Course of action: Dealers promote their products and services on social networking or by word-of-mouth referrals. Likely potential buyers then contact these dealers by encrypted messaging applications to rearrange transactions. Payments are frequently designed using cryptocurrencies. Encryption and Privacy: Using encryption systems for illicit p