The ________ is a tool available for secure communications and anonymous web surfing. This network uses public–private key encryption, and, like Tor, websites are hosted anonymously. On the suspect's computer, the router.config file contains some information about I2P connectivity by the user

a. Freenet
b. Invisible Internet Project (I2P)
c. Opennet
d. None of the above

Answer: B. The investigator can also search for files with an .i2p extension on the suspect's computer.

Computer Science & Information Technology

You might also like to view...

A smartphone is a computer

Indicate whether the statement is true or false

Computer Science & Information Technology

Office applications use your personal libraries and folders, such as ____, as a default location for storing files.

A. Folders B. Documents C. My Documents D. Your Documents

Computer Science & Information Technology