Three threats to your privacy

Hi forum members,

A malicious node can identify through MAC address or IPv6 address(es), identify, locate, trace.
First they must be on the same link or within the DS, then they can get to build a profile, and go for a further attack, build higher-layer identifiers like email addresses, location information, mobility pattern, positioning on the link and sniffing, or just using a normal good searchengine, or roque access probes between MN and AP. Mac addresses appear in packets ad hoc, RO node requires icluding the MN’s home adress. Safe is transferring through ESP tunnel, AAA proxies also give info, and DNS-LI info gets stored. So securing your computers is essential,

polonus