Recent content by phenomena-in-code

  1. P

    Question Are MAC addresses coupled to customer details upon purchase of NICs or computers? If not, why is this?

    Thanks again for all the information. You say: Would it be technically possible then, that if I have a dynamic IP address determined by a DCHP server on a restaurant's router, and my MAC address is mapped to this dynamic IP in this router, online activity could be traced back to me (my MAC...
  2. P

    Question Are MAC addresses coupled to customer details upon purchase of NICs or computers? If not, why is this?

    Again, thanks for the reply. I might be confusing switches and routers then. What I have read was on this page: https://www.technewstoday.com/static-ip-vs-dynamic-ip-whats-the-difference/ Here it says: "The ISP uses your CPE device’s mac address to assign an IP address. The CPE then relays...
  3. P

    Question Are MAC addresses coupled to customer details upon purchase of NICs or computers? If not, why is this?

    Thanks for the reply. :) I haven't talked about MAC addresses leaving a subnet. I talked about consulting MAC address tables in the switch governing a subnet. These tables in the switch - as I understand it now - map a PC's MAC address on the subnet to the source IP address that is transmitted...
  4. P

    Question Are MAC addresses coupled to customer details upon purchase of NICs or computers? If not, why is this?

    Thanks a lot for the quick reply! Would it be possible to shed some more light on this multitude of reasons? Is it because most people doing something bad would spoof their MAC address anyway? Or is the problem of a legal kind?
  5. P

    Question Are MAC addresses coupled to customer details upon purchase of NICs or computers? If not, why is this?

    Hi everyone, I have done quite some research, but there is something about MAC addresses and traceability that I don't understand. Can someone explain it to me? My current understanding is as follows: MAC addresses are used on the local network level. If someone attempts to connect to an...