What uniquely identifies my device to my ISP?

Something like the Hong Kong protests for example. If a protestor wanted to use his personal computer on a network that is monitored, how can he change its properties enough so that it is not traced back to him. For example, I would assume the MAC can be used to try to identify the user of the device. If the same MAC address was used on the person's home network, and the network that was being monitored, he can easily be identified. So using a throw-away external wireless adapter to change the MAC might be a good idea. The main concern is not about hiding the activity done on the network, but rather hiding the fact that the same device was previously used on another network, to avoid the person using it from being identified. Basically, how can the device be made to look like a completely new or random device with no way to trace it back whatsoever.
http://dlvr.it/Rz2Dx1

No comments:

Post a Comment