Please enable JavaScript.
Coggle requires JavaScript to display documents.
Cybercrime Investigation (S2: Similarity-preserving hash functions (SPEC),âŠ
Cybercrime Investigation
-
-
S2: Network Anonymity
-
Privacy: Privacy is not to hide this information, but to protect and verify who has access to what information
-
-
Forensics and Anonymity
-
-
Forensics on Tor
Traffic Flow Correlation: deanonymize through time/data volume, by monitoring traffic going out and into a network. The information can be correlated, and if a pattern is recognized multiple times it can be said with high probability that one particular user is communicating with the other party.
-
-
-
-
-
-
Forensics Using Tor
Browsing
Tor Browser
-
-
Tails
-
-
-
-
-
Nothing written to disk, unless requested
-
-
-
-
-
-
-
-