Gordon Stein, CFO of CleanTech Lithium, explains why CTL acquired the 23 Laguna Verde licenses. Watch the video here.
Fleccy - to help you
try Wikipedia search device fingerprinting
See “sources of identifying information”
It will help you. You will still be right of course, but it will help you. If you want technical descriptions befitting your expertise I have links for those too
https://en.m.wikipedia.org/wiki/Device_fingerprint
Blue Pete, never more true words spoken. When you buy a new device that MAC address is linked with your address / credit card / email & what ever other details you hand over at the time (no need to highlight PAYG Fleccy).
Even second hand every little interaction online, allows for personal details to be updated, amazon have up to date details to deliver parcels, that would be the perfect place to link name address email to the device
I went to hackers demonstration once and couldn’t believe how quickly this stuff can be put together, they share huge resources of random data harvested from various sources. I would guess you could get same demo online.
It’s why I would caution anyone who fancies bragging about their circumstances or grand standing about their achievements in a public space.
Listening / reading this is optional.
Can’t believe I’m wasting my time answering you Fleccy. Honestly I’m getting embarrassed for you
a) GPS tracks location, we are discussing tracking activity across the inter-web & how this means you are not anonymous.
I’ve already told you. Using your MAC address to track your activity / identity is nothing to do with layer 2/3 routing. I really think you should get your head round that harvesting a MAC or other personal details is about identifying you / your device and it’s activity nothing to do with switches or routers who won’t even see it in the payload.
I’ve already given you an example, Apple preventer apps from accessing MAC address because companies were using it to identify users and track their usage
I’ve given you other details. Bank, Netflix, PayPal etc all recognise your device, regardless of network. one way of doing this is by requesting your MAC address
Older voip systems need a unique identifier for you. In one direction it’s a SIP address, some opt to use your MAC send via the application layer.
A MAC address can identify the device purchase, used across multiple sites it csn be harvested and cross referenced, linked to other personal details, as can cookies as can other sources.
Point being, there’s no such thing as anonymity. & applications can harvest and pass on personal data including your hosting io address and MAC. Nothing to do with routing, nothing to do with any network layer, but as data exchanged between applications, bypassing any encryption or any attempt to hide your network details.
In some cases these apps don’t need to read this detail from your equipments OS, in some instances it’s a necessary part of the app.
It’s not difficult is it?
Hello NDN. Of course I wouldn’t because that would be sharing personal details over a very public thingy.
Very silly after kindly asking others to think about their own safety, whilst posting on a very public domain.
For example, I could make a very good, educated guess where you live, after you posted that alt net company who left unused cables tied up on posts where you live.
Same as Fleccy, this board is a world of info about him, how much money he has, shares he invests in a description of his career, military service, much much more & if that picture was him, plain silly.
If you were to apply yourself, you should be able to determine whether my simplified description is correct or not. That should help you work out my technical understanding or not. I really don’t care either way.
I’ve left out cookies and other options to track people across the inter-web & then of course, what if there was an open source, operating system, maybe called android, there would be not limits, tv’s, cameras IOT to harvest info from
Hope that’s helpful.
Fleccy, I have no idea why I’m answering you, because it’s obvious you don’t understand, as
Much as you pretend you do.
I have some good news for you, Apple stopped applications requesting you MAC address from IOS 11. I doubt that’s the case with other devices.
Makes you wonder why they did that according to your work view here is the reason why
A MAC address is a string that is unique for every computer device. iOS 11 does absolutely not allow apps to read these MAC addresses. We were told by Apple engineers that this is a privacy feature of iOS 11 because some companies misused the unique MAC address to track users.
I think I was trying to explain “it’s not used for routing”. So the idea of keeping it in layer 2/3 for addressing is irrelevant.
I’m not sure I can word this any easier (it must be because you have already proven I don’t know what I’m talking about)
If an application can read your MAC address, it can be requested by the other end application. & be transported across a network, not for routing but part of the IP packet payload.
Because this information exchange is application to application (layer 5,6,7). It doesn’t matter how complex the encryption used, the communication at layer 5,6,7 is usually in plain language.
Therefore regardless of vpn, ip address hiding or anything else, an application layer is capable of requesting and receiving your personal details, what ever your can be harvested from your device.
Of course your operating system should try to prevent Personal details being accessed, but who really reads terms and conditions ?
I hope that helps Fleccy, in your never ending quest got knowledge?
Fleccy I almost can’t believe I’m answering you, because I already know how pointless it is & you will cling to the idea you know best. Obviously I assume you didn’t really post a picture of yourself? (Don’t answer that either)
Yes I did mean vpn, but you might ask yourself where a vlan gets an ip address from when it needs to break out & how similar that might be. (I already know it’s pointless)
If you think later 2 or 3 addresses stay in layer 2 or 3 (they are not used for routing outside layer 3 ) or that hiding behind a proxy keeps you safe. How do you think your bank continues to recognise your device when you use your banking application ? (Please don’t answer), I already know the choices they have to identify you).
Hey Blue Pete, thanks for being the voice of reason. I wish I was able to be halfway as decent as you often are.
Of course you are right, the point you make is a good one.
I have to say, for me, there are views & values which automatically preclude any chance of decency in a person.
Unlike you, I can hold those views, because I struggle to be nice or decent myself in many ways.
