this post was submitted on 11 Jan 2024
37 points (97.4% liked)
Piracy: ꜱᴀɪʟ ᴛʜᴇ ʜɪɢʜ ꜱᴇᴀꜱ
54539 readers
199 users here now
⚓ Dedicated to the discussion of digital piracy, including ethical problems and legal advancements.
Rules • Full Version
1. Posts must be related to the discussion of digital piracy
2. Don't request invites, trade, sell, or self-promote
3. Don't request or link to specific pirated titles, including DMs
4. Don't submit low-quality posts, be entitled, or harass others
Loot, Pillage, & Plunder
📜 c/Piracy Wiki (Community Edition):
💰 Please help cover server costs.
Ko-fi | Liberapay |
founded 1 year ago
MODERATORS
you are viewing a single comment's thread
view the rest of the comments
view the rest of the comments
For the purposes of practicality, you're probably safe so long as you don't have to log in using credentials tied to you. They simply aren't going to care enough, and will likely just put up some network restrictions if they get a letter from the isp.
But for the purposes of security, yes, you can absolutely be identified. For one, if your device Mac address isn't spoofed, they can just see what device you used, and skim security footage for someone using it in the right time frame. Even without that, they can just see who was there for the amount of time you were connected, and find you that way. Especially if you do anything that would identify yourself while there (like use a library card).