{"id":884,"date":"2019-08-30T20:49:20","date_gmt":"2019-08-30T20:49:20","guid":{"rendered":"https:\/\/live-infoblox-blog.pantheonsite.io\/?p=884"},"modified":"2022-10-19T16:07:58","modified_gmt":"2022-10-19T23:07:58","slug":"ipv6-and-internet-privacy","status":"publish","type":"post","link":"https:\/\/www.infoblox.com\/blog\/ipv6-coe\/ipv6-and-internet-privacy\/","title":{"rendered":"IPv6 and Internet Privacy"},"content":{"rendered":"<h2 id=\"toc-hId--1333129333\">Privacy and the Presence of Pervasive Monitoring<\/h2>\n<p>What comes to mind when you think about the topics of\u00a0<a href=\"https:\/\/en.wikipedia.org\/wiki\/Computer_and_network_surveillance\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">pervasive monitoring<\/a>\u00a0and\u00a0<a href=\"https:\/\/en.wikipedia.org\/wiki\/Mass_surveillance\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">mass surveillance<\/a>?\u00a0 Does your mind immediately conjure up images of the\u00a0<a href=\"https:\/\/en.wikipedia.org\/wiki\/Eye_of_Providence\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">Eye of Providence<\/a>\u00a0or, more popularly, the\u00a0<a href=\"https:\/\/en.wikipedia.org\/wiki\/Sauron\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">Eye of Sauron<\/a>\u00a0from J. R. R. Tolkien\u2019s\u00a0<a href=\"https:\/\/en.wikipedia.org\/wiki\/The_Lord_of_the_Rings\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">The Lord of the Rings<\/a>\u00a0epic saga?\u00a0 There are so many literary references to mysterious ever-watching beings or omniscient technologies such as the telescreen from George Orwell\u2019s book\u00a0<a href=\"https:\/\/en.wikipedia.org\/wiki\/Nineteen_Eighty-Four\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">Nineteen Eighty-Four<\/a>, which, by the way, inspired the\u00a0<a href=\"https:\/\/en.wikipedia.org\/wiki\/Electric_Eye_(song)\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">Judas Priest song Electric Eye<\/a>\u00a0about an eavesdropping satellite!<\/p>\n<p>The people behind the \u201cEyes\u201d on the Internet are most often governments and their law enforcement and intelligence agencies.\u00a0 Corporations are also seeking to gain a greater understanding of the customers who use their products and services.\u00a0 They seek out greater\u00a0<a href=\"https:\/\/en.wikipedia.org\/wiki\/Brand_relationship#Brand_intimacy\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">brand intimacy<\/a>\u00a0and \u201cstickiness\u201d with these customers and leverage customer information for sales and marketing purposes.\u00a0 Other companies collect this information and sell it to other companies that attempt to monetize the data.<\/p>\n<p>On the Internet, not only our web surfing traffic can be inspected, but our\u00a0<a href=\"https:\/\/community.infoblox.com\/t5\/IPv6-CoE-Blog\/DNS-Privacy-in-the-Face-of-Pervasive-Monitoring-Part-1-of-2\/ba-p\/5166\" target=\"_blank\" rel=\"noopener noreferrer\">DNS packets as well<\/a>. \u00a0We can take measures (or rather our browsers and apps most often take them for us) to protect the confidentiality of our web traffic by using\u00a0<a href=\"https:\/\/en.wikipedia.org\/wiki\/Transport_Layer_Security\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">Transport Layer Security (TLS)<\/a>\u00a0encryption and HTTPS.\u00a0 Some may use\u00a0<a href=\"https:\/\/en.wikipedia.org\/wiki\/Tor_(anonymity_network)\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">The Onion Router<\/a>\u00a0(Tor) or use IPsec\/SSL VPN tunnels.\u00a0 When it comes to DNS privacy, there are \u00a0emerging methods, such as\u00a0<a href=\"http:\/\/www.ask-mrdns.com\/2018\/12\/episode-55\/\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">DNS over HTTPS<\/a>\u00a0(DoH) for\u00a0<a href=\"https:\/\/community.infoblox.com\/t5\/IPv6-CoE-Blog\/IETF-Proposed-Solutions-for-Improved-DNS-Privacy-Part-2-of-2\/ba-p\/5472#M122\" target=\"_blank\" rel=\"noopener noreferrer\">preserving the confidentiality of DNS queries and responses<\/a>.