- Private Data / PII / Information
- Cryptocurrencies
- Networked Devices
- Legal
- Operating Systems (OSes)
- Bitcoin
- Cyber Investigation
- Local Area Network (LAN)
- Ransom / Blackmail
- Cyber Attacks
- Tor
- Cryptography
- Users Affected
- Computer Hardware
- Ransomware
- Software