1. Arma.: Obfsproxy: The Next Step in the Censorship Arms Race (2012) Retrieved 19 Nov 2017, from
https://blog.torproject.org/obfsproxy-next-step-censorship-arms-race
2. Bagley, R., Ferguson, R.I., Leimich, P.: Firefox Browser Forensic Analysis via Recovery of SQLite Artefacts from Unallocated Space (2012)
3. Boggs, R.J., Fenger, T., Sammons, J., Winkler, D.: Online anonymity: forensic analysis of the tor browser bundle (2017)
4. Clark, E., Koppen, G., Murdoch, S., Perry, M.: The Design and Implementation of the Tor Browser [DRAFT] (2017). Retrieved 19 Nov 2017, from
https://www.torproject.org/projects/torbrowser/design/#disk-avoidance
5. Dcf.: How to Use the “meek” Pluggable Transport. Retrieved 20 Nov 2017, from
https://blog.torproject.org/how-use-meek-pluggable-transport
(2014)