<\/p>\n<h2><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-894\" src=\"https:\/\/live-infoblox-blog.pantheonsite.io\/wp-content\/uploads\/threatindexblog.jpg\" alt=\"IPv6 and Internet Privacy\" width=\"660\" height=\"454\" srcset=\"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/threatindexblog.jpg 660w, https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/threatindexblog-300x206.jpg 300w\" sizes=\"auto, (max-width: 660px) 100vw, 660px\" \/><\/h2>\n<h2 id=\"toc-hId--445625652\">Anonymity for Nefarious IPv4 Internet Behavior<\/h2>\n<p>Over the past two decades, the Internet has become much more densely populated.\u00a0 Public\u00a0<a href=\"https:\/\/community.infoblox.com\/t5\/IPv6-CoE-Blog\/North-America-s-IPv4-Address-Shortage\/ba-p\/3503\" target=\"_blank\" rel=\"noopener noreferrer\">IPv4 address exhaustion occurred years ago<\/a>, but\u00a0<a href=\"https:\/\/blog.apnic.net\/2017\/09\/06\/opinion-defence-nats\/\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">thanks to Network Address Translation (NAT)<\/a>\u00a0and protocols like HTTP that cooperate with NATs, the Internet continues to work.\u00a0 As service providers have felt the sting of limited public IPv4 addresses for subscribers, they have had to resort to using\u00a0<a href=\"https:\/\/en.wikipedia.org\/wiki\/Carrier-grade_NAT\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">Carrier-Grade-NAT<\/a>\/<a href=\"https:\/\/www.networkworld.com\/article\/2231905\/cisco-subnet\/large-scale-nat-architectures.html\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">Large-Scale-NAT<\/a>\u00a0(CGN\/LSN) systems to provide continued operation and facilitate future growth.<\/p>\n<p>NAT and web proxies have allowed clients on private networks to access Internet resources while preserving some of their anonymity.\u00a0 This use of multiple layers of NAT has caused\u00a0<a href=\"https:\/\/community.infoblox.com\/t5\/IPv6-CoE-Blog\/IPv4-Addresses-are-Only-Locally-Significant\/ba-p\/15365\" target=\"_blank\" rel=\"noopener noreferrer\">IPv4 addresses to become increasingly localized<\/a>.\u00a0 Multiple layers of NAT have also created \u201cinvisible\u201d places and provided added anonymity to not only legitimate users of the Internet but malicious actors as well.\u00a0 In John Curran\u2019s (President and CEO of ARIN) presentation at the 2017 North American IPv6 Summit titled \u201c<a class=\" bf_ungated_init\" href=\"https:\/\/www.rmv6tf.org\/wp-content\/uploads\/2017\/04\/02-NA-IPv6-Summit-2017-jcurran-1.pdf\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">The future of the Internet, IPv6, and the long tail<\/a>\u201d he commented on how other\u00a0<a href=\"https:\/\/youtu.be\/p_HbX-batjs?t=1946\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">non-technical users are afraid of the Internet<\/a>.\u00a0 John\u00a0<a href=\"http:\/\/astercrash.tumblr.com\/post\/157419046864\/did-anyone-notice-how-quickly-the-internet-turned\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">quoted a poem<\/a>\u00a0eloquently articulating these fears of the Internet.<\/p>\n<p>These NATs provide anonymity for attackers and have made\u00a0<a href=\"https:\/\/www.internetsociety.org\/blog\/2018\/03\/cgn-ipv6-fighting-online-crime\/\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">fighting online crime more difficult<\/a>.\u00a0\u00a0<a href=\"https:\/\/www.europol.europa.eu\/newsroom\/news\/are-you-sharing-same-ip-address-criminal-law-enforcement-call-for-end-of-carrier-grade-nat-cgn-to-increase-accountability-online\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">Europol has called for an end of CGN<\/a>\u00a0to increase accountability online.\u00a0 Service providers that have implemented CGN\/LSN systems have struggled to perform\u00a0<a href=\"https:\/\/en.wikipedia.org\/wiki\/Lawful_interception\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">Lawful Interception<\/a>\u00a0(LI) as required by Law Enforcement Agencies (LEAs) as well as legislation like the\u00a0<a href=\"https:\/\/en.wikipedia.org\/wiki\/Communications_Assistance_for_Law_Enforcement_Act\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">Communications Assistance for Law Enforcement Act<\/a>\u00a0(CALEA).