1. “B”, David. (2014, January 29). Common darknet weaknesses 3: DNS leaks and application level problems, privacy PC. Available at http://privacy-pc.com/articles/common-darknet-weaknesses-3-dns-leaks-and-application-level-problems.html . Accessed Mar 2018.
2. Bearman, J., & Hanuka, T. (2015, April). The rise and fall of silk road. Wired Magazine. Available at https://www.wired.com/2015/04/silk-road-1/ .
3. Brandom, R. (2013, December 18). FBI agents tracked Harvard bomb threats despite Tor. The Verge. Available at https://www.theverge.com/2013/12/18/5224130/fbi-agents-tracked-harvard-bomb-threats-across-tor . Accessed Feb 2018.
4. Brandom, R. (2015, January 21). Feds found Silk Road 2 servers after a six-month attack on Tor. The Verge. Available at https://www.theverge.com/2015/1/21/7867471/fbi-found-silk-road-2-tor-anonymity-hack . Accessed Feb 2018.
5. Chaum, D. (1981, February). Untraceable electronic mail, return addresses, and digital pseudonyms. Communications of the ACM, 24(2), 84–89.