Skip to main content
The 2024 Developer Survey results are live! See the results
5 events
when toggle format what by license comment
Jul 2, 2018 at 13:08 review Suggested edits
Jul 2, 2018 at 14:04
Jun 27, 2018 at 12:38 comment added jjmontes Yes, but not quite. There are usually other factors that can help identifying the source of a connection: the source IP address is one example. For example, some networks link IP addresses to MAC addresses and switch ports, making very difficult or impossible for anyone to use an IP address that was not assigned to them. Besides, that argument can be used even if traffic is encrypted.
S Jun 25, 2018 at 15:07 history suggested eclipz905 CC BY-SA 4.0
fixed grammar
Jun 25, 2018 at 14:13 review Suggested edits
S Jun 25, 2018 at 15:07
Jun 21, 2018 at 22:08 history answered AllInOne CC BY-SA 4.0