A mobile phone that displays a security lock
Blog

Privacy protection begins in one’s own (sub)network

26.06.2019

At Conntac, we provide support for Internet access problems so that our clients’ customers can be online at all times. But more important than functioning internet access is the privacy and security of the users. And we take care of that too. For years we have been actively involved in the research and standardisation of Internet technologies and protocols.

Recently, a Request for Comment (RFC – the Internet Protocol Standards) was published describing how internet-enabled devices may be violating the privacy of their users without them being aware of it. The title of the RFC is “Privacy Considerations for Protocols Relying on IP Broadcast or Multicast” (RFC 8386) and was co-authored by Conntac team members.

The problem described by the RFC is that billions of devices use protocols that share information with other devices on the same local area network (LAN), e.g. at home, but also in the office, café, airport or hotel. Often these protocols use information such as the name of the device to make themselves known and this is the crux of the problem and where users come in, as research shows that they often include their own name in the device name. This means that anyone connected to the same Wi-Fi, for example, can easily find out the name of many users. This in itself is suboptimal, but other protocols distribute further information that is harmless in isolation, but now this information can be linked to a person. If someone now adds Google, Facebook, LinkedIn and other sources of information, one can often create a very accurate profile of a user on the same LAN. And it all starts with the name of your own device. A blueprint for digital stalking!

Whitepaper

Factors influencing speed test results in the home network

In our white paper, you will find out why customers are not reaching their contract speed.

White paper Analysis of factors influencing speed test results in the home network

Safe surfing with these tips

This sounds scary at first, especially if you are a user who often uses networks that you don’t completely trust. But the good news is that you can protect yourself as a user relatively easily: you should never give your internet-connected devices a name that includes your own name! For those who want to take action right now, we have created a list of websites that explain how to find out and change the device name for some operating systems.

Keep surfing safely! Your Conntac team.

Photo of Prof. Dr. Rolf Winter
Rolf Winter

Other ARticles

A mobile phone in one hand
04.05.2023

Are service apps sustainable?

Service apps don’t save the world – sure – but they give companies the opportunity to support their customers faster and more efficiently. But are service apps sustainable? Can this technology help reduce the environmental impact of businesses?

Zum Blogbeitrag
An agent sits in the customer service centre with her hands in front of her face
11.04.2023

Monday Peak in Customer Service

Mondays are an unpopular day for many people. The weekend is over, the working week begins and the alarm clock rings far too early. However, Mondays can become a challenge not only for employees, but also for companies – especially in customer service.

Zum Blogbeitrag
Broadband expansion for public utilities: challenges, opportunities and digital solutions
27.08.2025
Neu

Broadband expansion for public utilities: challenges, opportunities and digital solutions

Broadband expansion in Germany is progressing, but is lagging behind compared to the EU. This results in a particular responsibility for municipal utilities.

Zum Blogbeitrag

Become a Conntac Insider

Subscribe to our LinkedIn newsletter The Conntac Chronicles to receive relevant insights and perspectives on current topics and challenges in the field of modern service solutions.

A woman high fiving another person