One of the things I did say about the Draft Investigatory Powers Bill is that people could easily create false "Internet Connection Records" by sending packets that from their machines.
I even suggested that this could be an app or virus people could use, though obviously a simple Tor exit node would create loads of bogus traffic.
It has, however, occurred to me that there are other ways people can be rebellious - if someone includes images in a web site, even 1 pixel by 1 pixel, they will be loaded. Those images can be from anywhere in the Internet - radical web sites, terrorist web sites (do they exist?), porn sites, anything.
Now, it seems the government are quite keen to log the web site name but NOT the full URL, which means that even though this is just an image grab it logs as a "visit" to the site - they cannot tell it was just an image and not something else on the site.
This means people can put these image tags on their web sites, or in HTML emails (even emails sent to politicians) and create false data in the logs.
P.S. As someone else pointed out, some browsers pre-cache links, fetching pages that the user may never visit.
P.P.S. Someone ask why would *I* do this - well people will have lots of reasons, not least of which is to rebel against the invasion of privacy - but I am also pointing out that criminals can be doing this to make the database less useful.
I have mentioned before, but one of my pet hates is crossed zeros. I have gone in to the history a bit ( here ), but I still encounter these...
Broadband services are a wonderful innovation of our time, using multiple frequency bands (hence the name) to carry signals over wires (us...
The ASR33, like most teletypes of the era, works at a fixed rate. It does 10 characters per second. It is 110 Baud, using 1 start, 8 data (i...
I am using KiCad for PCB design, and it is pretty impressive, but KiCad version 6 has just been released. There are lots of small changes, b...