2019 7th International Symposium on Digital Forensics and Security (ISDFS) 2019
DOI: 10.1109/isdfs.2019.8757551
|View full text |Cite
|
Sign up to set email alerts
|

Prototype of a paranoid mobile operating system distribution

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
7
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
5
1
1

Relationship

0
7

Authors

Journals

citations
Cited by 9 publications
(7 citation statements)
references
References 4 publications
0
7
0
Order By: Relevance
“…With a Proxy Socks5 and IPTABLES configuration, all traffic is redirect from the layered communications environment, through the internal firewall onto TOR, I2P or proprietary private internet relay system, maintaining secret the physical MAC Address of the network card, the IP, DNS details and other information that might lead to the discovery of the virtual or physical location of a given user [28]. Furthermore, this methodology uses a triple TOR circuit to promote an untraceable location of the user, bypassing modern constrains from IDS/IPS and Firewall systems every 60 seconds [30].…”
Section: Paranoid Methodologymentioning
confidence: 99%
See 3 more Smart Citations
“…With a Proxy Socks5 and IPTABLES configuration, all traffic is redirect from the layered communications environment, through the internal firewall onto TOR, I2P or proprietary private internet relay system, maintaining secret the physical MAC Address of the network card, the IP, DNS details and other information that might lead to the discovery of the virtual or physical location of a given user [28]. Furthermore, this methodology uses a triple TOR circuit to promote an untraceable location of the user, bypassing modern constrains from IDS/IPS and Firewall systems every 60 seconds [30].…”
Section: Paranoid Methodologymentioning
confidence: 99%
“…In the current era, we have achieved the peak of the communication technologies through Internet, which has been considered one of the biggest social and technological achievement after the invention of the wheel and the control of fire [3], [28], offering to the world we know, one of the best forms of communications between technological devices.…”
Section: Contextmentioning
confidence: 99%
See 2 more Smart Citations
“…Research into novel operating systems will also grow as data security and consumer data privacy interest grow. New research prototyping novel operating systems designed to secure user data are already being published to create secure mobile platforms, sometimes called "paranoid", as part of their core system design [18]. These new paranoid OSes will pose further challenges to investigators and will also need further study in the future.…”
Section: Related Workmentioning
confidence: 99%