@hazelnoot again it's not really exposed because it's behind a firewall that won't just allow random inbound connections.
Every single router I've ever seen does the following by default: - allow all outgoing connections from LAN - deny all incoming connections to LAN + unless it's a response to a connection initiated by a host inside the LAN + unless it's on a user-defined list of exceptions
The NAT technically obscures the internal IP sometimes but if you care about that, every desktop OS is now capable of generating randomized IPv6 addresses inside your subnet that are rotated as often as every 12 hours in some cases. So the only "persistent" identifier ends up being your subnet prefix which is as much information as an external IPv4 address