December 2022
Beginner to intermediate
322 pages
8h 46m
English
In the previous chapter we talked about the artifacts that can be collected by an attacker from individuals and companies from devices, networks, and browsers. Not only attackers but also competitors collect information and artifacts from users. We discussed the tools and techniques that attackers use to compromise networks and we discussed how browsers can be used by the attackers to collect information from users in particular.
This chapter we will be focusing on cyber anonymity. The flow of this chapter will be as follows: