@surreality said in What's your identity worth to you?:
@faraday Ghost isn't the one displaying the entitled attitude at all.
That was in one of Nemesis' posts: "All you need to do is get this $120 router in order to allow this!" (which would allow them to play through the style of connection they are using, which the game owner did not want to do for reasons).
You shouldn't cite YouTube as evidence to contradict an article published by cisco.com and written by a CCNA, but for everyone who actually doesn't understand the technical aspects and why the latter is much more accredited:
The admin at SR2064 thought that a perfectly valid IPv6 address issued by Arin to AT&T broadband was a "BOGON" because his router was so outdated that it didn't even know what an IPv6 address is. He and other inexperienced admin are also clearly unaware of the fact that if there were such a thing as a "BOGON" in the actual IT world (which I'm re-classifying as someone simply spoofing an IP Address, as that's what it actually refers to), the spoofer or BOGON transmitter still wouldn't be able to receive any responses back to their terminal because that "BOGON" wouldn't be routed to anywhere at all by anyone at all. This type of network trickery is used in DoS attacks, not in "identity obfuscation," and it takes someone lacking technical expertise in this related field to think that one guy connected to and playing the game from their home IPv4 would attempt a DoS attack using 1 or 2 spoofed addresses at the same time. I tried explaining to this admin, just like I've explained here, that nobody was spoofing IP Addresses or attacking his game - the problem is/was his outdated equipment. To classify this as "entitlement" on my part is unfair as I was correcting technical misconceptions.
Claims have been made about Cisco networking device defaults that are plainly disproved by Cisco documentation - not just in the first paragraph but in the article title itself.
From 2008 to around 2014 there actually may have been devices and even operating system updates providing IPv6 compatibility which left those compat functions/features disabled by default. This was never due to "security concerns" but due to the fact that IPv4 exhaustion was not quite complete by 2010-2012 and IPv6 was a brand new thing that wasn't actually in widespread use yet. Forwarding IPv6 requests to network servers that hadn't yet been updated to support it would have resulted in false connection errors and may have erroneously triggered automated blocking/banning protocols as a result. These false-flag positives in no way represented security holes, only issues that would have been difficult to troubleshoot and might have forced legit IT guys to have to update/upgrade equipment to support new OS features before the agency was really prepared for it. By 2017/18 it's safe to say that anyone who isn't IPv6-ready isn't providing any "services" worth consuming in the professional world, and when anybody puts themself forward as a highly experienced and skilled IT guy it is utterly absurd for them not to apply the same standards to any publically-available service they provide including hobbyist endeavors.
Edit: Thanks to Apos for PRT