• 0 Posts
  • 24 Comments
Joined 21 days ago
cake
Cake day: October 3rd, 2025

help-circle

  • I used to study in a cozy little cafe that was a row of houses turned into business. Next door was a bar that could get a bit rowdy sometimes. They had one of those jukeboxes with an app. I would load up Hotel California every chance I got. I could barely hear the music but I could hear the patrons groan every 30 minutes or so. One day the song option wasn’t there, so I switched to American Pie by Don McLean.

    I’m sure they hated me.


  • I’m speaking from the point of view of the app you gave permissions to collect your hardware data. Y’all are talking like I think a MAC is transmitted over tcp. I don’t need an intro to OSI. Those apps use the hardware data to know if you’re using Samsung, LG, Apple, etc and they store large databases of MAC addresses on individuals. They can even build a local hardware profile to see if you sold your device, to whom, and what device you replaced it with.



  • Unless they’re spoofing their MAC address, hardware fingerprinting is much more reliable and predictable. It’s easy to watch a MAC bounce all over the country/world in a matter of minutes.

    At this point in history, it’s too late to implement identity protections. Your profile is already built, stored, and backed up. They even know your deleted edgelord MySpace account and that you unfriended Tom (you monster). I guess if you were born in a ditch without a SSN, and never signed up for anything, not even a house/apartment, you could go under the radar.






  • In the 90’s, companies were super lax on data security, retention, and destruction. In my city we had major IT players like INTEL, HP, Motorola, etc. We would dumpster dive and find whole computers full of data and no passwords. We were after the hardware so all our friends could play Doom MP, Quake, or later Unreal Tournament… so we usually wiped them but who knows what was in those things. It was a lot of e-waste and because of divers with bad intentions, now there’s incredibly strict corporate rules about data security/destruction.








  • We recently had to buy out a director that kept all the technical knowledge to themselves for the last 20 years. They were almost always available 24x7 for outage calls and it became clear his teams didn’t know shit about anything, especially when said director was sick or on vacation. He was labeled a danger to the infrastructure and settled for a multimillion dollar buyout with a full knowledge transfer. Retirement age, fat 401k, company stock and other investments… yeah, he took that deal immediately, like no hesitation.