
IP address and tracing iphone account
#1
Posted 11 March 2013 - 02:06 PM

#2
Posted 11 March 2013 - 02:34 PM

Be mindful, if we're talking illegal activities, then yes, quite a bit can be be cobbled together. In my day job, when the severity of the situation calls for it, much is able to be pieced together.
Your final question would have to be addressed by your attorney.
#3
Posted 11 March 2013 - 02:52 PM

Edited by JenyWach, 11 March 2013 - 02:55 PM.
#4
Posted 12 March 2013 - 07:29 AM

I know you're looking for some comfort, so lets talk a little about the possibilities. If person "A" accesses their frequently used Gmail account, via a public WIFI and composes and sends an email, what trail is left behind. Since you likely use the Gmail account a lot, regardless of whether you've attached a name to the account, you've left an access trail with various access points every time you used the account. And, all that information could be found. If you only set up the account for that one use, then only that information "could" be found. All that said, you have to ask yourself, would anyone go through the effort to find you?
If the situation is as you describe, there are laws protecting "Whistle Blowers". Which is what I think you're describing. There are also organization to help you,report illegal activities and then protect you, and defend you through the process. There is also the credibility of the information. i.e. anyone can compose an email saying X,Y & Z. It means more if a process was followed and difference evidence was offered.
That's about all I've got for you.
#5
Posted 12 March 2013 - 11:44 AM

#6
Posted 12 March 2013 - 02:00 PM

Glad to try and help.I appreciate your kind reply.
So that I may be just as clear, I'm trying (in the nicest way I can find) to NOT answer your specific question, because I can't be certain of a correct answer and because your question has implications that are waaay beyond what we do here.Just to be clear,
Perhaps this link CLICK HERE will be helpful to you.if the email account created for the purpose was gmail, Google would have to authorize a search on all ip addresses regularly logging in, correct? In other words, the third party receiving the email would only have direct access to the ip address it came from, not all the ip addresses that at some point have logged into that account?
You're welcomeThanks again.
#7
Posted 20 March 2013 - 10:21 PM

Why not borrow somebody else's phone instead? Won't be traced to you that easily right?
#8
Posted 21 August 2013 - 05:38 AM

Your email has been traced and in that coffee wi-fi will be caught and it's IP is also will be captured but not phone...

Similar Topics
0 user(s) are reading this topic
0 members, 0 guests, 0 anonymous users
As Featured On:






