Posted by Steve on March 13, 2003 at 09:45:55:
In Reply to: Think before you belch posted by Pale Face on March 12, 2003 at 22:34:04:
Why don't you describe the methodology.
Oh wait, here's your answer befor you post:
--Are you really that naive? Please, people, am I talking to an adult? This is the Internet. Everything's traceable.
You are right, just about everything is traceable. Of that, I have no doubt. The question here is the opportunity cost. Who are you going to get to trace it? What incentive does Yahoo have to give you their logs so that you can determine where the IP addresses originated from? From there, what incentive do the ISPs have to give you their connection logs for the IP addresses so that you can trace them to individual MAC addresses, which they can then corrolate to their subscribers? Oh wait, I just described part of the process to you.
What I didn't describe was how bloody difficult it will be for you to get your hands on the information. Just ask the music industry. They've been trying to get major ISPs to give them the download records for sites like Napster for years. No luck. I'm sure they'll just role over and hand it to you, because you're so important in the world. If we were talking about child pornography, you'd have a leg to stand on, and I'd stand in your corner to help you. But we're talking about pictures of a convicted criminal. I seriously doubt that anyone's going to be helping you. At best, you could get Yahoo to take the pictures off the site, or remove the site. Beyond that, you're smoking crack.
Incidentally, here's my IP address:192.168.8.155
Oh, that won't do you any good - it's an internal IP because we have a masquerading firewall here.....
Good luck, ding bats.