Learning to leave no trace
Discover a new monitoring practice: OSINT
Practical sheet REF: FIC1838 V1
Learning to leave no trace
Discover a new monitoring practice: OSINT

Author : David COMMARMOND

Publication date: May 10, 2025 | Lire en français

Logo Techniques de l'Ingenieur You do not have access to this resource.
Request your free trial access! Free trial

Already subscribed?

5. Learning to leave no trace

When we surf the Internet, we leave traces in the computer's browser, with cookies, with the host. But investigating also means learning how to obtain information as discreetly as possible, even if it's freely available. It may indicate to others that you share the same interests.

A few precautions can then be taken to limit these traces on a computer, such as using private browsing, which is the simplest and free choice, a VPN (free like Proton, or paying Proton VPN plus, Nord VPN) or a proxy, the Tor browser.

On a cell phone, you'll need to learn how to manage and control the authorizations given to applications (sending data, accessing the microphone, accessing the camera). Managing this extension of our memory is a real security issue, as access to the microphone and camera can be particularly intrusive. For the time being, however,...

You do not have access to this resource.
Logo Techniques de l'Ingenieur

Exclusive to subscribers. 97% yet to be discovered!

You do not have access to this resource. Click here to request your free trial access!

Already subscribed?


Ongoing reading
Learning to leave no trace

Article included in this offer

"Management and innovation engineering"

( 434 articles )

Complete knowledge base

Updated and enriched with articles validated by our scientific committees

Services

A set of exclusive tools to complement the resources

View offer details
Contact us