Can a notebook be ordered / located if Mullvad Wiregard (England) has been installed on the notebook?

I don’t understand the question.

What do you mean by “ordered” in this context?

What does “England” mean next to Mullvad Wireguard?

You ask about location, but by whom?

Could the police find out where you are?
Mullvad Wireguard

If I were the police and would be interested in this, knowing that the laptop is ordered via Mullvad WireGuard, I’d order Mullvad to disclose you.

only if you give the dealer your zip number. or your ex-girlfriend is more than happy to help.

Okay, I hadn’t thought of that!

Seriously.

There are thousands of ways to identify and track people on the internet. Usernames, mobilenumbers, emailaddresses, tracking-cookies, http-headers like the useragent, browser fingerprinting. The ip-address is just one identifier.

This kind of discussion pops up in this forum every once in a while. It is extremely difficult to use electronic devices and ensure there is no backdoor. You can buy a used laptop at a random flea market or garage sale and still it might be possible that a backdoor is implanted with the next update. You can buy a laptop at a local shop with cash, but there is a reason why US-authorities are only allowed to buy and use special certified laptops which are not available for private individuals.

Known knowns:

  1. internet facing servers get attacked and sometimes pwned, not only from Chinese script kiddies
  2. ISPs get pawned by state agents (a couple of years ago there was a report about a Belgian ISP was pawned by CIA and MI6)
  3. all kind of network equipment like Cisco Routers or Netscaler VPN endpoints are routinely delivered with backdoors (no, compiling a vulnerable, internet-facing binary without stack protection, running as root and reachable without authentication is not negligence)
  4. webforums and internetshops are pawned by state actors and are capable to deliver malware (javascript) in a targeted manner

Known unknowns:

  1. the Tor-Net has always be vulnerable to correlation attacks, but it is unclear to what scale that can be and currently is utilized
  2. we don’t know how many Tor-exit-nodes or how many repositories of open source software are pawned be state-actors
  3. the NSA might have the private GPG keys of Linus Torvalds, Linus Poettering or other maintainers of common binaries without them knowing it
  4. zero-days and root-kits might be more common than generally assumed

Unknown unknowns:

  1. ?

However, most people who break the law (and are therefore concerned with the police) get caught by classical investigation methods. So, your mom might not rat you out, but your ex-girlfriend might.

Shall we add pagers, walkies-talkies and solar panels to this list?

How did you come up with solar panels?

Depending on you threat model all IoT devices including solar panels might allow foothold and lateral movement in your network. Pagers and walkie-talkies do not. Unimpressive example for a successful supply-chain attack, though.

The original post was off-topic, my post was off-topic and yours as well. I wouldn’t mind if the thread gets closed.

Thanks. It was about tracking orders via vpn as I understood. SCA for anyone orders via vpn?
Should we add QR codes to the list?

Would you mind if it’d stay open? Because it’s important people to realize all of the possible outcomes in order to avoid false sense of security?

I would also be in favor of leaving this topic open to everyone!