\u00a0 Even enterprises have difficulty\u00a0<a href=\"http:\/\/www.internetsociety.org\/deploy360\/blog\/2017\/03\/the-network-forensics-problem-of-ipv4\/\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">performing cybersecurity forensics<\/a>\u00a0when there are multiple levels of NAT taking place.<\/p>\n<h2 id=\"toc-hId-441878029\">IPv6: Globally Unique Addresses Without NAT<\/h2>\n<p>The primary advantage IPv6 has over IPv4 is its large 128-bit address space, which creates sufficient globally-unique addresses and removes the requirement for NAT.\u00a0 IPv6 was designed to restore the end-to-end model of Internet communications with all nodes on networks using globally unique addresses.\u00a0 Considering this, it\u2019s tempting to conclude that IPv6 might provide a greater degree of authenticity for identifying who or what is connecting to the Internet.\u00a0 However,\u00a0<a href=\"https:\/\/www.cisco.com\/c\/en\/us\/about\/press\/internet-protocol-journal\/back-issues\/table-contents-59\/161-address.html\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">organizations should be cautioned against trying to use an IPv6 address as an authentication factor<\/a>.<\/p>\n<p>IPv6 has the potential to change how organizations observe user behavior on the Internet or in private corporate networks.\u00a0 If organizations are observing IPv4 network traffic, they are not seeing the \u201cwhole picture\u201d and thus lack situational awareness.\u00a0 The \u201cclient\u201d IPv4 address observed by the Internet service is actually from a service provider\u2019s NAT pool, or the external IP address of the enterprise perimeter firewall.\u00a0 If the\u00a0<a href=\"https:\/\/www.networkworld.com\/article\/2228021\/cisco-subnet-ipv4-reputation-filtering-not-a-long-term-solution.html\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">web service is using reputation filtering<\/a>\u00a0and the client happens to use a bad IPv4 address in the NAT pool, then the legitimate connection could be dropped.<\/p>\n<p>One of the advantages of using IPv6 that appeals to content providers is that they get greater visibility of user or customer behavior on the Internet.\u00a0 The \u201cclient\u201d IPv6 address observed by the Internet service is the actual global address currently assigned to the source of the connection.\u00a0 However, while the IPv6 prefix of the client\u2019s subnet is stable, when using\u00a0<a href=\"https:\/\/tools.ietf.org\/html\/rfc8415\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">DHCPv6<\/a>\u00a0or temporary addresses, the last 64-bits of the IPv6 address\u2014the Interface Identifier (IID)&#8211;is subject to change over time.<\/p>\n<p>Social media companies could be using both IPv4 and IPv6 to give them visibility to the broadest population of their users.\u00a0 Using IPv6 gives them global visibility and IPv6 allows them insights into portions of the network that have traditionally been hidden from view behind NATs.\u00a0 The social media company would know more precisely the IPv6 prefix that the client uses and could more accurately traceback to the client\u2019s source, than when they are using IPv4 with NAT.<\/p>\n<p>Retail organizations are tracking customer location within their stores based on Wi-Fi or Bluetooth signals from their mobile devices.\u00a0 They track dwell times and then use the data gathered to optimize showroom and store layout based on the most popular products.\u00a0 The company that offers those free Internet services or makes that free mobile app receives something in return for your usage of their application.\u00a0 They get the ability to gather information about your usage and online behavior with both the client\u2019s NAT\u2019ed IPv4 address and its global IPv6 address.<\/p>\n<p>Many consumers are not aware that their mobile devices already have IPv6 enabled and that many of their communications are already utilizing IPv6.