3 research outputs found

    Forensic analysis of epic privacy browser on windows operating systems

    Get PDF
    The 16th European Conference on Cyber Warfare and Digital Security (ECCWS 2017), Dublin, Ireland, 29-30 June 2017Internet security can be compromised not only through the threat of malware, fraud, system intrusion or damage, but also via the tracking of internet activity. Criminals are using numerous methods to access data in the highly lucrative cybercrime business. Organized crime, as well as individual users, are benefiting from the protection of Virtual Private Networks (VPNs) and private browsers, such as Tor, Epic Privacy, to carry out illegal activity such as money laundering, drug dealing, the trade of child pornography, etc. News articles advising on internet privacy assisted in educating the public and a new era of private browsing arose. Although these measures were designed to protect legitimate browsing privacy, they also provided a means to conceal illegal activity. One such tool released for private browsing was Epic Privacy Browser. It is currently used in approximately 180 countries worldwide. Epic Privacy Browser is promoted as a chromium powered browser, specifically engineered to protect users' privacy. It operates solely in "private browser" mode and, after the close of the browsing session, it automatically deletes all browsing data. The developers of Epic Privacy Browser claim that all traces of user activity will be cleared upon close of the application. However, there is no forensic acquisition and analysis of Epic Privacy Browser in literature. In this paper, we contribute towards the goal of assisting forensic examiners with the location and type of evidence available through live and post-mortem state analysis of the Epic Privacy Browser on Windows 7 and Windows 10. This analysis identifies how the browser functions during use and where data can be recovered once the browser is closed, the necessary tools that will assist in the forensics discovery, and effective presentation of the recovered material

    Proposing a security system for the VPN through design and implementation of a scheme for android and IOS mobiles based on two-factor authentication

    Get PDF
    A virtual private network (VPN) is a network, but a virtual network means that it creates a virtual bridge between the user and the server located somewhere across the world, and this network is private because to connect the connection with it you must have an account and password. The idea of VPN arose to protect its communications from industrial espionage, because there are very easy ways to penetrate a network and steal the information circulating in it. Data transmission encryption protocols and tunneling systems are used in order to secure the transfer of information between two points back and forth, so their data is encrypted and protected. Hacking the VPN is a very dangerous thing because of the importance and privacy of the data. Therefore, special systems must be provided for the VPN to suit the network's work scenarios with high security. In our work, we proposed a private authentication system for the VPN network that provides high security with fast execution and reliability based on two factors authentications: Using the varieties of authentications method, robust VPNs screen everybody who will tries to sign in. An authentication system was designed based on a special user interface that provides an easy environment for choosing two passwords in two different stages of registration and authentication. The proposed system was implemented on Android and iOS devices. The proposed system was evaluated through experiments with 720 participants with 3600 system entry processes, then the proposed system was tested in terms of its ability to break and resistance to different types of attacks. Where it was tested by 1900 attacks at different times with participants who were randomly selected from the main sample of participants during the implementation period of 30 days through using the modern types of mobile devices
    corecore