Access the full text.
Sign up today, get DeepDyve free for 14 days.
[This chapter focuses on the examination of the qTox message application. Recently, there have been a lot of child exploitation activities where the suspects use amongst other things an E2EE messenger called qTox (using the tox-protocol) for their communication to other offenders. The tox-protocol is an encrypted open source peer-to-peer network protocol without a central server infrastructure for chat, file transfer, video chat and VoIP. Standard forensic software is currently not able to detect or reconstruct qTox communication. This chapter presents an approach to examine qTox artifacts and demonstrates possibilities to reconstruct qTox communication, friend lists and account information for the investigator. This approach is tested with the qTox client version used in the main operating systems Windows and Linux in a virtual environment. The analysis of the qTox source code to find out the relevant encryption functions is described. The search for artifacts in the image files of the operating systems and in the memory dumps of the running machines is also presented. The structure of the encrypted qTox profile sqlite database is discussed in details.]
Published: Oct 22, 2022
Read and print from thousands of top scholarly journals.
Already have an account? Log in
Bookmark this article. You can see your Bookmarks on your DeepDyve Library.
To save an article, log in first, or sign up for a DeepDyve account if you don’t already have one.
Copy and paste the desired citation format or use the link below to download a file formatted for EndNote
Access the full text.
Sign up today, get DeepDyve free for 14 days.
All DeepDyve websites use cookies to improve your online experience. They were placed on your computer when you launched this website. You can change your cookie settings through your browser.