...and all due respect back jschall
- you're handing over ALL personal information recorded in your passport and boarding passes at either airport,
most of which IS uniquely identifiable to YOU personally, and DOES stand up in a court of law.
- considering the "digital footprint" a grid-connected person leaves around these days, a MAC address of
your wifi tablet in the grand scheme of things is VERY low hanging fruit.
From a technical aspect, the two wireless networks at Toronto Pearson and Chicago O'Hare are two distinct
and seperate entities. UNLESS they were accessible by / managed by the same group / company, crossreferencing
a MAC address is next to impossible, nevermind a pain in the derriere -- I should know as I've had a couple people
who didn't know better ask me "please find where I am on the network, the MAC is xxxx.xxxx.xxxx." Even if this
was on the 192.168.x.x address space, that's 2^64 possible IP addresses to check. Sorry, but I've got better
things to do with my time.
To take this out of the "speculation" realm and bring some actual hard data to it, dollars to donuts there's
likely equipment plugged in with the capability of deep packet inspection and/or lawful intercept built into
it -- feel free to google these terms jschall
, but be forewarned to bring your tinfoil hat as you may not like what you come across.
As for SSL encrypted traffic, try
this link to see how child's play it can be to decrypt / read this traffic transparently these days if one was so inclined.
My 00000010bits
Regards