๐ŸŒŒ
Privacy Village Academy
Join The Community!AcademyAbout HGPE
  • Hitchhiker's Guide to Privacy Engineering
    • โ“What is HGPE?
      • โš–๏ธWho is this for?
      • ๐Ÿง™โ€โ™‚๏ธPrivacy Engineering
      • ๐ŸŽจCreative Privacy
      • ๐Ÿ”ฎGenerative AI
      • ๐Ÿง‘โ€๐Ÿ’ปAbout the Author
  • ๐Ÿง™โ€โ™‚๏ธThe Ethical AI Governance Playbook 2025 Edition
    • ๐Ÿค–Chapter 1 : AI Literacy
    • ๐ŸŒChapter 2 : AI Governance in the 21st Century
    • โŒ›Chapter 3 - Getting Started with AI Act Compliance
    • ๐Ÿš€Chapter 4 : Rise of AI Governance: Building Ethical & Compliant AI
    • Chapter 5 : Introduction to the Lifecycle of AI
  • ๐ŸŽ“Privacy Engineering Field Guide Season 1
    • โ“Decoding the Digital World: Exploring Everyday Technology
    • ๐Ÿ‘๏ธIntroduction: Why Privacy Matters?
      • Age of Mass Surveillance
      • Privacy & Democracy
      • Privacy & Government Surveillance
    • โšกChapter 1 : How Computers Work?
      • Electricity
      • Bits
      • Logic Gates
      • Central Processing Unit (CPU)
      • Graphic Processing Unit (GPU)
      • Motherboard
      • Data Storage
      • Databases
      • Operating System (OS)
      • Computer Code
      • Programming Languages
      • The File System
      • Bugs and Errors
      • Computer Virus
      • Internet of Things (IoT)
      • Cloud Computing
    • ๐Ÿ›ฐ๏ธChapter 2 : How the internet works?
      • Physical Infrastructure
      • Network and Protocols
      • Switch
      • Routers
      • IP Address
      • Domain Name System (DNS)
      • Mac Address
      • TCP / IP
      • OSI Model
      • Packets
      • The Client - Server Architecture
      • Secure Socket Shell (SSH)
      • Transport Layer Security (TLS)
      • Firewall
      • Tunnels and VPNs
      • Proxy Server
    • ๐Ÿ–ฅ๏ธChapter 3 : How Websites Work?
      • HTML
      • CSS
      • Javascript
      • Web Server
      • Browser
      • HTTP
      • Databases
      • Front End (Client Side)
      • Back End (Server Side)
      • Cookies
      • Local Storage
      • Session Storage
      • IndexedDB
      • XHR Requests
      • Web APIs
      • Webhooks
      • Email Server
      • HTTPS
      • Web Application Firewall
      • Single Sign-on (SS0)
      • OAuth 2.0
      • Pixels
      • Canvas Fingerprinting
      • Email Tracking
      • Containers
      • CI/CD
      • Kubernetes
      • Serverless Architecture
    • โš›๏ธChapter 4 : How Quantum Computers Work?
      • Quantum Properties
      • Quantum Bits (Qubits)
      • Decoherence
      • Quantum Circuits
      • Quantum Algorithms
      • Quantum Sensing
      • Post-Quantum Cryptography
    • ๐Ÿ“ณChapter 5 : Mobile Apps and Privacy
      • Battery
      • Processor
      • Mobile Operating Systems
      • Mobile Data Storage
      • Cellular Data
      • Mobile Device Sensors
      • Wireless Connectivity
      • Camera & Microphone
      • Mobile Apps
      • Software Development Kits (SDKs)
      • Mobile Device Identifiers
      • Bring Your Own Device (BYOD)
  • ๐Ÿ•ต๏ธโ€โ™‚๏ธPrivacy Engineering Field Guide Season 2
    • โ“Introduction to Privacy Engineering for Non-Techs
      • ๐ŸŽญChapter 1 : Digital Identities
        • What is identity?
        • Authentication Flows
        • Authentication vs. Authorization
        • OAuth 2.0
        • OpenID Connect (OIDC)
        • Self Sovereign Identities
        • Decentralized Identifiers
        • eIDAS
      • ๐Ÿ‘๏ธโ€๐Ÿ—จ๏ธChapter 2 : De-Identification
        • Introduction to De-Identification?
        • Input / Output Privacy
        • De-identification Strategies
        • K-Anonymity
        • Differential Privacy
        • Privacy Threat Modeling
  • ๐Ÿ“–HGPE Story and Lore
    • ๐ŸชฆChapter 1 : The Prologue
    • โ˜„๏ธChapter 2 : Battle for Earth
    • ๐Ÿฆ Chapter 3 : A Nightmare To Remember
    • ๐Ÿง™โ€โ™‚๏ธChapter 4 : The Academy
    • ๐ŸŒƒChapter 5: The Approaching Darkness
    • โš”๏ธChapter 6 : The Invasion
    • ๐ŸฐChapter 7 : The Fall of the Academy
    • ๐Ÿ›ฉ๏ธChapter 8 : The Escape
    • ๐ŸชChapter 9 : The Moon Cave
    • ๐Ÿฆ‡Chapter 10: Queen of Darkness
  • ๐Ÿ“บVideos, Audio Book and Soundtracks
    • ๐ŸŽงReading Episodes
    • ๐ŸŽนSoundtracks
  • ๐Ÿ‘พHGPE Privacy Games and Challenges
    • ๐ŸŽฎData Privacy Day'23 / Privacy Treasure Hunt Game
    • ๐ŸงฉPrivacy Quest
  • ๐Ÿ“ฌSubscribe Now!
Powered by GitBook
On this page
  • What is an IP Address?
  • How does it work?
  • IP Address and Privacy

