SlideShare a Scribd company logo
1 of 1
Download to read offline
1
Dark Web
Slang
Tumble
A keyword you might come across
on the deep web is tumble. It is
related to cryptocurrency and is a
method used to hide the source of
the Bitcoins. 
2
Altcoin
6
Escrow
Escrow is related to financial transactions. When there
are two parties in process of a transaction, there is a
third party (neutral) that holds the 'escrow money'.
This action is done to ensure that a transaction
payment will be made to a seller on completion of
items sent to a buyer. Until the buyer declares the
seller has met the terms of purchase, the money will
be held 'in escrow'.
Purchasing with a stolen credit
card is risky, so threat actors
need a person who will receive
the products. That person is the
dropper. 
Dropper
7 9
8
Checker BIN
Threat actors need to make sure
the stolen credit cards are in a
working state. To ensure that,
there are specific actors called
checkers. 
BIN is an acronym for Bank
Identification Number and
indicates the initial set of
4-6 digits that appear on a
card. 
Hushmail is an email provider. It is used a
lot by people on the dark web due to
privacy and end-to-end encryption. 
10
Hushmail
www.socradar.io
Bitcoins are the most
mentioned cryptocurrency on the
deep, dark, and surface web
however there are many other
derivatives of it. All the other types,
with one name, are called Altcoin.
5
3 4
You can think of Cold Storage as
an offline wallet that is completely
secure from unauthorized access. 
Also known as military time,
is UTC-0 Western European time
zone. 
Malware types are commonly
mentioned on dark web.
JavaScript Sniffer is one malware
type - it's specialty is to get the
financial data of e-
commerce customer at purchase.
Cold Storage
ZULU Time
JS Sniffer
2

More Related Content

What's hot

Cryptocurrency versus forex
Cryptocurrency versus forexCryptocurrency versus forex
Cryptocurrency versus forexHarshit Verma
 
Is bitcoin payment processor changing the payment game?
Is bitcoin payment processor changing the payment game?Is bitcoin payment processor changing the payment game?
Is bitcoin payment processor changing the payment game?Harshit Verma
 
Cryptocurrency mobile wallet development company
Cryptocurrency mobile wallet development companyCryptocurrency mobile wallet development company
Cryptocurrency mobile wallet development companyamarasophi
 
TTC16: Akbar Thobhani - Does the Bitcoin Blockchain Pave The Way For The Next...
TTC16: Akbar Thobhani - Does the Bitcoin Blockchain Pave The Way For The Next...TTC16: Akbar Thobhani - Does the Bitcoin Blockchain Pave The Way For The Next...
TTC16: Akbar Thobhani - Does the Bitcoin Blockchain Pave The Way For The Next...Maksim Izmaylov
 
Why Hacking into Your Company is so Easy
Why Hacking into Your Company is so EasyWhy Hacking into Your Company is so Easy
Why Hacking into Your Company is so EasyProtegrity
 
Behind the scenes of bitcoin protocol
Behind the scenes of bitcoin protocolBehind the scenes of bitcoin protocol
Behind the scenes of bitcoin protocolVedran Ilić-Dreven
 
What is Cryptocurrency?
What is Cryptocurrency?What is Cryptocurrency?
What is Cryptocurrency?Rakesh Ranjan
 
Understanding Blockchain: A General Introduction
Understanding Blockchain: A General IntroductionUnderstanding Blockchain: A General Introduction
Understanding Blockchain: A General IntroductionSuraj Kumar Jana
 
Become a bitcoin millionaire in the next 48hours
Become a bitcoin millionaire in the next 48hoursBecome a bitcoin millionaire in the next 48hours
Become a bitcoin millionaire in the next 48hoursAmy Borerwe
 
State of Cryptocurrency Report 2018: India
State of Cryptocurrency Report 2018: IndiaState of Cryptocurrency Report 2018: India
State of Cryptocurrency Report 2018: IndiaPundi X
 
Payment Model Strategies
Payment Model StrategiesPayment Model Strategies
Payment Model StrategiesEd Dunn
 
