this post was submitted on 06 Oct 2023
393 points (97.1% liked)
World News
32282 readers
609 users here now
News from around the world!
Rules:
-
Please only post links to actual news sources, no tabloid sites, etc
-
No NSFW content
-
No hate speech, bigotry, propaganda, etc
founded 5 years ago
MODERATORS
you are viewing a single comment's thread
view the rest of the comments
view the rest of the comments
Who the fuck said anything about saving an IP?
IP lookups are not "saving your location".
No... Not at all. If you reach out to my server, my server has to know where to send the data back to. Part of this process can be an IP lookup that actually identifies where your ASN is based out of. There is no way around this... the request MUST have IP information. Nobody said shit about logging anything. And logging IPs is not required to do anything that I've mentioned.
No... I'm arguing pedantic shit. I'm telling you what actually happens and what the actual definition is.
Edit: To the point. I actually do IP lookups to BLOCK specific countries in my router. Using a database like maxmind you can get a general idea of location without knowing anything specific at all. So it goes 1 step further to run a check on if your current ASN is even remotely close to your known location. If not, fire off email. nothing about this requires any logging or outside information than what you already gave the company in this case. Other fields use these mechanisms that are well regulated and nobody else except for you calls this "tracking".
The "where" in above quote is my ip. That's all nothing else.
?? Let's pretend that's true. Ignoring the previous comment.
Why not. Wouldn't your so called "security" will increase if they log things so they are more sure of your identify.
Correct... Which you can use ASN data to determine general location... If 1 million people start logging in from the same set of ASNs or ASNs known to be VPN services. That's a red flag... I'm not sure how many times I can state this... Especially since your server is serving the requests that are these malicious people logging in. You can check the query/account details against the IP location WITHOUT LOGGING ANYTHING.
Now you purposefully conflating what I specifically said and am imparting some mystical properties I never stated were required. You're a terrible person who goes out of their way to argue in bad faith.
I was clear and specifically outlined what mechanism should be put in place. I never stated anything about logging. then you come out of the woodwork and complain that logging is bad and argue against that point. And now here you are claiming that it would increase security. Bro... nobody here said shit about logging. Go argue with someone else.
My original comment, and every one since then has not made any requirements that logging is enabled. You can view active TCP connections without logs. You don't need behavior tracking to do these things. You don't need logging. This can be done without ANY of that shit and is regularly done on the internet without logging. You must think that companies have unlimited storage space... to store infinite logs and that logs are the end all-be all of how all of computing works.
Until you can show where I said ANYTHING that REQUIRES logging to function. This conversation is over since you've proven at this point you're arguing in bad faith.