Many friends will use mobile phones or computers to browse some bad **, but they are afraid of being known by others, this issue**Combined with the Internet access form, principle, and bad ** access mechanism, I will explain to you the knowledge related to it.
Bad browsing**, it will be known by others. The Internet has memory, and the Internet is just a virtual concept, which is essentially composed of multiple servers and clients in series. Although the user's access is bad, it is actually bound to the server, and all this needs to be transferred through the server of the network service provider. Therefore, regardless of whether the user uses the data network of the mobile phone or the broadband network of the computer, as long as the access is bad, it will leave a record, and there is a chance that it will be known and discovered by others. As for whether it will be known or discovered by others, it depends on who the other party is and how they will be inquired or investigated.
The Internet is virtual, no matter what network people access, they need a device, such as a mobile phone, computer, tablet, etc., after this device is connected to the network, there will be a lot of identification, such as broadband number, IP address, MAC address, device identification code, network access license code, etc. Because this information is unique, when it comes to identity and device identification, it can be confirmed through these unique codes, but the other party can't actually know who browsed these**, because the Internet is a person using the device to operate, and what the other party knows is that a person uses a certain device, through a certain network, a certain address to access a certain **. If you want to know who accessed **, you must also determine the identity of the user of the device, and in most cases, without the intervention of the relevant state departments and the participation of hackers, the other party simply knows who "I" is.
It's unrealistic to say that there is no way at all, but the methods that can be used at the moment are to cover their ears and steal the bell. Take the developers of major browsers as an example, people have long launched a private browsing mode, which can hide the user's identity information, including but not limited to networking methods, networking devices, locations, IP addresses, etc., and then access the needs to be accessed through the **server or other similar methods, so as to achieve the purpose of stealth and incognito access. However, this incognito access mode is based on legal and compliant use, and if the user is suspected of violating laws and regulations, once the relevant departments intervene, then this so-called incognito browsing traces can also be queried.
Therefore, unless it is accessed through some extremely special technical means, it is impossible to guarantee 100% that they will not be discovered, but these technical means are not something that ordinary people can learn, even if they spend money to hire someone to get it, the cost is very high, although it is a method, but few people will use it.
Conclusion: According to Article 68 of the Law of the People's Republic of China on Public Security Administration Punishments, it can be determined that if an individual browses badly, it will not be recognized as a crime if it is not disseminated, reproduced, participated, or produced, but if it is known or found by the relevant departments, it may be criticized and educated; If, in the process of browsing, it involves dissemination, reproduction, participation, production, etc., then you will face penalties, ranging from detention or fines to prison sentences.
In addition, color is a knife on the head, and I advise you to do it and cherish it.