Summary
A variety of subjects were covered in this chapter. Discovering the node path and layer-by-layer data encryption is almost difficult due to the intricate processes used by Dark Web technologies. Websites are unable to trace the geolocation and IP of their users, and users are unable to obtain this information about the host site due to the exceptionally high level of encryption and security. With the usage of cryptocurrencies, users’ Darknet communication becomes highly secure, enabling users to communicate, see plenty of material, and share files in confidence. The next chapter makes an introduction to the major crimes that take place on the Dark Web. Specifically, it covers drug markets and how criminals disseminate illegal substances by using the Dark Web.