Private Browsing Part 2

Many people use the internet every day. Unfortunately, not everyone uses it legally. Some individuals use the internet for nefarious activities, and they need a way to effectively hide what they did on the internet or a way to stop all information from being written to the hard drive to avoid leaving evidence. Google Chrome, Mozilla Firefox, and Internet Explorer all have something built in called “Private Browsing” that are believed to do just that.

This post will discuss the methods we are using for private browsing forensics, what we have found so far with our analysis, and what we are going to do next. This blog is part 2 of private browsing forensics.

To read the full report, click here: Private Browsing Part 2

More Research Projects
The Leahy Center Inventory Project
Social Media Footprint Awareness
My Experience on The VPN Comparison Team