JAPAN MAY RECOGNIZE BITCOIN AS LEGITIMATE CURRENCY
JAPAN MAY RECOGNIZE BITCOIN AS LEGITIMATE CURRENCYJAPAN MAY RECOGNIZE BITCOIN AS LEGITIMATE CURRENCY
JAPAN MAY RECOGNIZE BITCOIN AS LEGITIMATE CURRENCYSteven Rhyner
 
Ethereum Tutorial - Ethereum Explained | What is Ethereum? | Ethereum Explain...
Ethereum Tutorial - Ethereum Explained | What is Ethereum? | Ethereum Explain...Ethereum Tutorial - Ethereum Explained | What is Ethereum? | Ethereum Explain...
Ethereum Tutorial - Ethereum Explained | What is Ethereum? | Ethereum Explain...Simplilearn
 
Making sense of cryptocurrencies
Making sense of cryptocurrenciesMaking sense of cryptocurrencies
Making sense of cryptocurrenciesshanmu m
 

What's hot (19)

What is Cryptocurrency ?
What is Cryptocurrency ?What is Cryptocurrency ?
What is Cryptocurrency ?
 
Cryptocurrency versus forex
Cryptocurrency versus forexCryptocurrency versus forex
Cryptocurrency versus forex
 
Is bitcoin payment processor changing the payment game?
Is bitcoin payment processor changing the payment game?Is bitcoin payment processor changing the payment game?
Is bitcoin payment processor changing the payment game?
 
Cryptocurrency mobile wallet development company
Cryptocurrency mobile wallet development companyCryptocurrency mobile wallet development company
Cryptocurrency mobile wallet development company
 
Cryptocurrency
CryptocurrencyCryptocurrency
Cryptocurrency
 
TTC16: Akbar Thobhani - Does the Bitcoin Blockchain Pave The Way For The Next...
TTC16: Akbar Thobhani - Does the Bitcoin Blockchain Pave The Way For The Next...TTC16: Akbar Thobhani - Does the Bitcoin Blockchain Pave The Way For The Next...
TTC16: Akbar Thobhani - Does the Bitcoin Blockchain Pave The Way For The Next...
 
Why Hacking into Your Company is so Easy
Why Hacking into Your Company is so EasyWhy Hacking into Your Company is so Easy
Why Hacking into Your Company is so Easy
 
Behind the scenes of bitcoin protocol
Behind the scenes of bitcoin protocolBehind the scenes of bitcoin protocol
Behind the scenes of bitcoin protocol
 
What is Cryptocurrency?
What is Cryptocurrency?What is Cryptocurrency?
What is Cryptocurrency?
 
What's cryptocurrency ?
What's cryptocurrency ?What's cryptocurrency ?
What's cryptocurrency ?
 
Understanding Blockchain: A General Introduction
Understanding Blockchain: A General IntroductionUnderstanding Blockchain: A General Introduction
Understanding Blockchain: A General Introduction
 
Become a bitcoin millionaire in the next 48hours
Become a bitcoin millionaire in the next 48hoursBecome a bitcoin millionaire in the next 48hours
Become a bitcoin millionaire in the next 48hours
 
State of Cryptocurrency Report 2018: India
State of Cryptocurrency Report 2018: IndiaState of Cryptocurrency Report 2018: India
State of Cryptocurrency Report 2018: India
 
Cryptocurrency
CryptocurrencyCryptocurrency
Cryptocurrency
 
Cryptocurrency
CryptocurrencyCryptocurrency
Cryptocurrency
 
Payment Model Strategies
Payment Model StrategiesPayment Model Strategies
Payment Model Strategies
 
JAPAN MAY RECOGNIZE BITCOIN AS LEGITIMATE CURRENCY
JAPAN MAY RECOGNIZE BITCOIN AS LEGITIMATE CURRENCYJAPAN MAY RECOGNIZE BITCOIN AS LEGITIMATE CURRENCY
JAPAN MAY RECOGNIZE BITCOIN AS LEGITIMATE CURRENCY
 
Ethereum Tutorial - Ethereum Explained | What is Ethereum? | Ethereum Explain...
Ethereum Tutorial - Ethereum Explained | What is Ethereum? | Ethereum Explain...Ethereum Tutorial - Ethereum Explained | What is Ethereum? | Ethereum Explain...
Ethereum Tutorial - Ethereum Explained | What is Ethereum? | Ethereum Explain...
 
