Must Read

Anti-Forensics involves the use to tools and techniques used to frustrate a digital forensics investigation.

These techniques are designed to eliminate, alter, or disguise digital evidence in a manner that makes it challenging or impossible for forensic analysts to collect, analyze, or interpret it effectively. Anti-forensic methods can include data encryption, file obfuscation, data wiping, the use of steganography to hide data within other files, altering file timestamps to disrupt timeline analysis, and the use of sophisticated malware to compromise forensic tools.

The goal of anti-forensics is not only to protect information from unauthorized access but also to create a digital environment where forensic investigators are unable to ascertain the original actions or intentions of the user, thereby ensuring privacy or concealing illicit activities. As digital forensic techniques evolve to become more sophisticated, so too do the anti-forensic methods employed to counteract them, leading to a continuous cat-and-mouse dynamic between investigators and individuals seeking to evade detection.

Jennifer Funk – To VPN or not to VPN with TOR

Food for thought and lunch time entertainment. To VPN or not to VPN when using TOR. You may think "Always VPN! no doubt!" Not so fast...check out this video for the pros and cons of using a VPN with TOR.

Tails Version 6.0 – 2/27/2024

We are very excited to present you Tails 6.0, the first version of Tails based on Debian 12 (Bookworm) and GNOME 43. Tails 6.0 brings new versions of most of the software included in Tails as well as several important security and usability improvements.

Reading the Notepad Tab Cache

Simple C# Timestomp

FBI: Blind Faith Program