This workshop will analyze the information an investigator (or thief) may obtain by intercepting internet traffic, a mobile phone or stealing a computer. You will learn what a digital forensics and network investigator can understand through "your computer behaviour" and what data and metadata correlations can be made. Particular attention will be paid to security and privacy measures to be taken to reduce the investigative capacity.