官术网_书友最值得收藏!

Online and offline anonymity

Encryption, in particular, can make investigations rather difficult, but there is also the concept of anonymity which adds to the complexity of maintaining an accuracy of the true sources found in investigations. Like encryption, there exist several free and open source tools for all operating system platforms, such as Windows, Mac, Linux, and Android, which attempt and most often successfully mask the hiding of someone's digital footprint. This digital footprint usually identifies a device by its IP address and MAC (Media Access Control) address. Without going into the network aspect of things, these two digital addresses can be compared to a person's full name and home address, respectively.

Even though a person's IP address can change according to their private network (home and work) and public network (internet) access, the MAC address remains the same. However, various tools are also freely available to spoof or fake one's IP and MAC addresses for the purpose of privacy and anonymity. Adding to that, users can use a system of routing their data through online servers and devices to make the tracing of the source of the sent data quite difficult. This system is referred to as proxy chaining and does keep some of the user's identity hidden.

A good example of this would be the Tor browser; it uses onion routing and several proxies worldwide to route or passes the data along from proxy to proxy, making the tracing of the source very difficult, but not impossible. You can think of proxy chains as a relay race, but instead of having four people, one passing the baton to the next, the data is passed between hundreds of proxy devices, worldwide.

主站蜘蛛池模板: 突泉县| 靖江市| 南陵县| 即墨市| 衢州市| 扎兰屯市| 昌平区| 平阴县| 深水埗区| 田东县| 饶平县| 泸定县| 百色市| 安塞县| 郸城县| 壤塘县| 三江| 梨树县| 同江市| 商河县| 邵武市| 吉水县| 东乡县| 浦东新区| 新沂市| 东乌珠穆沁旗| 文水县| 肥城市| 和平区| 凤翔县| 和平区| 潞西市| 新干县| 旌德县| 西盟| 兰坪| 陇南市| 托克逊县| 巴林右旗| 泸溪县| 苍溪县|