Internet TCP/IP Communication Privacy Threats
Three major elements of communication: sender address, recipient address, and content
Last updated
Three major elements of communication: sender address, recipient address, and content
Last updated
Internet TCP/IP Address Privacy Problems
The TCP/IP package of the Internet communication protocol consists of header metadata including the source address, destination address, and content (data). Due to the widespread use of SSL encrypted communication recommended by W3C, the threat of content (data) privacy leakage is greatly reduced.
Due to the header metadata being transmitted in clear text (unencrypted), personal information about users is leaked:
Geographic location of communicating parties
Software used to transmit the data
Frequency of communication.
Due to ISPs requiring KYC, IANA can obtain a users identity with just the IP address, including the registered owner, and possibly even the current tenant.
Having access to this information makes the internet less open and free.
Packet data can be blocked by IP addresses, on both the sending and the receiving end, preventing users from connecting or making an outbound connections. This data leak can be abused by individual server hosts or even at the ISP level and it is all easily logged.
webhosts can block users by ip address, preventing specific users or blocking whole regions of users from making connections. In the same way out going communications can be blocked as well.
webhosts can deanonymize users that connect to their server
webhosts can block certain types of applications
Internet traffic can be filtered based on origin or destination IP address or domain, banning specific users or large groups of users
Block network communication of certain types of applications, such as Bitcoin or torrents
Technical measures that network monitors can take
Traffic filtering system based on destination IP address or domain name.
Obtain the current real geographical location of the monitored object
Obtain the social network of the monitored object.
Block network communication of a certain type of application software. Such as blocking the communication protocol of Bitcoin and Ethereum.
Internet application service providers exploit privacy
Obtain the visitor’s true identity.
Tailor-made advertising.
Identity-based denial of service.
Record and collect visitor data, combined with big data models, to obtain an accurate personal evaluation system. For example, a centralized artificial intelligence system can evaluate the user's cultural beliefs, knowledge reserves, living habits, IQ level, current happiness, anger, sorrow, and joy through big data analysis based on the accumulation of visitors' questions, and can predict the user's next step. hours, possible actions for the next week.