Coronation - Yes I would now jump for a reasonable offer. If it covered my average buy price, with something more than 15% profit I would consider. 20% would likely take it. 40% I would definitely take it, no doubt.
Blue Pete, surely It’s their money, their choice. Honestly other peoples investment strategy has got to be their business.
If you’re not careful fleecy is going to post another ridiculous (cringe worthy) picture of himself trying to convince interested parties he’s immortal & has all the time in the world.
We already know he’s wrong about almost everything, you’re arguing with a die hard leave voter for cricky’s sake.
Honestly, people shouldn’t be disclosing these kind of details about personal wealth / details on here, it’s madness, it’s a public board, you can access without a password or account !!!!
Fleecy will say it can’t be linked to him & his real world details, but he’s wrong about that too. Anonymous accounts is not anonymity & using a vlan doesn’t stop identity sharing between applications (layer 5) which by their nature overcome all encryption and all network routing (layer 2/3) precautions. Simple cookies will do this job & it gets far more sophisticated from there.
You guys won’t listen, because you think you know better, but I would advise caution as one or two of you are making themselves worth while targets.
Fleccy. Big company / small company - costs
Now work out the costs (in an ever reducing revenue environment )
For a really, really, really big company having to replace equipment across lots and lots and lots of fibre tails / pops / head ends
Compared to the costs (in a revenue reducing environment) for a smaller operator, replacing / upgrading equipment for small numbers of fibre tails / pops / headends
As for fibres and encoding & or multiplexing of wave lengths, utterly irrelevant. The equipment at either end still needs upgrading, still needs replacing, still needs updating & the more you have, the more it costs & the more you have & the wider your coverage, it’s more likely you will have under-utilised network paths……
Fleccy do you deliberately misunderstand everything or is it a super power you like to show off?
Yes £2 is to the mobile operator, it’s not much is it? When compared to the OTT revenue model.
& yes I did make sure I was talking about high usage applications like automated cars & video.
Two different examples where the carrier needs to get into the revenue game & need to make sure heavy users pay towards the network capacity needed to carry them.
Completion (historically) makes both these very difficult because if BT won’t, where they can, someone else will. Look at Three and their unlimited sim deals. Just forces prices down.!! Prices forced down, hurt the biggest network player, because their capacity costs more to maintain / upgrade ….
It’s not difficult to see the problem BT & other operators have & need to solve ? Is it?
Revenue for internet of things. I have a tracker for my dog £2 per month.
It’s not going to set the world on fire is it? It’s not a revenue model that will save BT or Vodafone
The more IOT devices means more investment needed bt provides to support them. This gets worse and worse for heavy usage devices like video, like autonomous anything…
Meanwhile OTT companies, £260 for the tracker, £180 streaming box and 5,10,15,20,30 pounds a month subscription for tv….
Huhhhh. Again, BT senior management seem to be shooting the business in the back.
The markets seem to have a hideous view of all this excitement (which seems to excite no one ).
I’d say it looks like markets have lost patience.
Fleecy - don’t try and justify you opinions with an over rated view of yourself. To people who have an understanding, your technical knowledge is at best rudimentary.
& military data of any consequence wouldn’t go near a shared cloud architecture.
Honestly pushing yourself forward as an expert in these matters is laughable, be warned all those non tech people who listen to you on this board.
Hi Pete I agree, although I find myself in this holding position, but no longer adding. More in hope, than a rational investing strategy.
I think some people on here missed the point for share drop yesterday (if linked to dividend reduction). There is no point quoting what BT has previously said about dividends, when the whole point is, the accusation was that previous guidance could be wrong.
The price drop I think reflects this was taken seriously.
If that article / analysis turns out to be correct, it will be alarm bells ringing for me, suggests senior management do not have control of spending & or do not understand their business. Understand there are major global uncertainties, but they would have boxed themselves into a corner previously, knowing it was an immediate risk, which wasn’t mitigated.
Fleccy - you’re stating the obvious again. Chinese companies could blow up nuclear reactors & private contractors could photograph submarines & of course Phillip could make a return to this morning.
All military communications assumes intercept, it’s encrypted to make sure it’s not usable in time. If your mind then stretches to super quantum computers, then yes, but that would be a bigger problem than a BT sale & I assume we would use quantum encryption
Accessing military comms via fibre will be protected, but if compromised is no different to satellite or RF military comms, semaphore or shouting.
Diver - I’m not sure there is a case for arguing BT cannot be sold because they manage / carry sensitive stuff.
I don’t know, but I doubt BT handle much sensitive stuff, they might own or provide infrastructure to move data around, but do they get to see its contents?
1940s military might have used / shared infrastructure for plain language, I don’t think that will be the case now, national security comms will be far more secure now, some of which, most of which probably going no where near BT equipment or infrastructure.
Even if it did, we now live in a world where nuclear power, submarines, military aircraft & even military sites are outsourced to private, foreign countries. I find it hard to believe BT would be a special case in this company important national infrastructure.
Might be wrong, but the weakening of the uk through brexit & the claims / position taken afterwards makes a government intervention even less likely. The current government won’t fully understand their brief, (a’la channel 4 funding) so to me, makes it even less likely a takeover would be stopped, even if the day before it would have been policy.