Abstract Computer applications often leave traces or residues that enable forensic examiners to gain a detailed understanding of the actions a user performed on a computer. Such digital breadcrumbs are left by a large variety of applications, potentially (and indeed likely) unbeknownst to their users. This paper presents the concept of residue-free computing in which a user can operate any existing application installed on their computer in a mode that prevents trace data from being recorded to disk, thus frustrating the forensic process and enabling more privacy-preserving computing. In essence, residue-free computing provides an “incognito mode” for any application. We introduce our implementation of residue-free computing, R esidue F ree , and motivate R esidue F ree by inventorying the potentially sensitive and privacy-invasive residue left by popular applications. We demonstrate that R esidue F ree allows users to operate these applications without leaving trace data, while incurring modest performance overheads.
more »
« less
Residue–Residue Contact Changes during Functional Processes Define Allosteric Communication Pathways
- Award ID(s):
- 2018144
- PAR ID:
- 10330964
- Date Published:
- Journal Name:
- Journal of Chemical Theory and Computation
- Volume:
- 18
- Issue:
- 2
- ISSN:
- 1549-9618
- Page Range / eLocation ID:
- 1173 to 1187
- Format(s):
- Medium: X
- Sponsoring Org:
- National Science Foundation
An official website of the United States government

