Alethea Dice
Active Member
- Joined
- Feb 18, 2012
- Messages
- 2,477
- Reaction score
- 10
If you want to use a computer on a university network, you have to login with your name and password. If you want to use a public library computer, you must swipe your library card. Because you are using verified identification to use the computer, you can be tied to the computer.
When it comes to someone else using your home computer, well, there is a lock on your door, and a password on your computer, and a password on each of your accounts...if someone had total access to DM's computer and was able to get through three or more layers of security like this, why didn't they just steal his money from his bank account?
Don't forget there will be smartphones, which have GPS. If DM's smartphone was mapped to his house at the same time DM's computer accessed Auto Trader and the burner phone's location triangulates to the area of DM's house...behind DM's locked door, and all of his passwords...well what then?
Except that we don't know if his personal home computer was password protected. Not everyone does that. And it appears that more than one person was using that e-mail account, so they would have that password. As for the lock on the door, I don't know how sure we can be of it's use since it's been reported that a number of his friends had lived in the basement at some point. Do we know when MS moved in and moved out, or only that he lived there around the time of WM's death?
GPS can be turned off on a smart phone, as can location tracking if you know about it and how to do it. I think those "pings" would still get you though.
http://www.abcactionnews.com/money/consumer/taking-action-for-you/is-your-smartphone-outsmarting-you-and-following-you
JMO