Fingerprinting

[chan] Crypto-Anarchist Federation
Jan 7 00:45

http://cs.emis.de/LNI/Proceedings/Proceedings228/375.pdf Fingerprinting Techniques forTarget-oriented Investigations in Network Forensics Abstract: Fingerprintingtechniques are receiving widespread attention in the field of information security. In this paper we argue that they may be of specific interest for the field of network forensics. In three case studies, we explore the use of fingerprinting techniques to improve and extend current investigative methods and showcase why fingerprinting allows for more target-oriented investigations than current practices. In each case study, we review the applicability of the current state of the art from the field of information security. The paper is intended to be a starting point for a discussion about the opportunities and concerns that may result from using evidence gained by fingerprinting techniques in criminal investigations.

[chan] Crypto-Anarchist Federation
BM-2cWdaAUTrGZ21RzCpsReCk8n86ghu2oY3v

Subject Last Count
Tor / Proxychains is leaking my hostname Feb 23 08:31 3
@S3 ... SPOOQKE ... Secure Pair Orthogonal OTP Quantum Key Exchange Feb 22 14:04 2
Compress Random Data Feb 19 06:34 5
Your Mama 1$ §çÛM Feb 18 20:58 1
A satellite engineer explains the truth about satellite operations Feb 18 18:16 3
Satellites Are Fake - Just Another NASA Hoax Feb 18 17:27 1
Globewashing Feb 18 07:37 1
how to make bitmessage secure Feb 18 04:59 1
Are you blacklisted? Feb 18 01:49 1
Mitigating exploited software with firejail Feb 18 01:45 1
MeinCoin Crypto Research - Screenshot Feb 17 13:16 1
Constant Conflict - First published From Parameters, Summer 1997, pp. 4-14: US Army War College] Feb 17 08:28 3
FPGA Hardware backdoors news. Feb 17 08:21 1
Consider this problem. Feb 17 07:10 1
How many users have bitmessage in the world? Feb 16 20:25 2
test 44 Feb 16 19:14 5
$ cd PyBitmessage ; git log | grep Author | sort -u | blacklist Feb 16 03:08 1
Bitmessage components security seclusion example Feb 16 01:05 1
NOTICE: Address Revocation Feb 15 02:49 1
Truly, truly, Bitcoin is a failure Feb 13 12:22 1
Proof of Work is the worst way to do a BlockChain Feb 13 12:10 1
privacy software / services list Feb 11 19:18 5
THE WORLD'S MOST SECURE MESSAGING SYSTEM Feb 10 11:07 1
If I use P2P networks like eMule on the Whonix operating system, is it possible for them to leak my real IP address? Feb 10 08:06 2
hacker for hire Feb 10 02:26 1
a Feb 9 21:21 1
z Feb 9 21:21 1
test1 Feb 9 20:25 3
ZRe: test5 Feb 9 12:51 1
aRe: test5 Feb 9 12:51 1
my pleasure Feb 8 17:06 1
Anonymous VCS Feb 6 15:13 5
The best descriptions of trolls and idiots Feb 6 12:57 2
crypto question Feb 6 12:39 1
since leaving general chan Feb 6 12:16 3
Help Fight Government Tyranny Feb 6 02:04 1
[chan] 411 BM-2cW53MzWqtod8TA6vybdUeqd2LhTuXCX3L Feb 5 11:53 1
Crypto-Anarchist Literature Feb 4 11:19 1
Help needed with identying crypto paper Feb 1 12:25 1
OMEGA user survey Feb 1 03:34 2
What is secure? Jan 29 05:15 14
An Inside Job: Remote Power Analysis Attacks on FPGAs Jan 29 00:02 1