\u00a0 When mobile phones are using global IPv6 addresses, but private IPv4 addresses, then using IPv6 allows for greater knowledge of the user\u2019s location.\u00a0 This information can be used for the purpose of creating greater customer intimacy and value or for tracking behavior. \u00a0However, it should be noted that this is not unique to IPv6. \u00a0Websites have been using cookies and other tracking methods for years to understand who the user is, regardless of what network a device currently is on. \u00a0IPv6 simply provides another unique data point for them to gather.<\/p>\n<p>When it comes to service providers, IPv6 primarily provides them a way to scale their networks beyond the limitations and scarcity of IPv4 addresses.\u00a0 However, with IPv4, the number of devices within a residence is unknown to them because the residential broadband gateway performs NAT.\u00a0 There could be anywhere from one to one hundred IPv4 devices in the home, but the ISP or the online retailer cannot determine the actual device information.\u00a0 However, if the residential service used global IPv6 addresses, then the ISP would absolutely know how many devices are in the home.\u00a0 IPv6 would make their\u00a0<a href=\"https:\/\/en.wikipedia.org\/wiki\/Communications_Assistance_for_Law_Enforcement_Act\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">CALEA<\/a>\u00a0responsibilities much easier while still providing the same service and access they provide today.<\/p>\n<h2 id=\"toc-hId-1329381710\">Hiding in the Vastness of IPv6<\/h2>\n<p>We are also aware that the vastness of the IPv6 address space is one of the security advantages of using IPv6.\u00a0 Not only are IPv6 prefixes sparsely utilized out of blocks of addresses allocated to organizations by RIRs, but the those \/64 prefixes are extremely sparely populated by nodes (i.e., tens or hundreds or even thousands out of 18,446,744,073,709,551,616 addresses).\u00a0 IPv6 nodes can (and typically do) use\u00a0<a href=\"https:\/\/tools.ietf.org\/html\/rfc4941\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">privacy extensions<\/a>\u00a0(RFC 4941) to prevent any tracking of their burned-in MAC address(es), which are easily readable in the original\u00a0<a href=\"https:\/\/en.wikipedia.org\/wiki\/IPv6_address#Modified_EUI-64\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">modified EUI-64 interface identifier<\/a>\u00a0format.\u00a0 But some organizations didn\u2019t want that much privacy for users so\u00a0<a href=\"https:\/\/tools.ietf.org\/html\/rfc8064\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">stable IPv6 interface identifiers<\/a>\u00a0(RFC 8064) were developed.<\/p>\n<p>Attackers can change their IPv6 addresses frequently when they are on a network.\u00a0 This is similar to how malicious sites perform \u201c<a href=\"https:\/\/en.wikipedia.org\/wiki\/Fast_flux\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">fast-flux<\/a>\u201d, which they accomplish by changing their IP addresses frequently to avoid being picked up and placed onto block lists and poor-reputation lists.\u00a0 Systems like the\u00a0<a href=\"https:\/\/vtechworks.lib.vt.edu\/handle\/10919\/24697\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">Moving Target IPv6 Defense<\/a>\u00a0(MT6D) developed at\u00a0<a href=\"https:\/\/security.vt.edu\/about\/security_lab\/current_research.html\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">Virginia Tech<\/a>\u00a0show how rapidly-changing IPv6 addresses can help avoid detection.\u00a0 Companies Like\u00a0<a href=\"https:\/\/www.morphisec.com\/\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">Morphisec<\/a>\u00a0see these techniques as a security protection measure.\u00a0 People are also considering how using the vastness of\u00a0<a href=\"https:\/\/blog.benjojo.co.uk\/post\/tor-onions-to-v6-with-iptables-proxy\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">IPv6 can improve the anonymity provided by Tor<\/a>.<\/p>\n<p>Even within IPv6 networks, identifying the IPv6 address of a bad actor can be difficult.\u00a0 Enterprises perform proactive monitoring to learn what devices are connected to their networks.\u00a0 IPv6 changes network reconnaissance and how organizations\u00a0<a href=\"https:\/\/community.infoblox.com\/t5\/IPv6-CoE-Blog\/IPv6-Security-Vulnerability-Scanning\/ba-p\/7680\" target=\"_blank\" rel=\"noopener noreferrer\">perform vulnerability scanning<\/a>. \u00a0In general,\u00a0<a href=\"https:\/\/community.infoblox.com\/t5\/IPv6-CoE-Blog\/Geolocation-with-IPv6\/ba-p\/11752\" target=\"_blank\" rel=\"noopener noreferrer\">IPv6 geolocation is not as accurate<\/a>\u00a0as IPv4 geolocation.\u00a0 There is an IETF draft titled \u201c<a href=\"https:\/\/tools.ietf.org\/html\/draft-daveor-ipv6-crime-attribution-00\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">Analysis of the Crime Attribution Characteristics of Various IPv6 Address Assignment Techniques<\/a>\u201d, which covers the methods of identifying a malicious actor using IPv6.<\/p>\n<p>It is still possible to spoof the source address of IPv6 packets and send them off into the Internet towards an unwitting target.\u00a0 As organizations proceed to deploy IPv6, they should follow the best practices found in the IETF document\u00a0<a href=\"https:\/\/tools.ietf.org\/html\/bcp38\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">BCP 38<\/a>, which advocates ingress and egress filtering at the Internet perimeter.<\/p>\n<h2 id=\"toc-hId--2078081905\">Conclusions About IPv6 Internet Visibility<\/h2>\n<p>As with IPv4, there is no inherent security built into IPv6.\u00a0 Spam,\u00a0<a href=\"https:\/\/community.infoblox.com\/t5\/IPv6-CoE-Blog\/IPv6-DDoS-and-Protection-Measures\/ba-p\/12830\" target=\"_blank\" rel=\"noopener noreferrer\">DDoS attacks<\/a>, and botnets are still present on the IPv6 Internet.\u00a0 Even though NAT is not recommended and is typically not used with IPv6, you can still have web proxies that perform a NAT-like function.\u00a0 There are firewall manufacturers that list NAT66 and\u00a0<a href=\"https:\/\/tools.ietf.org\/html\/rfc6296\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">NPTv6<\/a>\u00a0on their product specifications.\u00a0 Bad actors can hide within the vastness of the IPv6 address space, changing their addresses frequently to avoid discovery.<\/p>\n<p>If your organization wants to gather more information about your customers, your subscribers, your vendors, and your partners, then you will want use both IPv4 and IPv6 for greater insights.\u00a0 What you do with that information is up to you, but consider using this valuable data responsibly. As Google used to say, \u201c<a href=\"https:\/\/en.wikipedia.org\/wiki\/Don%27t_be_evil\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">Don\u2019t be evil<\/a>\u201d.<\/p>\n<p>Scott Hogg\u00a0<a href=\"https:\/\/twitter.com\/scotthogg\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">(@ScottHogg<\/a>) is CTO of\u00a0<a href=\"https:\/\/hexabuild.io\/\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">HexaBuild.io<\/a>, an IPv6 consulting and training company.\u00a0 Scott is Chair Emeritus of the Rocky Mountain IPv6 Task Force (<a href=\"https:\/\/www.rmv6tf.org\/\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">RMv6TF<\/a>) and authored the Cisco Press book on\u00a0<a href=\"http:\/\/www.ciscopress.com\/store\/ipv6-security-9781587055942\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">IPv6 Security<\/a>.\u00a0 Follow HexaBuild on\u00a0<a href=\"https:\/\/twitter.com\/hexabuild\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">Twitter<\/a>\u00a0and\u00a0<a href=\"https:\/\/www.linkedin.com\/company\/hexabuild\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">LinkedIn<\/a>.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Privacy and the Presence of Pervasive Monitoring What comes to mind when you think about the topics of\u00a0pervasive monitoring\u00a0and\u00a0mass surveillance?\u00a0 Does your mind immediately conjure up images of the\u00a0Eye of Providence\u00a0or, more popularly, the\u00a0Eye of Sauron\u00a0from J. R. R. Tolkien\u2019s\u00a0The Lord of the Rings\u00a0epic saga?