Print

Print


In message 
<[log in to unmask]>, at 
15:50:01 on Tue, 1 Jun 2010, "Bradshaw, Phillip" 
<[log in to unmask]> writes
>I tend to side with Renzo here. Assuming my wi-fi was not encrypted (it 
>is) it would not take much subtlety I guess for Google to link the MAC 
>of my equipment with me. There are not likely to be any others in my 
>street contributing to Jiscmail and my other specialist interests, and 
>there is already enough about me on the web to make the link 100% clear

But they only grabbed the traffic for a fraction of a second, what's the 
chances you were logging into something that exact moment?

Of course, it may still have theoretically been a wiretap (but only on 
subscription APs, I guess), but there's a limited amount of profiling 
you can do in the time involved.
-- 
Roland Perry

^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
     All archives of messages are stored permanently and are
      available to the world wide web community at large at
      http://www.jiscmail.ac.uk/lists/data-protection.html
     If you wish to leave this list please send the command
       leave data-protection to [log in to unmask]
All user commands can be found at http://www.jiscmail.ac.uk/help/commandref.htm
 Any queries about sending or receiving messages please send to the list owner
              [log in to unmask]
  Full help Desk - please email [log in to unmask] describing your needs
        To receive these emails in HTML format send the command:
         SET data-protection HTML to [log in to unmask]
   (all commands go to [log in to unmask] not the list please)
    ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^