As many already know, virtually all Internet service providers monitor their customers’ online activity, so if they become suspicious that users are involved in illegal activities, they will notify the relevant authorities without the user in question being able to replicate or justify their use of dark web, VPNs or similar tools.
This time, digital forensics specialists from the International Institute of Cyber Security (IICS) will show you how to use LOGSPAMER, a tool for Termux that obstructs records by tracking links written in code. This utility also automatically follows all links from all websites.
The use of this particular approach will confuse Internet service providers, so it will be impossible for them to track the actual browsing of the user due to the large amount of information to be analyzed, as mentioned by digital forensics experts.
INSTALLATION AND OPERATION
First, we update all packages and install the utility:
apt install git -y
apt install python -y
pkg install request
git clone https://github.com/TermuxGuide/logspamer
pip install -r requirements.txt
Then run the utility directly:
python logspamer.py --config config.json
The utility begins to work by visiting a wide variety of sites on different topics: from buying tickets to Uganda to information about the crown, all with the intention of confusing the tracking tools implemented by Internet service providers. According to digital forensics experts, real records will become virtually invisible amid tons of useless information.
Remember that this material was made for purely educational purposes, so IICS is not responsible for any misuse that may be given to this tool.
To learn more about information security risks, malware variants, vulnerabilities and information technologies, feel free to access the International Institute of Cyber Security (IICS) websites.
He is a cyber security and malware researcher. He studied Computer Science and started working as a cyber security analyst in 2006. He is actively working as an cyber security investigator. He also worked for different security companies. His everyday job includes researching about new cyber security incidents. Also he has deep level of knowledge in enterprise security implementation.