
Sign up to save your podcasts
Or


When your data is taken, it doesn't fall into a void. It moves. It gets packaged. It gets priced. And while you're changing a password, someone else is deciding how many times they can reuse your name.
This episode strips away the mythology around the dark web and explains what it actually is: a part of the internet designed for anonymity that doubles as a wholesale market for stolen data. It covers how credentials are bundled and priced, why medical records cost more than credit cards, and how cybercrime today works like an assembly line with separate groups specializing in breaking in, selling, and committing fraud. The episode explains why breach headlines are a poor indicator of personal risk, why stolen data gets reused months or years later, and closes with a starter kit focused on assuming reuse, changing passwords after breaches, monitoring the right accounts consistently, and reducing how much stored data exists in the first place.
Whether you've seen your email in a breach notification and wondered what happens next or you want to understand the economics behind cybercrime, Plaintext with Rich walks you through it.
Is there a topic/term you want me to discuss next? Text me!!
YouTube more your speed? → https://links.sith2.com/YouTube
Apple Podcasts your usual stop? → https://links.sith2.com/Apple
Neither of those? Spotify’s over here → https://links.sith2.com/Spotify
Prefer reading quietly at your own pace? → https://links.sith2.com/Blog
Join us in The Cyber Sanctuary (no robes required) → https://links.sith2.com/Discord
Follow the human behind the microphone → https://links.sith2.com/linkedin
Need another way to reach me? That’s here → https://linktr.ee/rich.greene
By Rich GreeneWhen your data is taken, it doesn't fall into a void. It moves. It gets packaged. It gets priced. And while you're changing a password, someone else is deciding how many times they can reuse your name.
This episode strips away the mythology around the dark web and explains what it actually is: a part of the internet designed for anonymity that doubles as a wholesale market for stolen data. It covers how credentials are bundled and priced, why medical records cost more than credit cards, and how cybercrime today works like an assembly line with separate groups specializing in breaking in, selling, and committing fraud. The episode explains why breach headlines are a poor indicator of personal risk, why stolen data gets reused months or years later, and closes with a starter kit focused on assuming reuse, changing passwords after breaches, monitoring the right accounts consistently, and reducing how much stored data exists in the first place.
Whether you've seen your email in a breach notification and wondered what happens next or you want to understand the economics behind cybercrime, Plaintext with Rich walks you through it.
Is there a topic/term you want me to discuss next? Text me!!
YouTube more your speed? → https://links.sith2.com/YouTube
Apple Podcasts your usual stop? → https://links.sith2.com/Apple
Neither of those? Spotify’s over here → https://links.sith2.com/Spotify
Prefer reading quietly at your own pace? → https://links.sith2.com/Blog
Join us in The Cyber Sanctuary (no robes required) → https://links.sith2.com/Discord
Follow the human behind the microphone → https://links.sith2.com/linkedin
Need another way to reach me? That’s here → https://linktr.ee/rich.greene