TRENDS IN CYBERCRIME

Introduction Anonymous technology is often used to conceal the user’s IP address as well as to encrypt the traffic between service and user. However, these technologies are used in legitimate as well as illegitimate manners. The study focuses on one such technology which is Anonymous P2P communication along with evaluating its use for different purposes. … Continue reading TRENDS IN CYBERCRIME