O'Reilly logo

Hiding Behind the Keyboard by John Bair, Brett Shavers

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Chapter 2

The Tor Browser

Abstract

The Onion Router, commonly referred at “Tor” has allowed for practically any person, regardless of technical expertise, to communicate anonymously over the Internet. Tor is not a covert means of Internet use, but rather, anonymizes Tor users in a manner that practically makes tracking or identifying users difficult if not impossible. The effectiveness of Tor is such that attempting to bypass its ability to anonymize traffic is overwhelming. In the context of the forensic analysis, uncovering the Internet communication may not be possible, but the forensic artifacts left behind may be valuable in the forensics investigation.

Keywords

Anonymizing; Anonymous; Communication; Covert; E-mail; Forensic analysis; Internet ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required