Internet TCP/IP Communication Privacy Threats

Three major elements of communication: sender address, recipient address, and content

Internet TCP/IP Address Privacy Problems

The TCP/IP package of the Internet communication protocol consists of header metadata including the source address, destination address, and content (data). Due to the widespread use of SSL encrypted communication recommended by W3C, the threat of content (data) privacy leakage is greatly reduced.

Due to the header metadata being transmitted in clear text (unencrypted), personal information about users is leaked:

  1. Geographic location of communicating parties

  2. Software used to transmit the data

  3. Frequency of communication.

Due to ISPs requiring KYC, IANA can obtain a users identity with just the IP address, including the registered owner, and possibly even the current tenant.

Having access to this information makes the internet less open and free.

Packet data can be blocked by IP addresses, on both the sending and the receiving end, preventing users from connecting or making an outbound connections. This data leak can be abused by individual server hosts or even at the ISP level and it is all easily logged.

webhosts can block users by ip address, preventing specific users or blocking whole regions of users from making connections. In the same way out going communications can be blocked as well.

webhosts can deanonymize users that connect to their server

webhosts can block certain types of applications

  • Internet traffic can be filtered based on origin or destination IP address or domain, banning specific users or large groups of users

  • Block network communication of certain types of applications, such as Bitcoin or torrents

Technical measures that network monitors can take

  • Traffic filtering system based on destination IP address or domain name.

  • Obtain the current real geographical location of the monitored object

  • Obtain the social network of the monitored object.

  • Block network communication of a certain type of application software. Such as blocking the communication protocol of Bitcoin and Ethereum.

Internet application service providers exploit privacy

  • Obtain the visitor’s true identity.

  • Tailor-made advertising.

  • Identity-based denial of service.

  • Record and collect visitor data, combined with big data models, to obtain an accurate personal evaluation system. For example, a centralized artificial intelligence system can evaluate the user's cultural beliefs, knowledge reserves, living habits, IQ level, current happiness, anger, sorrow, and joy through big data analysis based on the accumulation of visitors' questions, and can predict the user's next step. hours, possible actions for the next week.

Last updated