Fixxx
Moder
- Joined
- 20.08.24
- Messages
- 267
- Reaction score
- 494
- Points
- 63
When engaging in illicit activities you must consider many factors that can deanonymize you.
In this article, I have grouped these factors and briefly described protection methods for you!
Main risk factors:
- Social
- Financial
- Hardware
Social Security
This type of security is based on how society perceives you. Here are the main rules:
- Do not discuss your work with anyone except partners.
- Do not throw money around if you cannot prove the legality of owning it.
- Do not meet with partners directly. If necessary, use an intermediary.
- Build your "legend" (where you work, what you do, how much you earn, etc.).
Choose remote professions to make it harder to catch you lying.
Financial Security
I divide this type of security into 2 categories:
- Deposit of funds
- Withdrawal of funds
You can create a wallet here: wallet.mymonero.com
Secure combinations for depositing:
- Exchange service
- Monero wallet #1
- Monero wallet #2
- Exchange service and withdrawal to a convenient anonymous wallet (like Trust) or direct payment for services.
Secure combinations for withdrawal:
- Receiving cryptocurrency
- Exchange to Monero
- Monero wallet #2 (receiving "dirty" money)
- Monero wallet #1
- Exchange from Monero to a convenient option for you
Hardware Security
I divide this type of security into 2 categories:
- PC
- Communication
Rule 1 - VPN. Always use a VPN when accessing the internet! It's best to create your own to ensure no logging.
Rule 2 - Internet. For security, it's better to use a modem and an anonymous SIM card. You can top up your anonymous SIM card from the same cryptocurrency exchange services. Fiber optics provide speed advantages but pinpoint your location to your apartment. You can use fiber optics if you have an advanced security setup.
Rule 3 - Virtual machines. Use VirtualBox virtual machines whenever possible. If there is an attempt to identify your PC identifiers, all that can be discovered are the identifiers of the virtual machine.
Rule 4 - Activity separation. Your work and personal internet space should not intersect! If you conduct dark activities from the same browser where you use your own social media, the police will find you quickly. Therefore, buy an external SSD and install the operating system there and work only from there!
Rule 5 - Encryption. Use encryption, with TrueCrypt (or VeraCrypt) being good options. Create encrypted archives on an external SSD where you work and store all work information there.
Rule 6 - Think about what will happen if the police raid you in 10 minutes. Estimate the time needed to destroy evidence if they knock on your door. If you don't work from an external SSD, breaking the hard drive on a desktop PC will take much longer. Plan the approximate time needed for evidence destruction. Remember what to break and in what sequence. This rule can save you!
Rule 7 - Avoid using cellular communication. It's preferable to avoid it entirely! If you need to receive an SMS, use SMS receiving services. If you need to call someone, set up IP telephony.
Rule 8 - Maximum confidentiality online. Don't disclose your real name and surname to anyone. The same applies to eye color and other attributes. Hide your phone number in all applications, disable contact copying from the address book. Refrain from using voice messages. Always evaluate the data you give to your interlocutor.
Basic security combos:
Combo: (simplified)
External SSD. Encrypted archive inside with data
Modem with an anonymous SIM card --- your VPN --- proxy/internet access through a virtual machine
Combo: (basic)
External SSD. Encrypted archive inside with data
Modem with an anonymous SIM card --- your VPN --- virtual machine --- another VPN --- proxy/internet access
Combo: (advanced)
External encrypted SSD. Encrypted archive with data inside
Modem with an anonymous SIM card --- your VPN --- connection routing (Whonix) --- your VPN on another hosting --- proxy/internet access
Any combo can be reinforced by:
- Linux as the main operating system
- Use of a router with an OpenVPN client
Remember: all that solutions work only together!
Last edited: