The MAC address is also called the physical address and the hardware address. It is burned on the Network Interface Card (a kind of flash memory chip, which can usually be erased and written by the program ) when it is produced by the network equipment manufacturer . Both IP addresses and MAC addresses are represented in binary in the computer. The IP address is 32 bits, while the MAC address is 48 bits .
The length of the MAC address is 48 bits ( 6 bytes ) , usually expressed as 12 hexadecimal numbers, such as: 00-16-EA-AE-3C-40 is a MAC address, of which the first 3 bytes, 16 The hexadecimal number 00-16-EA represents the number of the network hardware manufacturer, which is assigned by the (Institute of Electrical and Electronics Engineers ) , and the last 3 bytes, the hexadecimal number AE-3C-40 represents a certain product made by the manufacturer. The serial number of a network product , such as a network card . As long as you don't change your own MAC address, the MAC address is unique in the world. Figuratively speaking, the MAC address is like the ID number on the ID card, which is unique  .
We all know that the platform can detect the security code, area code, supervision code, mac and other hardware parameters of the mobile phone and PC through IP . We know that the MAC address is unique and cannot be changed, so how to solve it?
We can't change the unique address, but we can camouflage. Today, I will share with you a camouflage scheme. You can use a foreign server to build a secure terminal remotely . IP and server detection can be blocked here . Running through a remote security terminal, the platform can only detect the external network IP and cannot find the hardware parameters of the server. It can be understood as a firewall installed.
Then cooperate with the fingerprint browser (plus a privacy plug-in) to browse and place an order.In this way, there is a real physical configuration, and IP can accurately locate foreign cities, present local users, and effectively block platform detection.