The results suggest that anonymization of data is essential if Facebook chats are to be shared for further research into social media content. It is observed that once the user deletes a sent SMS message, the phone number and the deleted time stamp remained in the data/data//databases/smstakeover_db database in the address_table are recoverable. This indicates that only smstakeover_db stores SMS messaging information when using messenger application. The research finding shows that chats are recorded under messages tab together with SMS of data/data//databases/smstakeover_db and data/data//databases/threads_db. The research discovered that mqtt_log_event0.txt of the /Cache directory stores chat when messenger is set as a default messaging app. The data were then generated using unique words which were used for conducting key searches. Disc imaging and data partition were examined and accessed to identify changes in the orca database of the application package using DB browser. #P2P MESSENGER OPEN SOURCE ANDROID#Two Android mobile devices were used for data generation and Facebook Messenger account was created. While there are researches performed on the forensic artifacts' extraction from Facebook, no research is conducted on setting Facebook Messenger applications as a default messaging application on Android. Thus, crafting a myriad of privacy trepidation to users. During their interaction, personal information is uploaded. Unprecedented time is spent by many interacting globally with known and unknown individuals using Facebook. Facebook Messenger is the most popular social media applications used globally. The use of mobile devices and social media applications in organized crime is increasingly increasing. This is new approach of IM communication method, that is message must be deliver over virtual network with good level security. This method developed with Pipes as virtual communication channels used to send and receive messages between services and applications, the pipe binding consists of searching and connecting the two or more ends of a pipe. It will implemented in JXTA protocols which establish a virtual network overlay on top of the Internet, allowing peers or device to directly interact and self-organize independently of their network connectivity and domain topology. In this model, we propose a Mobile Instant Messenger with virtual network. This paper propose a secure Mobile IM in excanging data over internet with an virtual network method. Mobile Instant Messenger is one of the most application which use to exchange a message between Sender and Receiver over public network, so that it is very important building an application with good level of security aspect and fast communication.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |