官术网_书友最值得收藏!

Online and offline anonymity

Encryption, in particular, can make investigations rather difficult, but there is also the concept of anonymity which adds to the complexity of maintaining an accuracy of the true sources found in investigations. Like encryption, there exist several free and open source tools for all operating system platforms, such as Windows, Mac, Linux, and Android, which attempt and most often successfully mask the hiding of someone's digital footprint. This digital footprint usually identifies a device by its IP address and MAC (Media Access Control) address. Without going into the network aspect of things, these two digital addresses can be compared to a person's full name and home address, respectively.

Even though a person's IP address can change according to their private network (home and work) and public network (internet) access, the MAC address remains the same. However, various tools are also freely available to spoof or fake one's IP and MAC addresses for the purpose of privacy and anonymity. Adding to that, users can use a system of routing their data through online servers and devices to make the tracing of the source of the sent data quite difficult. This system is referred to as proxy chaining and does keep some of the user's identity hidden.

A good example of this would be the Tor browser; it uses onion routing and several proxies worldwide to route or passes the data along from proxy to proxy, making the tracing of the source very difficult, but not impossible. You can think of proxy chains as a relay race, but instead of having four people, one passing the baton to the next, the data is passed between hundreds of proxy devices, worldwide.

主站蜘蛛池模板: 长子县| 江口县| 房山区| 贞丰县| 南漳县| 平和县| 株洲县| 儋州市| 保山市| 贵溪市| 峨眉山市| 聂拉木县| 如东县| 师宗县| 宁国市| 鹤庆县| 监利县| 通化县| 平果县| 绍兴县| 宜都市| 平和县| 望奎县| 远安县| 万宁市| 宜兴市| 宜春市| 株洲县| 诸暨市| 苏尼特左旗| 平度市| 上栗县| 沧州市| 巴彦淖尔市| 颍上县| 大名县| 尚义县| 维西| 桦甸市| 阳原县| 商城县|