Making sense of cryptocurrencies
Making sense of cryptocurrenciesMaking sense of cryptocurrencies
Making sense of cryptocurrencies
 

Similar to Dark Web Slangs-2

What is a cryptocurrency and how does it work.pdf
What is a cryptocurrency and how does it work.pdfWhat is a cryptocurrency and how does it work.pdf
What is a cryptocurrency and how does it work.pdfCrypto Currency
 
IS crypto the future
 IS crypto the future IS crypto the future
IS crypto the futureUniqueLyfe
 
Does Crypto Tracing Work?
Does Crypto Tracing Work?Does Crypto Tracing Work?
Does Crypto Tracing Work?InvestingTips
 
Top 5 Cryptocurrency Scam Risk Factors
Top 5 Cryptocurrency Scam Risk FactorsTop 5 Cryptocurrency Scam Risk Factors
Top 5 Cryptocurrency Scam Risk FactorsMaxim Kozlovsky
 
Cryptocurrency Scams | How Do You Protect Yourself?
Cryptocurrency Scams | How Do You Protect Yourself?Cryptocurrency Scams | How Do You Protect Yourself?
Cryptocurrency Scams | How Do You Protect Yourself?Money 2Conf
 
ttttttt gtttttftfgfb gtytyty Bitcoin.pdf
ttttttt gtttttftfgfb gtytyty Bitcoin.pdfttttttt gtttttftfgfb gtytyty Bitcoin.pdf
ttttttt gtttttftfgfb gtytyty Bitcoin.pdfIbrahimRaafat5
 
Cryptocurrency seminar topic presentation using MSWord.
Cryptocurrency seminar topic presentation using MSWord.Cryptocurrency seminar topic presentation using MSWord.
Cryptocurrency seminar topic presentation using MSWord.Mohd Faiz
 
What Is Cryptocurrency? This is what You Should Know
What Is Cryptocurrency? This is what You Should KnowWhat Is Cryptocurrency? This is what You Should Know
What Is Cryptocurrency? This is what You Should KnowLeandro Martins
 
Definition of Cryptocurrency
Definition of CryptocurrencyDefinition of Cryptocurrency
Definition of Cryptocurrencyterihagh
 
Cryptocurrency -A beginner's guide
Cryptocurrency -A beginner's guide Cryptocurrency -A beginner's guide
Cryptocurrency -A beginner's guide Manny Fernandez
 
How Secure Is Bitcoin?
How Secure Is Bitcoin?How Secure Is Bitcoin?
How Secure Is Bitcoin?InvestingTips
 
BEWARE: 4 TYPICAL BITCOIN SCAMS IN MINING, INVESTMENT, WALLETS, EXCHANGE
BEWARE: 4 TYPICAL BITCOIN SCAMS IN MINING, INVESTMENT, WALLETS, EXCHANGEBEWARE: 4 TYPICAL BITCOIN SCAMS IN MINING, INVESTMENT, WALLETS, EXCHANGE
BEWARE: 4 TYPICAL BITCOIN SCAMS IN MINING, INVESTMENT, WALLETS, EXCHANGESteven Rhyner
 
Top 10 cryptocurrency security tips for 2019
Top 10 cryptocurrency security tips for 2019Top 10 cryptocurrency security tips for 2019
Top 10 cryptocurrency security tips for 2019Blockchain Council
 
What is cryptocurrency? how to calculate cryptocurrency Canadian tax ?
What is cryptocurrency? how to calculate cryptocurrency Canadian tax ?What is cryptocurrency? how to calculate cryptocurrency Canadian tax ?
What is cryptocurrency? how to calculate cryptocurrency Canadian tax ?Bitcoin Wallet Canada
 
Crypto Currency.pptx
Crypto Currency.pptxCrypto Currency.pptx
Crypto Currency.pptxVinitaPawar13
 

Similar to Dark Web Slangs-2 (20)

