(IPFS), are designed to offer more open and robust services. However, they also create
opportunities for illegal activities. We demonstrate how these technologies can be used to
launch a ransomware as a service campaign. We show that criminals can transact with
affiliates and victims without having to reveal their identity. Furthermore, by exploiting the
robustness and resilience to churn of IPFS, as well as the decentralized computing …