In this chapter, we will analyze possible misuses of blockchain that lead to potential attacks on data integrity, identity theft, and the spreading of malware by leveraging blockchain features. We will learn how attackers can leverage blockchain to store illicit data and whether or not illicit data may be erased from the blockchain. We'll also discuss controversial topics such as anonymity and identity theft within blockchain and cryptocurrencies. We will also show how blockchain can be leveraged to spread malicious software such as malware.
In particular, in this chapter, we will deal with the following topics:
- Storing illicit data in the blockchain
- Preserving anonymity in the blockchain
- Dealing with identity theft
- Spreading malware with Blockchain
Let's now begin with the following section, learning how illicit data can be...