It looks like you're using an Ad Blocker.
Please white-list or disable AboveTopSecret.com in your ad-blocking tool.
Some features of ATS will be disabled while you continue to use an ad-blocker.
originally posted by: Chadwickus
originally posted by: SKEPTEK
With the sad state our country is in, I bet about half of people will see this as something to be applauded.
The doxxer got doxxed... yet only one is bad and the other is good.
It appears 4plebs found the culprit and she works in Maxine Waters’s office. That much is in Wikipedia (twitter.com...). From there, a google search reveals that this IP address posted a comment on AUGUST 22, 2018. Very recently: www.monocacyboard.org... Kathleen Sengstock, a staffer for Maxine waters, posted from this IP. www.c-span.org... twitter.com... So, one of Maxine Waters’ staffers has posted from that IP. I’m not sure how subnetting works in the House of Reps. But I would assume that for security purposes each rep would get their own router. Can anyone confirm? Continuing to search.
While it might not be true that for most users a public IP address identifies them, it is nearly always true that a local IP address is an identifier. Local IP addresses don't change that often so it is alarming to discover that there is a very easy way for a website to discover your local IP address.
WebRTC is a peer-to-peer communications protocol that makes it very easy for two browsers to establish voice or video communications without the need of an intermediate server. As you might guess this sometimes needs knowledge of a machine's public and local IP address.
STUN - (Session Traversal Utilities for Nat) is a protocol that allows a machine to discover its public IP address, even if it is behind a NAT. All that happens is that the machine sends a UDP packet to the STUN server and the STUN server sends back a response packet containing the public IP address. It is very simple and Firefox has a default STUN server that can even be used by Chrome.
WebRTC needs to know the local and public IP address to provide decentralized and hence more private communications and WebRTC gives this information to anyone who wants it - so reducing anonymity.
originally posted by: kpap13
originally posted by: AScrubWhoDied
So how does a public ip address that's logged resolves to a private ip address on a network that's likely got quite a few machines on it resolve to a specific person's private ip address ?
Actually, people will believe the most outrageous things.
Whoever is pushing the bs likely knows their base will fall for it too.
Ugh. I actually finally joined this site after years of just reading to respond to this and other posts.
Someone else brought up NAT and tracking of public to private IP addresses. Mostly, today regarding IPv4, a protocol called PAT (port address translation) is used. This resolves a unique internal private address to a single or several public addresses, allowing many machines to use the same public IP address.
originally posted by: kpap13
This does not provide obscurity regarding network activity. Each PAT process uses a port number to route back to the machine communicating out of the internal network. Being in the cyber security field, this is absolutely something that can be tracked back.
This is not to say that a machine in this scope was not compromised, and used as a pivot point to complete this attack.....Regardless, very possible and relatively easy to track back, no matter what protocol of NAT or PAT was being used.
originally posted by: Diisenchanted
As many of you know some one doxxed the Senate Judiciary.
Many Republicans on the Senate Judiciary had their home addresses and phone numbers published on their Wikipedia pages Thursday.
The victims included Republican Senators Mike Lee, Orrin Hatch of Utah and Lindsey Graham, reported the Washington Times.
What many of you may not know is that the leak came from a computer within the House Of Representives.
The private information on the Republican Senators is coming from a computer from the House of Representatives!
In fact the have narrowed it down to some one within Maxine Waters office.
There truly is no depths that the left wont sink to!
National Security expert David Reaboi says the IP addresses point to Maxine Waters.
What say you ATS?
As you can see from the headlines this story is developing.