Russian Federation
34
The article discusses the possibility of using the Internet resource canarytokens.org for active de-anonymization of the identity of a secure network on the Internet. A study of the features of setting up the work of canarytokens both in normal conditions of user equipment and when using means of increased anonymity in a computer network. The author's thoughts on the forms of using ca-narytokens during the investigation of crimes are given. In conclusion, outcomes are drawn about the advantages and disadvantages of the considered method of identifying an Internet user. The first in-clude: the efficiency of obtaining information even in cases where the criminal uses Internet re-sources that are outside the jurisdiction of the Russian Federation; obtaining information not only about the IP address, but also about the software and hardware characteristics of the computer de-vice used; the ability to obtain information relevant to a criminal case in cases where a criminal uses a VPN service. The disadvantage is the low efficiency when a criminal uses the Tor browser.
deanonymization, cybercrime, IP logger, canarytokens, token, ip address, browser fingerprint
1. Rassledovanie prestupleniy v sfere komp'yuternoy informacii i inyh prestupleniy, sovershaemyh s ispol'zovaniem informacionno-telekommunikacionnyh tehnologiy: ucheb. posobie / R.S. Pozdyshev, A.E. Vasil'ev, A.G. Saakyan [i dr.]. – N. Novgorod: Nizhegorodskaya akademiya MVD Rossii, 2023.
2. Pozdyshev R.S. Deanonimizaciya lichnosti prestupnika v seti Internet // Vestnik Ural'skogo yuridicheskogo instituta MVD Rossii. 2022. № 2 (34).