7 The Dark Web: Where is stolen data traded?
This chapter covers
- Learning the difference between the three main Dark Web protocols
- Demonstrating how to download TOR and access the TOR Dark Web and hidden onion sites
- Understanding how, where, and why encryption and anonymity do and don’t protect you on the Dark Web
- Learning how the desire for anonymity and security drove both the development of the Dark Web and bitcoin
- Understand how bitcoin is—and isn’t—related to the rise of dark markets
There’s no point in understanding what motivates attackers and how they work if you don’t understand what the payoff can be. What is the point of stealing millions of credit cards or millions of social security numbers? How can an attacker successfully cash ...
Get Making Sense of Cybersecurity now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.