I use Tor forensics, inside my customer network. I want to protect my information.
Wich are and where are artifact made by tor? I use the tor browser, in a USB drive.
thanks
The amount of data left depends on how Tor was used.
If you run it from a live CD, then almost no trace will be left. You might be able to identify that the machine was rebooted, but not much else unless there is external logging of the network activity via a gateway of some sort.
If you have installed it (and then uninstalled it) in Windows then a large number of
thanks, i will study the link.
Actually, if you download tor browser from EFF, you must only unzip it. You can put it on a USB drive. Which are the artifacts? And if someone is sniffing the network traffic, what can see?
thanks
I think Tor uses TLS (so it will be encrypted traffic) on IP ports 9001 and 9030.