Table of Contents
Chapter 1. Laying the Foundation of Covert Communications
A Brief History of Covert Communication
History and Intended Use of The Onion Router
Forensic Analysis of The Onion Router
Used in Combination of Other Tools and Methods
Related Tor Tools and Applications
Chapter 3. Triaging Mobile Evidence
Examples of Logical and Physical Data
Get Hiding Behind the Keyboard now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.