\u00a0 There are so many literary references to mysterious ever-watching beings [&hellip;]<\/p>\n","protected":false},"author":321,"featured_media":894,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"inline_featured_image":false,"_genesis_hide_title":false,"_genesis_hide_breadcrumbs":false,"_genesis_hide_singular_image":false,"_genesis_hide_footer_widgets":false,"_genesis_custom_body_class":"","_genesis_custom_post_class":"","_genesis_layout":"","footnotes":""},"categories":[17],"tags":[56,38,31,39,15],"class_list":{"0":"post-884","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-ipv6-coe","8":"tag-ipv4","9":"tag-ipv6","10":"tag-networking","11":"tag-protocols","12":"tag-security","13":"entry"},"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.3 (Yoast SEO v27.3) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>IPv6 and Internet Privacy<\/title>\n<meta name=\"description\" content=\"Inherent security is not built into IPv6, but precautions can be taken. Companies should use IPv4 and IPv6 for privacy. Learn how your company can do so here.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.infoblox.com\/blog\/ipv6-coe\/ipv6-and-internet-privacy\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"IPv6 and Internet Privacy\" \/>\n<meta property=\"og:description\" content=\"Inherent security is not built into IPv6, but precautions can be taken. Companies should use IPv4 and IPv6 for privacy. Learn how your company can do so here.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.infoblox.com\/blog\/ipv6-coe\/ipv6-and-internet-privacy\/\" \/>\n<meta property=\"og:site_name\" content=\"Infoblox Blog\" \/>\n<meta property=\"article:published_time\" content=\"2019-08-30T20:49:20+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2022-10-19T23:07:58+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/threatindexblog.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"660\" \/>\n\t<meta property=\"og:image:height\" content=\"454\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Scott Hogg\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Scott Hogg\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"9 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/ipv6-coe\\\/ipv6-and-internet-privacy\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/ipv6-coe\\\/ipv6-and-internet-privacy\\\/\"},\"author\":{\"name\":\"Scott Hogg\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/person\\\/ee71ac61fe2ea349f6e991e628d22f4c\"},\"headline\":\"IPv6 and Internet Privacy\",\"datePublished\":\"2019-08-30T20:49:20+00:00\",\"dateModified\":\"2022-10-19T23:07:58+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/ipv6-coe\\\/ipv6-and-internet-privacy\\\/\"},\"wordCount\":1719,\"publisher\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/ipv6-coe\\\/ipv6-and-internet-privacy\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/threatindexblog.jpg\",\"keywords\":[\"IPv4\",\"IPv6\",\"Networking\",\"Protocols\",\"Security\"],\"articleSection\":[\"IPv6 CoE\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/ipv6-coe\\\/ipv6-and-internet-privacy\\\/\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/ipv6-coe\\\/ipv6-and-internet-privacy\\\/\",\"name\":\"IPv6 and Internet Privacy\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/ipv6-coe\\\/ipv6-and-internet-privacy\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/ipv6-coe\\\/ipv6-and-internet-privacy\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/threatindexblog.jpg\",\"datePublished\":\"2019-08-30T20:49:20+00:00\",\"dateModified\":\"2022-10-19T23:07:58+00:00\",\"description\":\"Inherent security is not built into IPv6, but precautions can be taken. Companies should use IPv4 and IPv6 for privacy. Learn how your company can do so here.