![]() ![]() (this is not hard considering most people leave the keys in the link - the ISP could backtrace your steps and inspect the pages for the hashtag keys, or defer that task to a crawling service (would probably be faster))Īlternatively, a shill (cop, digital rights holder, etc) could transfer you the files or request that you transfer the files and then rat you out.īeyond that, a spying agency, a bored hacker or anyone being able to install software on your device (e.g. Now this could also work for encrypted file sharing systems such as the one hosted by MEGA, if the ISP got a hold of the keys and inspected the file, deemed it illegal, and then started tracking whoever is downloading it. If they find a match, they have strong evidence that something that wasn't supposed to be shared was shared. If the protocol works with an open checksum, the ISP could take that checksum and compare it to one of its databases. If the filehost is not a honeypot, if you use an unsecured or semisecured connection with a known protocol to transfer your files, the ISP could track whenever you initiate a file transfer. If you use a public hosting service, that service could of course also keep track of what it's hosting and who uploaded and downloaded it. ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |