▲ | trod1234 3 days ago | |
Capturing forensic artifacts of the local network allows a building a bridge strategy for identifying fraudulent networks without requiring knowledge of the path taken from destination to recipient. Other local devices do this and send the network map during a phone home, allowing comparison to a source of truth that is tied almost directly to the person, or group of people. There is also a lot of fingerprintable material within such a port scan from clock skew, TCP ISN, and a few other areas. You can sieve this quite easily with this available, thanks to Roku's, Phone's, and other things doing this while just sitting locally in a shared collision domain (a digital soldier quartered in every home). The metadata node graph of devices locally acts as a unique fingerprint once in RFC1918 space, technically not unique but close enough. |