Bitcoin
Peer-to-peer computing
Internet privacy
Phishing
Silk Road
Drug Enforcement Administration
Tor
Software
Computing
Underground culture