

This paper outlines the client application, its detected network traffic and identifies artefacts that may be of value as evidence for future digital investigations. The importance of understanding BitTorrent Sync and its resulting digital investigative implications for law enforcement and forensic investigators will be paramount to future investigations. The service is completely decentralised, offers much of the same synchronisation functionality of cloud powered services and utilises encryption for data transmission (and optionally for remote storage). BitTorrent Sync is seen as an alternative by many and has gathered over two million users by December 2013 (doubling since the previous month). A number of these services have recently been reported as sharing information with governmental security agencies without warrants.
Nas with bittorrent sync professional#
With professional and home Internet users becoming increasingly concerned with data protection and privacy, the privacy afforded by popular cloud file synchronisation services, such as Dropbox, OneDrive and Google Drive, is coming under scrutiny in the press. Methodology is proposed outlining the required steps involved in retrievingĭigital evidence from the network and the results from a proof of concept Invaluable as part of a digital forensic investigation. Of scenarios where the network investigation of the service may prove Two million active users by the end of the year. Synchronisation service, named BitTorrent Sync to alpha testers in April 2013.īitTorrent Sync's popularity rose dramatically throughout 2013, reaching over released an alternative cloudless file backup and To provide an alternative to cloud based file backup and synchronisation,īitTorrent Inc. Many to review their online security practices with their personal information. Invasion of privacy issues and data protection breaches in the media has caused The prevalence of recent articles covering various To their most up-to-date data from any computer or mobile device with an Microsoft Skydrive, Apple iCloud and Google Drive, to enable "always-on" access Users turn to cloud based file synchronisation services, such as Dropbox, Results in most requiring instant access to their files. Themselves amassing is ever increasing and the fast pace of the modern world

The volume of personal information and data most Internet users find The presented methodology can be applied to any BitTorrent protocol. The comparison of the calculated hash with the list of publicly available hashes allows determination whether sharing of the file is legal or illegal. During the monitoring, it is possible to calculate the public lookup SHA1 hash of the shared file. The experiment was carried in two modes: 1) simulating of the use of the BitTorrent Sync application 2) monitoring of real traffic on the Internet. Therefore, we proposed the methodology that enables to capture the initiation step and to inform the forensics investigator, which then takes the reactive actions. The initiation of the activity is carried out in the plain text only. The BitTorrent Sync client application employs quite largely the encryption for sending data packages. Nevertheless, it can be used for the activities that draw the attention of the forensics invetigators. The BitTorrent Sync client application is the most progressive development in the BitTorrent family.
