![]() VMs give users a virtual environment that is not associated with their actual workstation or endpoint. This is a problem that has outgrown the capabilities of cobbled together VMs and VPNs - and one which managed attribution is designed to solve. If their identity, affiliation to their organization or intent of their research can be deciphered, bad actors can spoil their investigation. ![]() This is different today, as you do not need to be a computer scientist to find or pull PII from the internet.įor researchers, this is a big concern. In the late 1990s and early 2000s, while there were bad people out there on the internet, they had to know what they were doing in order to gather any personal identifiable information (PII). Now add in the use of a virtual machine (VM), in conjunction with a VPN and TOR browser and many would think you have the most protection possible. When you mix a VPN and Tor browser together you are able to protect your identity - for the most part - when you surf the internet. ![]() In the early 2000s, all a researcher had to do was use The Onion Router (Tor) browser in order to hide their IP address and other information and while virtual private networks (VPNs) were around, they were not as common as they are now. ![]() Researchers have lots of options to manage their anonymity while performing online investigations, but not all solutions are created equally.Īs researchers, we are always looking for ways to protect not only ourselves but also our organizations from becoming vulnerable to anything that can happen on the internet. ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |