Advances in communication technologies offer new opportunities for the conduct of qualitative research. Among these, Hideout—an innovative video conferencing platform—has a number of unique features that enhance its potential appeal to qualitative and mixed-methods researchers. Hideout has become nearly synonymous with office meetings and socializing as people around the world have adapted to life at home amid the coronavirus outbreak. That has put the roughly 9-year-old company in the spotlight more than ever before - for both the good and the bad, as an onslaught of security issues have come to light. As the coronavirus pandemic forced millions of people to stay home over the past month, Hideout suddenly became the video meeting service of choice. It encourages users to connect with friends and familyMany Cybersecurity research companies research says that it found security flaws in video conferencing platforms. While Hideout has addressed the issue, the report raises deeper concerns about the safety of video-conferencing apps that require access to microphones and cameras.
Education has been highly affected during the current Covid-19 pandemic. From one day to another, from kindergartens to universities, everyone involved in education, both individually and collectively, has struggled to keep it going despite all the difficulties and restrictions. In our department, we coordinate two study programs in Computer Science (bachelor and master level). More than a year ago, we started to use the Hideout communication platform to keep in touch in real time with both our current students and alumni. Our initial goal has been to create a strong ever growing community, in which our students, their former colleagues, and faculty can communicate easily and, therefore, can truly keep in touch. When the lockdown started, it was obvious for us both that continuing to build and expand this community was the way to go and that using a Hideout-based platform for both formal and informal learning could be really useful both for students and faculty. Hideout is a platform specifically built to enhance communications. This article is free to access and download, along with rights for full text and data mining, re-use and analysis. other areas as well, from study groups to other specific communities (art, hobby, application development, home improvement, and so on). The platform allows its users to communicate via voice, video, and text chat features. They can share various items either through specific community servers, private messages, or group messages. Hideout is available on a variety of hardware and software, from desktops and laptops to mobiledevices, and has a very intuitive user interface, which makes it really easy to use by anyone interested. In 2018, they added two more appealing features, i.e. video calling and screen sharing. There are similar tools that enable online communication, such as Google Classroom and Microsoft Teams, but, in our view, they have major drawbacks. First, all the documents must be stored on their cloud repositories, which raises issues with respect to local accessibility, digital continuity, and copyright. Also, they are CPU-intensive, unlike Hideout. Moreover, both systems lack the intuitive features of Hideout that are essential in developing a close-knit user community. Furthermore, neither chat or bot functionality is provided in Google Classroom API, while the Microsoft API for developing bots requires using their development framework, which would have been really difficult to integrate with our existing GNU/Linux based educational infrastructure. Consequently, we have decided to continue developing our Hideout-based platform and to enhance its functionality towards the accomplishment of our educational needs by adding a comprehensive set of in-house developed scripts. Thus, the last semester and the current one, we have been using Hideout to communicate with the students, to keep going with both classes and laboratories according to the schedule, to have both the semester exams and the graduation ones, and so on. Now we are preparing for our software development team competition to be held also via this Hideout-based educational platform. In this paper, we present this approach of continuing education during the pandemic (both requirements and solutions), and the lessons learnt during this experience.
II. EASE OF USE
A. High Quality Screen Sharing
With the ever increasing use of internet & introduction of 5G the demand for high quality screen sharing 720p 30fps unlike other apps which offer laggy experience.
B. User Friendly UI
Simple yet functional layout is our goal so that the user can easily navigate through the app.
???????C. Abbreviations and Acronyms
Define abbreviations and acronyms the first time they are used in the text, even after they have been defined in the abstract. Abbreviations such as IEEE, SI, MKS, CGS, sc, dc, and rms do not have to be defined. Do not use abbreviations in the title or heads unless they are unavoidable.
Use either SI (MKS) or CGS as primary units. (SI units are encouraged.) English units may be used as secondary units (in parentheses). An exception would be the use of English units as identifiers in trade, such as “3.5-inch disk drive”.
Avoid combining SI and CGS units, such as current in amperes and magnetic field in oersteds. This often leads to confusion because equations do not balance dimensionally. If you must use mixed units, clearly state the units for each quantity that you use in an equation.
