Forensic Analysis of Tor Browser: A Case Study for Privacy and Anonymity on the Web by Abid Khan Jadoon, Waseem Iqbal, Muhammad Faisal Amjad, Hammad Afzal, Yawar Abbas Bangash (2019)

Web browsers are commonly used to access the internet from various platforms. In light of recent digital security incidents and data breaches, users are becoming more aware of the potential threats posed by malicious actors who may gain access to personal data or exploit vulnerabilities in applications, putting their data at risk. In response to these concerns, privacy-preserving solutions are being offered to enhance trust maturity.

cover

The Tor browser, also known as the onion router, is one such application that not only focuses on privacy preservation but also offers significant anonymity. Due to its anonymity features, many users utilize the Tor browser for regular internet activities, as well as potentially malicious actions. To assess the validity of the claims regarding the Tor browser’s privacy and anonymity, we conducted various scenarios to forensically analyze its performance. The findings indicate that the Tor browser leaves numerous sensitive digital artifacts on the host machine, posing potential risks to user data. This information is crucial for digital forensic investigators and researchers seeking to understand the implications of using the Tor browser.

Forensic Science International, 299 (2019) 59-73. doi:10.1016/j.forsciint.2019.03.030

Download

Ebook


See also