding the area and the closer the surrounding hardware is will
determine how close you can get to a pindot. A ping and a traceroute
from each server and bam, location revealed.
The reason why the government is good at this is because they have
alot of servers distributed all over.
The best way to defeat such since it's impossible to access a website
without accessing it's webserver which can log your IP, is to make a
pipeline of SSH tunnels, each having a unique public key so the packet
changes each step, and to make a smoke screen by having each tunnel
(pipe) send the packet to a couple hundred random IP addresses.
Also, electrical spoofing and a small random delay for response if the
surrounding hardware is incredibly close to your primary node and your
net/subnet IP's already determined.
This text was written for educational purposes.
Hunter Reon Barnes