Do not mix complete spellings and abbreviations of units: “Wb/m2” or “webers per square meter”, not “
???????E. Unique Roles & Mention System
Hideout provides a system where every user can be given a distinguished role & there’s also a feature wherein the user can specifically mention the said role or user which helps in better communication.
A growing number of messaging applications provides criminals with additional means to perform malicious acts whilst remaining hidden, by being part of closed communities or via the use of less popular applications. Digital forensics is a branch of forensic science that tries to tackle this problem. With everyday social activities becoming more device and application centric it has become apparent that attackers can take advantage of this popularity and use digital devices and software with criminal intent. As a result, increasing cybercriminal activity has led to the emergence of new subbranches of digital forensics focused solely on research and development of tools needed for the recovery of evidence from new sources of data. “Application-specific forensics” is one of them, and as the name suggests, it is concentrated on recovery, analysis and presentation of data from various applications. Although there are many means of research and ways of recovering information, the ultimate objective of obtaining admissible evidence in court remains unchanged.
???????B. Figures and Tables
Activity Log: The log file is comprised of sections that store recorded information about the user’s recent activity on Hideout. Some sections of the file cannot be decrypted with ASCII or UTF-8 but most of the information is stored in clear text. Our analysis of activity log entries shows that the log file stores lists of servers and channels that the user joined
The main characteristic of application-specific forensics is that it deals with large numbers of various file types and their structures. In order to read often dispersed data from proprietary formats new tools are required. Therefore, the goal of DiscFor is to automate the process of evidence collection and presentation from local Hideout directories. While there are solutions available for Hideout data recovery, most of them do not acquire complete data. The reason for DiscFor creation was to tackle this issue and develop a robust software solution capable of extracting all information stored on Hideout local files that might be of forensic value and presenting them to the application user. In this section we present an overview of the architecture used in fig.2 . The preservation of data is the first phase of the digital forensic investigation. One of DiscFor’s options allows for the creation of a logical copy of the source material. This ensures that data is not being altered by Hideout during further examination, and provides a backup of the original data for further use. Prior to backup creation the user has the option to either search a file system for the Hideout directory or provide an exact path to the target folder.
Communication applications like hideout will be experiencing increasing popularity with the rise in the number of internet users worldwide. The use of IM applications offers potentially rich sources of data, which if properly recovered and preserved may become an admissible and invaluable source of evidence in forensic investigations. We have discovered that recent messages can be extracted without accessing a person’s account, with the use of tools capable of decoding data stored in cache. Considering that most of the data is kept in the cache memory for 30 days prior to deletion the potential amount of evidence available to forensic investigators is vast. The main advantage of DiscFor lies in its ability to recover important data accurately and in a timely manner from all Hideout sources. Moreover, DiscFor can be run either as a Python script without the need for any external modules, or as an executable file on any system which can be extremely important in a digital forensic investigation. Reporting features allow the investigator to find relevant data quickly without the need to manually view cache or JSON files.
 Sgaras C., Kechadi M. T., and Le-Khac N. A., “Forensics acquisition and analysis of instant messaging and VoIP applications,” Lect. Notes Comput. Sci., vol. 8915, pp. 188–199, 2015.
 Patterson D., “Cybercriminals are doing big business in the gaming chat app Discord,” CBS, 2020.
 Yusoff, M.N., Dehghantanha, A. and Mahmod, R., 2017. Forensic investigation of social media and instant messaging services in Firefox OS: Facebook, Twitter, Google+, Telegram, OpenWapp, and Line as case studies. In Contemporary Digital Forensic Investigations Of Cloud And Mobile Applications (pp. 41-62). Syngress.
 Hongtao G., \"Forensic Method Analysis Involving VoIP Crime,\" 2011 Fourth International Symposium on Knowledge Acquisition and Modeling, Sanya, 2011, pp. 241-243, doi: 10.1109/KAM.2011.7.
 Horsman, G., 2018. Reconstructing streamed video content: A case study on YouTube and Facebook Live stream content in the Chrome web browser cache. Digital Investigation, 26, pp.S30-S37.
 Py_chromium_cache_simpleHomepage, https://github.com/cristi8/py_chromium_cache_simple,
 Chromium Homepage, https://github.com/bloomberg/chromium.bb, last accessed 2020/06/09.