It doesn't have to be "transmitted over the Internet" for it to be a privacy concern.
A mobile phone broadcasts its MAC Address anytime it's in Wi-Fi range if the user doesn't disable it, which means the local businesses you frequent have a record of your MAC Address and its activity unless you disable Wi-Fi.
And, nowadays, those local businesses often outsource Wi-Fi management to an MSP, which can then combine records of your "check-ins" to different places and sell it to government agencies, advertisers, and even private investigators.
No, this isn’t a scene from Minority Report. This trash can is stalking you
Smartphone-monitoring bins in London track places of work, past behavior, and more.
Every packet is encapsulated in a frame, which has both a source and destination MAC address. Both the source and the destination MAC addresses are removed once it crosses out of the local broadcast domain (moves across a router), and are replaced with the appropriate addresses in the next broadcast domain
There is no such thing as a TCP/IP packet. Ethernet is only for the LAN, hence the MAC/Ethernet address (and the Ethernet header that contains it) doesn't get routed. Routers only route IP addresses, and see you can see that the IP packet header doesn't have a MAC address field. When a router receives an IP packet (which will contain other data from higher OSI layers relevant to other aspects of the interaction), it inspects the Destination Address header. It then inspects its routing table. If the address in that header is "known" (because it is on a local segment) then it will unwrap the message from the IP packet and wrap it in an Ethernet frame with the destination MAC address, then forward it onto the LAN via the relevant local port to be received by the target host. If not it will forward it to the appropriate IP address/router according to the data in its routing table. This "appropriate" address might just be the default route.
Maybe they're baiting the hook. Now that the deep state knows a package in en route, will they be tempted to intercept it or tamper with it? Perhaps there are safe guards in place to detect or protect against something like that happening. Or maybe even to track who does the tampering.
We've seen President Trump do this on many occasions - lure the deep state into making (sometimes) very public mistakes. Maybe Gregg is taking a page from the same strategy?
I am quickly thinking despite his role in 2000 Mules and ongoing stuff (apparently), this guy is not adding up one way or the other.
Announcing big boom coming - why? Why not just let it hit? (Counterpoint: make the bad guys shit themselves and mess up more?)
Ukraine stuff - assertions he knows more than almost anyone, yet seems unaware of big things like biolabs (which let's recall are NOT just Russian propaganda but were on US gov't websites before scrubbed)
This
I don't know if we should be worried because if he's on the wrong side much is probably sabotaged/doomed, or just concerned because for someone in his field he's not real good with seemingly basic tradecraft....
“we have the tech, and are using it...you’re just to dumb to figure that out. Now, we’ll prove it in court.”
..kinda deal? I figure it’s a strategic move. Tech has probably been working for over a year. Now he’ll just advertise it. I may be way off here though.
I dunno - I figured let's see what he himself says:
"Replying to @greggphillips
Question: Why advertise this?
Gregg Phillips
@greggphillips
·
13m
Replying to @greggphillips and @PepeSee
Because the people need to know and the bad people already do know. Level the playing field."
Edit: continued:
"PepeSee
@PepeSee
·
15m
Replying to @greggphillips
The bad people know about the tech sure, but they now know it's not defeated as of yet (but it's being worked on). Seems the playing field just got leveled a bit indeed, in their favor. Wouldn't the normal pattern be to allow them to continue thinking it's working with no announcement till they found out (by say being arrested) that in fact it didn't?
Gregg Phillips
@greggphillips
·
2m
Replying to @greggphillips and @PepeSee
No. We are seeing evidence of its use in other countries."
What. It's like he didn't even understand the question.
Interesting. It’s like we are showing our hand to cover known operatives. Like look, we know you know, and now you know that we know..you know? So now what strategy are you, the deepstate, gonna come up with. Like force of hand.
Use grapheneOS on your phone, it scrambles your MAC address for every interaction.
Your MAC address isn't transmitted over the Internet
It doesn't have to be "transmitted over the Internet" for it to be a privacy concern.
A mobile phone broadcasts its MAC Address anytime it's in Wi-Fi range if the user doesn't disable it, which means the local businesses you frequent have a record of your MAC Address and its activity unless you disable Wi-Fi.
And, nowadays, those local businesses often outsource Wi-Fi management to an MSP, which can then combine records of your "check-ins" to different places and sell it to government agencies, advertisers, and even private investigators.
No, this isn’t a scene from Minority Report. This trash can is stalking you
Smartphone-monitoring bins in London track places of work, past behavior, and more.
Dan Goodin - 8/9/2013, 2:15 PM
https://arstechnica.com/information-technology/2013/08/no-this-isnt-a-scene-from-minority-report-this-trash-can-is-stalking-you/
Archived link- https://archive.ph/yf1nY
grapheneOS randomizes those scans and adds a very minimal level of security through obscurity.
