- Joined
- 31.10.19
- Messages
- 1,369
- Reaction score
- 4,569
- Points
- 113

When engaging in illegal activity you must consider many factors that can deanonymize you.
In this article, I have grouped these factors and briefly described protection methods for you.
Main risk factors:
- Social
- Financial
- Hardware
Social Security
This type of security is based on how society perceives you. Here are the main rules:
- Don't discuss your work with anyone except partners.
- Don't throw money around if you cannot prove the legality of owning it.
- Don't meet with partners directly. If necessary, use an intermediary.
- Build your "legend" (where you work, what you do, how much you earn, etc).
Financial Security
I divide this type of security into 2 categories:
- Deposit of funds
- Withdrawal of funds
Secure combinations for depositing:
- Exchange service
- Monero wallet #1
- Monero wallet #2
- Exchange service and withdrawal to a convenient anonymous wallet (like Trust) or direct payment for services.
- Receiving cryptocurrency
- Exchange to Monero
- Monero wallet #2 (receiving "dirty" money)
- Monero wallet #1
- Exchange from Monero to a convenient option for you
Hardware Security
I divide this type of security into 2 categories:
- PC
- Communication
- VPN. Always use a VPN when accessing the internet! It's best to create your own to ensure no logging.
- Internet. For security, it's better to use a modem and an anonymous SIM card. You can top up your anonymous SIM card from the same cryptocurrency exchange services. Fiber optics provide speed advantages but pinpoint your location to your apartment. You can use fiber optics if you have an advanced security setup.
- Virtual machines. Use VirtualBox virtual machines whenever possible. If there is an attempt to identify your PC identifiers, all that can be discovered are the identifiers of the virtual machine.
- Activity separation. Your work and personal internet space should not intersect! If you conduct dark activities from the same browser where you use your own social media, the police will find you quickly. Therefore, buy an external SSD and install the operating system there and work only from there!
- Encryption. Use encryption, with TrueCrypt (or VeraCrypt) being good options. Create encrypted archives on an external SSD where you work and store all work information there.
- Think about what will happen if the police raid you in 10 minutes. Estimate the time needed to destroy evidence if they knock on your door. If you don't work from an external SSD, breaking the hard drive on a desktop PC will take much longer. Plan the approximate time needed for evidence destruction. Remember what to break and in what sequence. This rule can save you!
- Avoid using cellular communication. It's preferable to avoid it entirely! If you need to receive an SMS, use SMS receiving services. If you need to call someone, set up IP telephony.
- Maximum confidentiality online. Don't disclose your real name and surname to anyone. The same applies to eye color and other attributes. Hide your phone number in all applications, disable contact copying from the address book. Refrain from using voice messages. Always evaluate the data you give to your interlocutor.
Combo: (simplified)
- External SSD. Encrypted archive inside with data
- Modem with an anonymous SIM card --- your VPN --- proxy/internet access through a virtual machine
Combo: (basic)
- External SSD. Encrypted archive inside with data
- Modem with an anonymous SIM card --- your VPN --- virtual machine --- another VPN --- proxy/internet access
Combo: (advanced)
- External encrypted SSD. Encrypted archive with data inside
- Modem with an anonymous SIM card --- your VPN --- connection routing (Whonix) --- your VPN on another hosting --- proxy/internet access
- Linux as the main operating system
- Use of a router with an OpenVPN client
Remember: all this solutions work only together!