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/ipv6-coe\\\/ipv6-and-internet-privacy\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/ipv6-coe\\\/ipv6-and-internet-privacy\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/ipv6-coe\\\/ipv6-and-internet-privacy\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/threatindexblog.jpg\",\"contentUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/threatindexblog.jpg\",\"width\":660,\"height\":454,\"caption\":\"IPv6 and Internet Privacy\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/ipv6-coe\\\/ipv6-and-internet-privacy\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"IPv6 CoE\",\"item\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/category\\\/ipv6-coe\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"IPv6 and Internet Privacy\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/\",\"name\":\"infoblox.com\\\/blog\\\/\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#organization\",\"name\":\"Infoblox\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/infoblox-logo-2.svg\",\"contentUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/infoblox-logo-2.svg\",\"width\":137,\"height\":30,\"caption\":\"Infoblox\"},\"image\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/person\\\/ee71ac61fe2ea349f6e991e628d22f4c\",\"name\":\"Scott Hogg\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/blogs.infoblox.com\\\/wp-content\\\/uploads\\\/avatar_user_321_1574118215-96x96.jpg\",\"url\":\"https:\\\/\\\/blogs.infoblox.com\\\/wp-content\\\/uploads\\\/avatar_user_321_1574118215-96x96.jpg\",\"contentUrl\":\"https:\\\/\\\/blogs.infoblox.com\\\/wp-content\\\/uploads\\\/avatar_user_321_1574118215-96x96.jpg\",\"caption\":\"Scott Hogg\"},\"description\":\"Scott Hogg has 30 years of network and security experience and is president of Hogg Networking with. Scott Hogg specializes in teaching Internet Protocol version 6 (IPv6) and providing implementation guidance. Scott is CCIE #5133 (Emeritus) and CISSP #4610. Scott is Chair Emeritus of the Rocky Mountain IPv6 Task Force (RMv6TF), a member of the IPv6 Center of Excellence (COE), and co-author of the Cisco Press book on IPv6 Security.\",\"sameAs\":[\"https:\\\/\\\/hexabuild.io\"],\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/author\\\/scott-hogg\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"IPv6 and Internet Privacy","description":"Inherent security is not built into IPv6, but precautions can be taken. Companies should use IPv4 and IPv6 for privacy. Learn how your company can do so here.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.infoblox.com\/blog\/ipv6-coe\/ipv6-and-internet-privacy\/","og_locale":"en_US","og_type":"article","og_title":"IPv6 and Internet Privacy","og_description":"Inherent security is not built into IPv6, but precautions can be taken. Companies should use IPv4 and IPv6 for privacy. Learn how your company can do so here.","og_url":"https:\/\/www.infoblox.com\/blog\/ipv6-coe\/ipv6-and-internet-privacy\/","og_site_name":"Infoblox Blog","article_published_time":"2019-08-30T20:49:20+00:00","article_modified_time":"2022-10-19T23:07:58+00:00","og_image":[{"width":660,"height":454,"url":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/threatindexblog.jpg","type":"image\/jpeg"}],"author":"Scott Hogg","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Scott Hogg","Est. reading time":"9 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.infoblox.com\/blog\/ipv6-coe\/ipv6-and-internet-privacy\/#article","isPartOf":{"@id":"https:\/\/www.infoblox.com\/blog\/ipv6-coe\/ipv6-and-internet-privacy\/"},"author":{"name":"Scott Hogg","@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/person\/ee71ac61fe2ea349f6e991e628d22f4c"},"headline":"IPv6 and Internet Privacy","datePublished":"2019-08-30T20:49:20+00:00","dateModified":"2022-10-19T23:07:58+00:00","mainEntityOfPage":{"@id":"https:\/\/www.infoblox.com\/blog\/ipv6-coe\/ipv6-and-internet-privacy\/"},"wordCount":1719,"publisher":{"@id":"https:\/\/www.infoblox.com\/blog\/#organization"},"image":{"@id":"https:\/\/www.infoblox.com\/blog\/ipv6-coe\/ipv6-and-internet-privacy\/#primaryimage"},"thumbnailUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/threatindexblog.jpg","keywords":["IPv4","IPv6","Networking","Protocols","Security"],"articleSection":["IPv6 CoE"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.infoblox.com\/blog\/ipv6-coe\/ipv6-and-internet-privacy\/","url":"https:\/\/www.infoblox.com\/blog\/ipv6-coe\/ipv6-and-internet-privacy\/","name":"IPv6 and Internet Privacy","isPartOf":{"@id":"https:\/\/www.infoblox.