Privacy Preserving Internet Browsers: Forensic Analysis of Browzar

10/26/2017
by   Christopher Warren, et al.
0

With the advance of technology, Criminal Justice agencies are being confronted with an increased need to investigate crimes perpetuated partially or entirely over the Internet. These types of crime are known as cybercrimes. In order to conceal illegal online activity, criminals often use private browsing features or browsers designed to provide total browsing privacy. The use of private browsing is a common challenge faced in for example child exploitation investigations, which usually originate on the Internet. Although private browsing features are not designed specifically for criminal activity, they have become a valuable tool for criminals looking to conceal their online activity. As such, Technological Crime units often focus their forensic analysis on thoroughly examining the web history on a computer. Private browsing features and browsers often require a more in-depth, post mortem analysis. This often requires the use of multiple tools, as well as different forensic approaches to uncover incriminating evidence. This evidence may be required in a court of law, where analysts are often challenged both on their findings and on the tools and approaches used to recover evidence. However, there are very few research on evaluating of private browsing in terms of privacy preserving as well as forensic acquisition and analysis of privacy preserving internet browsers. Therefore in this chapter, we firstly review the private mode of popular internet browsers. Next, we describe the forensic acquisition and analysis of Browzar, a privacy preserving internet browser and compare it with other popular internet browsers

READ FULL TEXT

page 12

page 13

page 19

research
02/26/2017

Ratio Utility and Cost Analysis for Privacy Preserving Subspace Projection

With a rapidly increasing number of devices connected to the internet, b...
research
10/26/2018

Development and Analysis of Deterministic Privacy-Preserving Policies Using Non-Stochastic Information Theory

A non-stochastic privacy metric using non-stochastic information theory ...
research
01/15/2023

UN Handbook on Privacy-Preserving Computation Techniques

This paper describes privacy-preserving approaches for the statistical a...
research
01/05/2018

Is Private Browsing in Modern Web Browsers Really Private?

Web browsers are the most common tool to perform various activities over...
research
10/09/2017

Privacy-preserving Targeted Advertising

Recommendation systems form the center piece of a rapidly growing trilli...
research
02/18/2023

Digital Privacy Under Attack: Challenges and Enablers

Users have renewed interest in protecting their private data in the digi...
research
07/05/2023

SoK: Privacy-Preserving Data Synthesis

As the prevalence of data analysis grows, safeguarding data privacy has ...

Please sign up or login with your details

Forgot password? Click here to reset