scholarly journals Private Browsing Forensic Analysis: A Case Study of Privacy Preservation in the Brave Browser

2020 ◽  
Vol 13 (6) ◽  
pp. 294-306
Author(s):  
Ahmed Mahlous ◽  
◽  
Houssam Mahlous ◽  

The Internet and its users are in continual growth. With it grows the number of organized crimes on the Internet and the potential for individuals to carry out illegal activities. These criminals have gained more awareness of private browsing facilities, and many have found a haven in privacy designed browsers that cover up their tracks and shield their nefarious actions. The development of these privacy features has proven to be a challenge for digital forensic investigators. They strive to perform a thorough analysis of web browsers to collect artefacts relating to illegal activity to be presented as evidence to the court of law and used to convict criminals. “Brave” browser is one of the most recent and fastest-growing private browsers that, up to this point, has not been studied in-depth, and its privacy preservation functionality remains unclear. In this paper, we studied Brave’s private browsing mode, examined its privacy-preserving and forensic data acquisition, and outlined the location and type of evidence available through live and post-mortem state analysis. The unique approach taken included a set of experiments that unveiled how the browser functions and showed the appropriate tools that could be utilized to extract leftover artefacts. Analysis of our results showed that despite Brave leaving no traces of browsing activity on the Hard Disk, visited URLs, images, keyword searches, and even cached videos were retrievable from the RAM, which shows that Brave is not entirely private.

2020 ◽  
Vol 8 (6) ◽  
pp. 1678-1682

I2P is an anonymous P2P distributed communication layer used to send messages to each other anonymously and safely. It is built on top of the internet and can be considered as an internet within the internet. Even though I2P is developed with an intention to create censorship resistant environment for the free flow of information, it is misused for illegal activities now a days. The possible misuses are less known among law enforcement agencies and existing industry approved software programs have no detection functionality for I2P. Because of the increased use of I2P in criminal purposes, there is a need for methods and tools to acquire and analyze digital evidence related to I2P. We conducted a detailed live memory dump analysis in order to find out the I2P related artifacts from a host machine. Furthermore, we propose a tool that will analyze the memory dump and system local files to find out the I2P related artifacts and provide a detailed report to the investigator.


2018 ◽  
Author(s):  
James Grimmelmann

78 Fordham Law Review 2799 (2010)The Internet is a semicommons. Private property in servers and network links coexists with a shared communications platform. This distinctive combination both explains the Internet's enormous success and illustrates some of its recurring problems.Building on Henry Smith's theory of the semicommons in the medieval open-field system, this essay explains how the dynamic interplay between private and common uses on the Internet enables it to facilitate worldwide sharing and collaboration without collapsing under the strain of misuse. It shows that key technical features of the Internet, such as its layering of protocols and the Web's division into distinct "sites," respond to the characteristic threats of strategic behavior in a semicommons. An extended case study of the Usenet distributed messaging system shows that not all semicommons on the Internet succeed; the continued success of the Internet depends on our ability to create strong online communities that can manage and defend the infrastructure on which they rely. Private and common both have essential roles to play in that task, a lesson recognized in David Post's and Jonathan Zittrain's recent books on the Internet.


2019 ◽  
Vol 7 (4) ◽  
pp. 435-442 ◽  
Author(s):  
Katherine M. Grillo ◽  
Daniel A. Contreras

AbstractAlthough archaeology has become increasingly concerned with engaging diverse publics, and has embraced the internet as a means of facilitating such engagement, attitudes towards Wikipedia have—understandably—been more ambivalent. Nevertheless, we argue here, Wikipedia's popularity and reach mean that archaeologists should actively engage with the website by adding and improving archaeological content. One way to do this is in the classroom: this paper provides a detailed how-to for instructors interested in having students create new Wikipedia content. We provide a case study in Wikipedia engagement from an advanced undergraduate course on African Archaeology, assess a program (Wiki Education) designed to help, and suggest further avenues for future outreach. We conclude that Wikipedia's utopian mission aligns with many of the goals of public archaeology, and argue that archaeology has much to gain by engaging with—rather than ignoring or even shunning—Wikipedia.


2015 ◽  
Vol 6 (1) ◽  
pp. 47-56
Author(s):  
Matej Kacaljak

Abstract This paper discusses the Al Capone case and identifies legal institutions which contributed to the conviction of Al Capone for tax evasion in the USA and discusses similarities in Slovak law. The Slovak legal environment is assessed with the aim of identifying potential room for improvement. Under an assumption of identical factual circumstances, it is tested whether Al Capone would be convicted of tax evasion in the Slovak Republic and if not, what would be the main reasons. The paper concludes that due to some, probably unintentional, specifics of Slovak tax and criminal law, Al Capone could not be convicted of tax evasion by the Slovak courts. In our opinion, these specifics do not, however, constitute material elements of the basic structure of Slovak tax and criminal law and could be relatively easily corrected.


Author(s):  
Christine E. Cooper-Vince ◽  
Tommy Chou ◽  
Jami M. Furr ◽  
Anthony C. Puliafico ◽  
Jonathan S. Comer

2021 ◽  
Vol 22 (3) ◽  
pp. 477-496
Author(s):  
Janette Brunstein ◽  
Mark Edward Walvoord ◽  
Ed Cunliff

Purpose The purpose of this study is to examine the possible benefits of approaching sustainability-related teaching cases from the perspective of problem-posing (PP) instead of problem-solving (PS). Design/methodology/approach A document analysis methodology (Silverman, 2011) was used to analyze sustainability teaching case study abstracts and learning objectives from business databases. Cases were reviewed and classified as PP, PS or other. PP cases were further subclassified on one of three axes. Findings Of 117 cases reviewed, most were PS (66%) with only 9% PP. Theoretical and pedagogical implications are discussed with recommendations for writing or converting, PS to PP cases for classroom use. Theoretical contributions include identification of three distinct and complementary views of PP, described in these axes: emancipatory; problematizing metaphors and premises; and rational, process and means-focused cases, not triggering transformative learning theory. Of 10 cases classified as PP cases, 3 were subclassified as emancipatory. Research limitations/implications This research is limited to case study titles containing “sustainability” and analyses of their descriptions and learning objectives only. Next phases of the research will examine differences in student learning between PS and PP in situ. Practical implications The research identifies a unique approach to the authoring and use of case studies that hold the potential for increasing students’ critical thinking capabilities and production of solutions to sustainability issues. Originality/value There is limited research and analysis of the identification and implications of using PP pedagogy.


2021 ◽  
Vol 13 (3) ◽  
pp. 451-476 ◽  
Author(s):  
Mona Khattab

With the outbreak of the COVID-19 pandemic, misinformation and unscientific interpretations flooded the internet. Seeking credible information in Egypt was paramount at the time. An answer to this quest was ‘Ask Nameesa’, an award-winning Egyptian-focused chatbot that utilizes Facebook Messenger to communicate with social media users in an individualized response engagement. It relies on information validated by WHO and the Egyptian Ministry of Health. This article examines the structure of Ask Nameesa as an example of infobots and studies the interactive engagement it offers users to provide health information. The study analyses data gathered by interviewing the founder and CEO of DXwand, the company that developed Ask Nameesa as well as content analysis of conversations with Ask Nameesa to assess its user engagement. The study aims at understanding the potential Ask Nameesa has in providing information literacy and tackling public demand for information.


Sign in / Sign up

Export Citation Format

Share Document