That's a good point. Wish I had a Pixel phone to try it on.
But it is collected by hotspots, even if you don't connect to them.
Every packet is encapsulated in a frame, which has both a source and destination MAC address. Both the source and the destination MAC addresses are removed once it crosses out of the local broadcast domain (moves across a router), and are replaced with the appropriate addresses in the next broadcast domain
Truth
There is no such thing as a TCP/IP packet. Ethernet is only for the LAN, hence the MAC/Ethernet address (and the Ethernet header that contains it) doesn't get routed. Routers only route IP addresses, and see you can see that the IP packet header doesn't have a MAC address field. When a router receives an IP packet (which will contain other data from higher OSI layers relevant to other aspects of the interaction), it inspects the Destination Address header. It then inspects its routing table. If the address in that header is "known" (because it is on a local segment) then it will unwrap the message from the IP packet and wrap it in an Ethernet frame with the destination MAC address, then forward it onto the LAN via the relevant local port to be received by the target host. If not it will forward it to the appropriate IP address/router according to the data in its routing table. This "appropriate" address might just be the default route.
Why would you advertise your operational plan?
That does seem counterintuitive, doesn't it?
Maybe they're baiting the hook. Now that the deep state knows a package in en route, will they be tempted to intercept it or tamper with it? Perhaps there are safe guards in place to detect or protect against something like that happening. Or maybe even to track who does the tampering.
We've seen President Trump do this on many occasions - lure the deep state into making (sometimes) very public mistakes. Maybe Gregg is taking a page from the same strategy?
He’s basically planning a counterintelligence operation and disclosing his methods in advance of opgo. Makes no sense to me.
For real. I wouldn't go around broadcasting to the baddies that we learned how to use their stuff.
I am quickly thinking despite his role in 2000 Mules and ongoing stuff (apparently), this guy is not adding up one way or the other.
Announcing big boom coming - why? Why not just let it hit? (Counterpoint: make the bad guys shit themselves and mess up more?)
Ukraine stuff - assertions he knows more than almost anyone, yet seems unaware of big things like biolabs (which let's recall are NOT just Russian propaganda but were on US gov't websites before scrubbed)
This
I don't know if we should be worried because if he's on the wrong side much is probably sabotaged/doomed, or just concerned because for someone in his field he's not real good with seemingly basic tradecraft....
But isn’t this more of a;
“we have the tech, and are using it...you’re just to dumb to figure that out. Now, we’ll prove it in court.”
..kinda deal? I figure it’s a strategic move. Tech has probably been working for over a year. Now he’ll just advertise it. I may be way off here though.
I dunno - I figured let's see what he himself says:
"Replying to @greggphillips
Question: Why advertise this?
Gregg Phillips
@greggphillips · 13m Replying to @greggphillips and @PepeSee
Because the people need to know and the bad people already do know. Level the playing field."
Edit: continued:
"PepeSee
@PepeSee · 15m Replying to @greggphillips
The bad people know about the tech sure, but they now know it's not defeated as of yet (but it's being worked on). Seems the playing field just got leveled a bit indeed, in their favor. Wouldn't the normal pattern be to allow them to continue thinking it's working with no announcement till they found out (by say being arrested) that in fact it didn't?
Gregg Phillips
@greggphillips · 2m Replying to @greggphillips and @PepeSee
No. We are seeing evidence of its use in other countries."
What. It's like he didn't even understand the question.
Interesting. It’s like we are showing our hand to cover known operatives. Like look, we know you know, and now you know that we know..you know? So now what strategy are you, the deepstate, gonna come up with. Like force of hand.
..I don’t know.
Lol... this isn't something someone in opsec would advertise. This part seems a bit fishy. Maybe intentional misinfo op?
Monitor and control. All assets evaluated daily. Let’s see what he does.
ICYMI, check out my comment further down in this subthread. I asked the guy and he's not even making sense.
he could be limited on what he can say in public. ongoing op sec....maybe..or not. diff going keep eyes on him.
The Best Way To Win, Is Not To Play.
Don't get blackmailed, don't take bribes, and come forward if you do.
We The People will allow your families to live onward.
( Watch the world turn to a new day )
https://www.electroschematics.com/mobile-cell-phone-jammer/
https://www.wiringview.co/mobile-phone-jammer-schematic/
And these are useful too, in minecraft.
I'm voting in shithole LA this Tuesday. I hope some of this alters the fabric before Nov 23
My takeaway.
https://truthsocial.com/users/greggphillips/statuses/108423002448850810
He should have waited until Tuesday to let us know.