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.infoblox.com\/blog\/ipv6-coe\/ipv6-and-internet-privacy\/#primaryimage"},"image":{"@id":"https:\/\/www.infoblox.com\/blog\/ipv6-coe\/ipv6-and-internet-privacy\/#primaryimage"},"thumbnailUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/threatindexblog.jpg","datePublished":"2019-08-30T20:49:20+00:00","dateModified":"2022-10-19T23:07:58+00:00","description":"Inherent security is not built into IPv6, but precautions can be taken. Companies should use IPv4 and IPv6 for privacy. Learn how your company can do so here.","breadcrumb":{"@id":"https:\/\/www.infoblox.com\/blog\/ipv6-coe\/ipv6-and-internet-privacy\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.infoblox.com\/blog\/ipv6-coe\/ipv6-and-internet-privacy\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.infoblox.com\/blog\/ipv6-coe\/ipv6-and-internet-privacy\/#primaryimage","url":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/threatindexblog.jpg","contentUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/threatindexblog.jpg","width":660,"height":454,"caption":"IPv6 and Internet Privacy"},{"@type":"BreadcrumbList","@id":"https:\/\/www.infoblox.com\/blog\/ipv6-coe\/ipv6-and-internet-privacy\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.infoblox.com\/blog\/"},{"@type":"ListItem","position":2,"name":"IPv6 CoE","item":"https:\/\/www.infoblox.com\/blog\/category\/ipv6-coe\/"},{"@type":"ListItem","position":3,"name":"IPv6 and Internet Privacy"}]},{"@type":"WebSite","@id":"https:\/\/www.infoblox.com\/blog\/#website","url":"https:\/\/www.infoblox.com\/blog\/","name":"infoblox.com\/blog\/","description":"","publisher":{"@id":"https:\/\/www.infoblox.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.infoblox.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.infoblox.com\/blog\/#organization","name":"Infoblox","url":"https:\/\/www.infoblox.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/infoblox-logo-2.svg","contentUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/infoblox-logo-2.svg","width":137,"height":30,"caption":"Infoblox"},"image":{"@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/person\/ee71ac61fe2ea349f6e991e628d22f4c","name":"Scott Hogg","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/blogs.infoblox.com\/wp-content\/uploads\/avatar_user_321_1574118215-96x96.jpg","url":"https:\/\/blogs.infoblox.com\/wp-content\/uploads\/avatar_user_321_1574118215-96x96.jpg","contentUrl":"https:\/\/blogs.infoblox.com\/wp-content\/uploads\/avatar_user_321_1574118215-96x96.jpg","caption":"Scott Hogg"},"description":"Scott Hogg has 30 years of network and security experience and is president of Hogg Networking with. Scott Hogg specializes in teaching Internet Protocol version 6 (IPv6) and providing implementation guidance. Scott is CCIE #5133 (Emeritus) and CISSP #4610. Scott is Chair Emeritus of the Rocky Mountain IPv6 Task Force (RMv6TF), a member of the IPv6 Center of Excellence (COE), and co-author of the Cisco Press book on IPv6 Security.","sameAs":["https:\/\/hexabuild.io"],"url":"https:\/\/www.infoblox.com\/blog\/author\/scott-hogg\/"}]}},"_links":{"self":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts\/884","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/users\/321"}],"replies":[{"embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/comments?post=884"}],"version-history":[{"count":6,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts\/884\/revisions"}],"predecessor-version":[{"id":8099,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts\/884\/revisions\/8099"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/media\/894"}],"wp:attachment":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/media?parent=884"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/categories?post=884"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/tags?post=884"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}