This chapter covers
- Learning the difference between the three main Dark Web protocols
- Demonstrating how to download TOR and access the TOR Dark Web and hidden onion sites
- Understanding how, where, and why encryption and anonymity do and don’t protect you on the Dark Web
- Learning how the desire for anonymity and security drove both the development of the Dark Web and bitcoin
- Understand how bitcoin is—and isn’t—related to the rise of dark markets
There’s no point in understanding what motivates attackers and how they work if you don’t understand what the payoff can be. What is the point of stealing millions of credit cards or millions of social security numbers? How can an attacker successfully cash in on all that stolen data? Understanding the payoff and why it motivates attackers is the key piece of the puzzle in understanding how attackers think. It’s what shifts the focus of the breach at Marriott from the theft of information on over 500 million guest stays to a potential state-sponsored attack aimed at stealing information on US military personnel and contractors.