In the last few chapters, we've discussed how to access the Dark Web securely and anonymously by installing and using various security- and privacy-focused operating systems, together with private browsers and VPNs.
In this chapter, let's discuss what goes on in the Dark Web, so you can decide why you want to go there. We'll discuss how the Dark Web is used, and talk about the stories (true or not) of what goes on in the Dark Web. Some of these examples will be graphic and detailed (not for the faint of heart), but most importantly, they are not of my invention.
I will retell tales that I've heard, read about, or have direct experience with.
Not all of them will be scary, morbid, or gross. Some will be of a positive nature, outlining how people put the Dark Web to use for whistle-blowing, sharing information, marketing...