Fraud in bank
Fraud in bankFraud in bank
Fraud in bank
 
Fraud in bank
Fraud in bankFraud in bank
Fraud in bank
 
Bitcoin Trace
Bitcoin TraceBitcoin Trace
Bitcoin Trace
 
What is a cryptocurrency and how does it work.pdf
What is a cryptocurrency and how does it work.pdfWhat is a cryptocurrency and how does it work.pdf
What is a cryptocurrency and how does it work.pdf
 
Bitcoin Pros and Cons.pptx
Bitcoin Pros and Cons.pptxBitcoin Pros and Cons.pptx
Bitcoin Pros and Cons.pptx
 
IS crypto the future
 IS crypto the future IS crypto the future
IS crypto the future
 
Does Crypto Tracing Work?
Does Crypto Tracing Work?Does Crypto Tracing Work?
Does Crypto Tracing Work?
 
Top 5 Cryptocurrency Scam Risk Factors
Top 5 Cryptocurrency Scam Risk FactorsTop 5 Cryptocurrency Scam Risk Factors
Top 5 Cryptocurrency Scam Risk Factors
 
Cryptocurrency Scams | How Do You Protect Yourself?
Cryptocurrency Scams | How Do You Protect Yourself?Cryptocurrency Scams | How Do You Protect Yourself?
Cryptocurrency Scams | How Do You Protect Yourself?
 
ttttttt gtttttftfgfb gtytyty Bitcoin.pdf
ttttttt gtttttftfgfb gtytyty Bitcoin.pdfttttttt gtttttftfgfb gtytyty Bitcoin.pdf
ttttttt gtttttftfgfb gtytyty Bitcoin.pdf
 
Cryptocurrency seminar topic presentation using MSWord.
Cryptocurrency seminar topic presentation using MSWord.Cryptocurrency seminar topic presentation using MSWord.
Cryptocurrency seminar topic presentation using MSWord.
 
What Is Cryptocurrency? This is what You Should Know
What Is Cryptocurrency? This is what You Should KnowWhat Is Cryptocurrency? This is what You Should Know
What Is Cryptocurrency? This is what You Should Know
 
Definition of Cryptocurrency
Definition of CryptocurrencyDefinition of Cryptocurrency
Definition of Cryptocurrency
 
Cryptocurrency -A beginner's guide
Cryptocurrency -A beginner's guide Cryptocurrency -A beginner's guide
Cryptocurrency -A beginner's guide
 
How Secure Is Bitcoin?
How Secure Is Bitcoin?How Secure Is Bitcoin?
How Secure Is Bitcoin?
 
BEWARE: 4 TYPICAL BITCOIN SCAMS IN MINING, INVESTMENT, WALLETS, EXCHANGE
BEWARE: 4 TYPICAL BITCOIN SCAMS IN MINING, INVESTMENT, WALLETS, EXCHANGEBEWARE: 4 TYPICAL BITCOIN SCAMS IN MINING, INVESTMENT, WALLETS, EXCHANGE
BEWARE: 4 TYPICAL BITCOIN SCAMS IN MINING, INVESTMENT, WALLETS, EXCHANGE
 
Top 10 cryptocurrency security tips for 2019
Top 10 cryptocurrency security tips for 2019Top 10 cryptocurrency security tips for 2019
Top 10 cryptocurrency security tips for 2019
 
Cryptocurrency
CryptocurrencyCryptocurrency
Cryptocurrency
 
What is cryptocurrency? how to calculate cryptocurrency Canadian tax ?
What is cryptocurrency? how to calculate cryptocurrency Canadian tax ?What is cryptocurrency? how to calculate cryptocurrency Canadian tax ?
What is cryptocurrency? how to calculate cryptocurrency Canadian tax ?
 
