Solved Information that should not be posted

Solved issue

Gainer

Active Member
Joined
Oct 12, 2024
Messages
133
Reaction score
127
Credits
1,865
Awhile back, one of the staff writers listed three (3)Terminal commands to execute to get hardware/system/software info that may be needed to answer our posted questions.

The first two commands results produced information that would be needed by the support person to respond to questions.

The importance of the third command was emphasized as... Do NOT under any circumstances send the report created by this third command.

While the report could possibably be both interesting and important to the owner of the local machine, it seems to list things of great security and privacy not needed by support persons.

Well, somewhere I lost my notes with those commands...:( Promise to keep them safe this time.

Thank you
 
Last edited:


That sounds like one of my post on inxi usage
so for full information inxi -Fnx for your use or sudo inxi -Fnx for more information for your use, inxi -Fnxz for full information for posting to forums the z filter removes sensitive information
a full list can be found by using inxi -h but its the z that filters your results for publications
 
Last edited:
interesting and important to the owner of the local machine,
I thought I would give an example for any newbies reading this thread,

one of the inxi commands is for network information, so..
inxi -N will give minimal information
inxi -Nn will give full information [this includes mac addresses]
Inxi -Nnz will give the full information but filtered [removes mac addresses and other sensitive information]

run each in the terminal and see the difference,
 
The importance of the third command was emphasized as... Do NOT under any circumstances send the report created by this third command.
Which third command are you talking about, care to share it?
 
Sudo inxi -Fx
 
No, I believe he may be thinking

Code:
inxi -Fxs

That is the one which will reveal MAC addresses and serial numbers.

So you can save for yourself the content of that for yourself, in a text file, and just swap the s for the z in output you may choose to share with people helping your inquiry.

Cheers

Wizard
 
That is the one which will reveal MAC addresses and serial numbers.
You can't connect to serial numbers or mac addresses from outside of your lan, your router uses mac addresses to know where something is from in your local lan, and switches it out for the mac address of your router when sending traffic out, then when the return traffic arrives your router will know where to send the requested traffic to. I'm by no means an expert on this but that's a rough short of explanation of how it works.
The only exception where you may want to keep your mac address private is if you are on a public wlan, then you could spoof your mac address.
 

What Can a Mac Address Reveal About You?​

Beyond its role as a digital identifier, a MAC may harbour clues about your device’s origins. Much like the serial number etched onto a product, the organisationally unique identifier (OUI) embedded within the MAC address hints at the device’s manufacturer. While seemingly innocuous, this information could potentially be leveraged by malicious entities seeking to exploit manufacturer-specific vulnerabilities.
 
Beyond its role as a digital identifier, a MAC may harbour clues about your device’s origins. Much like the serial number etched onto a product, the organisationally unique identifier (OUI) embedded within the MAC address hints at the device’s manufacturer. While seemingly innocuous, this information could potentially be leveraged by malicious entities seeking to exploit manufacturer-specific vulnerabilities.
Here's my mac address, good luck.
2: enp1s0: <BROADCAST,MULTICAST,UP,LOWER_UP> mtu 1500 qdisc fq_codel state UP group default qlen 1000
link/ether 52:54:00:e3:8d:92 brd ff:ff:ff:ff:ff:ff
inet 172.30.1.5/24 brd 172.30.1.255 scope global noprefixroute enp1s0
 
You're cheating! please post real MAC.
That's a real mac address of a virtual system. Here's one of a physical system.
2: enp7s0: <BROADCAST,MULTICAST,UP,LOWER_UP> mtu 1500 qdisc mq master vmbr0 state UP group default qlen 1000
link/ether 10:7c:61:46:23:aa brd ff:ff:ff:ff:ff:ff
 
That's a real mac address of a virtual system. Here's one of a physical system.
NIC's in virtual system don't have hardware MAC, your other says: "ASUSTek COMPUTER INC."

2 sites to check MAC:
 
NIC's in virtual system don't have hardware MAC, your other says: "ASUSTek COMPUTER INC."
I don't care if anyone knows that I am using an Asus motherboard, it's not like all linux.org members will be arriving at my door tomorrow morning because of that information.
 
I don't care if anyone knows that I am using an Asus motherboard.
In your case only that is known, however usually both NIC manufacturer and brand is learned.
It's not only matter of security but also privacy because if you share MAC of your router then your physical location can be revealed.

You don't care but there are people who do.
 
You don't care but there are people who do.
My point was more that the OP of this topic was shouting: "Danger, fire!", as if it's the same as publishing your public ip address which is not the case.

And I have shared my pc hardware specs before on this forum.
 

Staff online


Top