Was this helpful?

  1. Privacy Engineering Field Guide Season 1
  2. Chapter 2 : How the internet works?

IP Address

IP addresses are used at layer 3, which means computers and devices all over the Internet use IP addresses for sending and receiving data, no matter which network they are connected to.

What is an IP Address?

An IP address is like a digital fingerprint for your computer or device. It's a unique identifier that allows other devices on the internet to find and communicate with you.

It's like the address of your house, telling people where to send their mail or visit you in person, but in the digital world.

IP addresses are made up of a series of numbers separated by periods, like 192.168.1.1. Each number represents a different part of the address, and together they form a unique code that identifies your device on the internet.

How does it work?

Internet Protocol address (IP) is a Layer 3 address for computers, which allows computers in different networks to easily find each other.

So you can send a ping to an IP address right from your terminal to start a connection with them.

Let's form a connection with NASA with their IP address using our terminal. Open your terminal using:

Press Command + Space Bar on your Mac keyboard (alternatively, press F4) Type in โ€œTerminalโ€ When you see Terminal in the Spotlight search list, click it to open the app.

Last login: Fri Oct 28 18:22:15 on ttys00
mertcanboyar@Merts-MacBook-Air ~ % ping 198.116.4.189
PING 198.116.4.189 (198.116.4.189): 56 data bytes
Request timeout for icmp_seq 0
Request timeout for icmp_seq 1
Request timeout for icmp_seq 2
Request timeout for icmp_seq 3
Request timeout for icmp_seq 4
Request timeout for icmp_seq 50

IP stands for โ€œInternet Protocolโ€, including IPv4 and IPv6. All IP packets include their source and destination IP addresses in their headers, just as a piece of mail has a destination address and a return address.

IP addresses are used at layer 3, which means computers and devices all over the Internet use IP addresses for sending and receiving data, no matter which network they are connected to.

Layer 3 is where you can also find routers in the galaxy, that look for the most efficient communication pathways for packets also known as payload.

IP Address and Privacy

An IP address actually can tell us much. Looking up an IP address, you will get the following information. ๐Ÿ‘‡

๐Ÿณ The name of the country to which the IP address belongs.

๐ŸŒ‰ The name of the city to which the IP address belongs.

๐Ÿ›ฐ Galactic Internet Service Provider, abbreviated ISP, refers to the company that provides Internet services. Usually, large telecom companies will also serve as Internet providers.

๐Ÿงพ The service domain name registered by the galactic Internet service provider;

๐Ÿ—บ Longitude and latitude of the city.

โฐ The time zone of the region to which the IP belongs.

โšก๏ธ Things like network speed DSL, broadband, cable, and fiber.
PreviousRoutersNextDomain Name System (DNS)

Last updated 2 years ago

Was this helpful?

๐ŸŽ“
๐Ÿ›ฐ๏ธ
Lilith, the queen of darkness was believed to be one of the soldiers in the machine capital during the incident. She is the pinnacle of mutation, a sentient servant of the Dark Entity. Many believe she is the first one to become a puppet of the dark master. Yet they are mistaken, as Lilith is far superior being than any of the mindless space zombies and cyborgs spawned after the incident. Anatomy of a Cyborg, Book of Doctor Talia, 2234
Page cover image