logoalt Hacker News

hkpacklast Saturday at 6:13 PM2 repliesview on HN

Is it really identical when the receiving party can now identify every workstation at your internal network and track them separately?

For example, any website can now not only log that the traffic originated from org A, but specifically from org A, workstation N.

I wonder, is privacy implication is not important enough for people to worry about this?


Replies

Dagger2last Saturday at 8:09 PM

At this point, the people who would be worried about this ought to know that temporary addresses are a thing, and that they prevent workstation N from having a single fixed IP for its outbound connections that it could be identified with.

themafialast Saturday at 8:26 PM

> any website can now not only log that the traffic originated from org A, but specifically from org A, workstation N.

GeoIP databases and Cookies exist. So I'm not sure how your threat profile has increased here.

> I wonder, is privacy implication is not important enough for people to worry about this?

The most you can do over what is already possible is attempt an inventory or unit count of my office; however, you'd have to get every computer in my office to go to the same website that you control. Then you'd have to control for upgrades and other machine movements. I don't think this enables anything in particular.