Crypto Currency.pptx
Crypto Currency.pptxCrypto Currency.pptx
Crypto Currency.pptx
 

More from SOCRadar Inc

Cost for Failed Certificate Management Practices
Cost for Failed Certificate Management PracticesCost for Failed Certificate Management Practices
Cost for Failed Certificate Management PracticesSOCRadar Inc
 
Types of impersonating
Types of impersonatingTypes of impersonating
Types of impersonatingSOCRadar Inc
 
Type of Threat Actor
Type of Threat ActorType of Threat Actor
Type of Threat ActorSOCRadar Inc
 
Type of Cyber Attacks
Type of Cyber AttacksType of Cyber Attacks
Type of Cyber AttacksSOCRadar Inc
 
Threat Intelligence Keys
Threat Intelligence KeysThreat Intelligence Keys
Threat Intelligence KeysSOCRadar Inc
 
Verizon's DBIR-A look into each industry
Verizon's DBIR-A look into each industryVerizon's DBIR-A look into each industry
Verizon's DBIR-A look into each industrySOCRadar Inc
 

More from SOCRadar Inc (8)

Verizon DBIR 2021
Verizon DBIR 2021Verizon DBIR 2021
Verizon DBIR 2021
 
Cost for Failed Certificate Management Practices
Cost for Failed Certificate Management PracticesCost for Failed Certificate Management Practices
Cost for Failed Certificate Management Practices
 
Types of impersonating
Types of impersonatingTypes of impersonating
Types of impersonating
 
Type of Malware
Type of MalwareType of Malware
Type of Malware
 
Type of Threat Actor
Type of Threat ActorType of Threat Actor
Type of Threat Actor
 
Type of Cyber Attacks
Type of Cyber AttacksType of Cyber Attacks
Type of Cyber Attacks
 
Threat Intelligence Keys
Threat Intelligence KeysThreat Intelligence Keys
Threat Intelligence Keys
 
Verizon's DBIR-A look into each industry
Verizon's DBIR-A look into each industryVerizon's DBIR-A look into each industry
Verizon's DBIR-A look into each industry
 

Recently uploaded

How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxMaking_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxnull - The Open Security Community
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraDeakin University
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
Unlocking the Potential of the Cloud for IBM Power Systems
Unlocking the Potential of the Cloud for IBM Power SystemsUnlocking the Potential of the Cloud for IBM Power Systems
Unlocking the Potential of the Cloud for IBM Power SystemsPrecisely
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptxLBM Solutions
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024BookNet Canada
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Alan Dix
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr LapshynFwdays
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...Fwdays
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 

Recently uploaded (20)

How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxMaking_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning era
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
Unlocking the Potential of the Cloud for IBM Power Systems
Unlocking the Potential of the Cloud for IBM Power SystemsUnlocking the Potential of the Cloud for IBM Power Systems
Unlocking the Potential of the Cloud for IBM Power Systems
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptx
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping Elbows
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptxVulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 

Dark Web Slangs-2

  • 1. 1 Dark Web Slang Tumble A keyword you might come across on the deep web is tumble. It is related to cryptocurrency and is a method used to hide the source of the Bitcoins.  2 Altcoin 6 Escrow Escrow is related to financial transactions. When there are two parties in process of a transaction, there is a third party (neutral) that holds the 'escrow money'. This action is done to ensure that a transaction payment will be made to a seller on completion of items sent to a buyer. Until the buyer declares the seller has met the terms of purchase, the money will be held 'in escrow'. Purchasing with a stolen credit card is risky, so threat actors need a person who will receive the products. That person is the dropper.  Dropper 7 9 8 Checker BIN Threat actors need to make sure the stolen credit cards are in a working state. To ensure that, there are specific actors called checkers.  BIN is an acronym for Bank Identification Number and indicates the initial set of 4-6 digits that appear on a card.  Hushmail is an email provider. It is used a lot by people on the dark web due to privacy and end-to-end encryption.  10 Hushmail www.socradar.io Bitcoins are the most mentioned cryptocurrency on the deep, dark, and surface web however there are many other derivatives of it. All the other types, with one name, are called Altcoin. 5 3 4 You can think of Cold Storage as an offline wallet that is completely secure from unauthorized access.  Also known as military time, is UTC-0 Western European time zone.  Malware types are commonly mentioned on dark web. JavaScript Sniffer is one malware type - it's specialty is to get the financial data of e- commerce customer at purchase. Cold Storage ZULU Time JS Sniffer 2