Web browsers are commonly used to access the internet from various platforms. In light of recent digital security incidents and data breaches, users are becoming more aware of the potential threats posed by malicious actors who may gain access to personal data or exploit vulnerabilities in applications, putting their data at risk. In response to these concerns, privacy-preserving solutions are being offered to enhance trust maturity.
The Tor browser, also known as the onion router, is one such application that not only focuses on privacy preservation but also offers significant anonymity. Due to its anonymity features, many users utilize the Tor browser for regular internet activities, as well as potentially malicious actions. To assess the validity of the claims regarding the Tor browser’s privacy and anonymity, we conducted various scenarios to forensically analyze its performance. The findings indicate that the Tor browser leaves numerous sensitive digital artifacts on the host machine, posing potential risks to user data. This information is crucial for digital forensic investigators and researchers seeking to understand the implications of using the Tor browser.
Forensic Science International, 299 (2019) 59-73. doi:10.1016/j.forsciint.2019.03.030
Download
See also
- Software Exorcism: A Handbook for Debugging and Optimizing Legacy Code by Bill Blunden (2003)
- Hormones and the Endocrine System: Textbook of Endocrinology by Bernhard Kleine (2016)
- Genetics: A Conceptual Approach 6e by Benjamin A. Pierce (2017)
- A Functional Approach to Java by Ben Weidig (2022)
- Calculus of variations and optimal control by Amol Sasan (2005)