Reference Hub3
POSMASWEB: Paranoid Operating System Methodology for Anonymous and Secure Web Browsing

POSMASWEB: Paranoid Operating System Methodology for Anonymous and Secure Web Browsing

Nuno Ricardo Mateus-Coelho, Benjamim Ribeiro Fonseca, António Vieira Castro
Copyright: © 2021 |Pages: 32
ISBN13: 9781799857280|ISBN10: 179985728X|EISBN13: 9781799857297
DOI: 10.4018/978-1-7998-5728-0.ch023
Cite Chapter Cite Chapter

MLA

Mateus-Coelho, Nuno Ricardo, et al. "POSMASWEB: Paranoid Operating System Methodology for Anonymous and Secure Web Browsing." Handbook of Research on Cyber Crime and Information Privacy, edited by Maria Manuela Cruz-Cunha and Nuno Mateus-Coelho, IGI Global, 2021, pp. 466-497. https://doi.org/10.4018/978-1-7998-5728-0.ch023

APA

Mateus-Coelho, N. R., Fonseca, B. R., & Castro, A. V. (2021). POSMASWEB: Paranoid Operating System Methodology for Anonymous and Secure Web Browsing. In M. Cruz-Cunha & N. Mateus-Coelho (Eds.), Handbook of Research on Cyber Crime and Information Privacy (pp. 466-497). IGI Global. https://doi.org/10.4018/978-1-7998-5728-0.ch023

Chicago

Mateus-Coelho, Nuno Ricardo, Benjamim Ribeiro Fonseca, and António Vieira Castro. "POSMASWEB: Paranoid Operating System Methodology for Anonymous and Secure Web Browsing." In Handbook of Research on Cyber Crime and Information Privacy, edited by Maria Manuela Cruz-Cunha and Nuno Mateus-Coelho, 466-497. Hershey, PA: IGI Global, 2021. https://doi.org/10.4018/978-1-7998-5728-0.ch023

Export Reference

Mendeley
Favorite

Abstract

It has recently been discovered that large companies and nations “observe” their customers and citizens, disregarding any remaining moral and technological lines, being able to listen to telephone conversations and monitoring communications through powerful monitoring and surveillance programs. Elsewhere on the planet, nations in turmoil or wrapped in a cloak of censorship persecute their citizens, controlling them by denying them access to the free web without the threat of repercussions that threatens their dignity. To support the present research, an analysis of platforms that allow anonymous and secure browsing and a study of technologies and programs with potential privacy breach and computer intrusion were performed. The main objective of this work was to analyse the computer monitoring and surveillance technologies, identifying the available tools, trying to find potential solutions, developing and providing a methodology that enhances any desktop, server, or mobile operating system, with characteristics that combat the exposed in this summary.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.