Louis, a professional hacker, had used specialized tools or search engines to encrypt all his browsing activity and navigate anonymously to obtain sensitive/hidden information about official government or federal databases. After gathering the information, he successfully performed an attack on the target government organization without being traced.
Which of the following techniques is described in the above scenario?
cerzocuspi
Highly Voted 3 years, 2 months agouday1985
2 years, 1 month agoKamal_SriLanka
Highly Voted 2 years, 11 months agoSgtLightyear
Most Recent 9 months, 2 weeks agoboog
1 year, 1 month agoYebi
1 year, 5 months agoDaniel8660
1 year, 8 months agodinonino
1 year, 9 months agodinonino
1 year, 9 months ago45382456
1 year, 10 months agoLigeti15
1 year, 11 months agoHanji1691
2 years agoEngnSu
2 years, 1 month agojijin
2 years, 1 month agodjaBSNYVXSHGX
2 years, 2 months agogokhansah1n
2 years, 4 months agoCrash_Override
2 years, 5 months agoegz21
2 years, 5 months agocozy1970
2 years, 6 months ago