1 |
Darknet sítě jako způsob ochrany soukromí uživatelů internetu / Darknet networks as a way of protecting internet users' privacyPlevný, Marek January 2017 (has links)
In this age when information technologies became inseparable parts of our lives we can hardly imagine for example living without internet. There is a phenomenon connected with internet and that is large scale collection of data about internet users and their activities. Because of this fact, it is important to protect our internet privacy as a very important aspect of our lives. This work examines large scale collection of data about users internet activities. During this work, different methods and reasons for this largescale data collection are examined. Later, different ways how internet users are protected by law or how they can protect themselves are examined. One of the ways how internet users can protect their internet privacy is by using so-called anonymizing networks connected with a phenomenon called Darknet. This work examines if it is possible by ordinary internet users to adapt this method of internet privacy protection.
|
2 |
Anonymní komunikace v prostředí Internetu / Anonymous communication in Internet environmentPajtinová, Mária January 2011 (has links)
Master´s thesis focuses on certain possibilities of how user can anonymously commununicate through the Internet. There are described following anonymous programs: TOR, JAP, I2P and CyberGhost, which allow user to hide his own identity to other IP address. Subsequently, measurements from different technologies are made by anonymous program TOR for calculate transmission speed.
|
3 |
Dark Web Forensics : An Investigation of Tor and I2P Artifacts on Windows 11Abolghsemi, Seyedhesam, Chukwuneta, Chukwudalu January 2024 (has links)
With the rising use of the Internet by businesses and individuals for their regular activities and transactions, there has been increased attention to user privacy and data security on the web. While the adoption of dark web networks has ensured that users' privacy and anonymity concerns are being addressed, there has also been a consequential increase in illicit activities on the internet. The dark web remains a critical area for law enforcement investigations, providing a platform for criminal activities to thrive unchecked. This study evaluates the digital traces deposited by dark web browsers on the client side of user devices, providing a deep insight into the security features of Tor and I2P and outlining the potential areas where digital artifacts can be retrieved on a Windows 11 computer. By detailing the forensic acquisition process and subsequent artifact analysis, this research aims to enhance the capabilities of digital forensic examiners in tracking and prosecuting cybercriminals, thereby contributing to the broader field of digital forensics and cybersecurity.
|
Page generated in 0.0178 seconds