My project focuses on analyzing Tor communication. The project will be for Advanced Forensics course, so I want an analytical project shows if someone can find evidence or trace on the local system of person who uses Tor. And if someone is sniffing on the network, how can he/she know that the traffics have been secured using Tor? Is there any way to prove that the user uses Tor?
Other Tor analyses, in addition to the above, and related to the Advanced Forensics course are accepted.
## Deliverables
[login to view URL] requirements notice: As originally posted, this bid request does not have complete details. Should a dispute arise and this project go into arbitration "as is", the contract's vagueness might cause it to be interpreted against you, even though you were acting in good-faith. So for your protection, if you are interested in this project, please work-out and document the requirements onsite.