12-07-2023, 08:50 AM
it is often necessary to mix the cue balls, so I had to worry about this issue
before I often used the io cryptomixer, but refused it for a number of reasons:
- they do not work without js (this means more than 20 parameters are collected about your PC, video cards, sound, etc., putting fingerprints). It's very dangerous.
- they use external sources (google fonts) and now Google knows that you are mixing beats. And Google immediately puts everything in the database of "big brother". They can compare it with other fingerprints from your PC and correlate the chains.
- you can tear out all the guarantee letters that they store and you can also do monitoring, running through all the addresses of each new block and you can see what their turnover is. And if you imagine what special services have, then it will be very easy for them to analyze
My recommendations
- do not use 1k1 transfers! This negates all your mixing efforts.
- do not use fast transfers! The longer the delay between incoming and outgoing transactions, the greater the privacy
- Do not use previously used addresses as receiving addresses! this weakens the privacy of the transfer
- always use TOR!
altcoins
bts-exchanger-monero or zkesh (but necessarily cold wallets)-shapeshift cue
ball for monerka, put a ring of at least 12 and you will be lucky
for zkesh, a good chain:t-z-z-t, it is practically impossible to untangle, provided you work with 2 wallets on different The
scheme with altos and 2nd exchange is ideal, but requires a lot of time
before I often used the io cryptomixer, but refused it for a number of reasons:
- they do not work without js (this means more than 20 parameters are collected about your PC, video cards, sound, etc., putting fingerprints). It's very dangerous.
- they use external sources (google fonts) and now Google knows that you are mixing beats. And Google immediately puts everything in the database of "big brother". They can compare it with other fingerprints from your PC and correlate the chains.
- you can tear out all the guarantee letters that they store and you can also do monitoring, running through all the addresses of each new block and you can see what their turnover is. And if you imagine what special services have, then it will be very easy for them to analyze
My recommendations
- do not use 1k1 transfers! This negates all your mixing efforts.
- do not use fast transfers! The longer the delay between incoming and outgoing transactions, the greater the privacy
- Do not use previously used addresses as receiving addresses! this weakens the privacy of the transfer
- always use TOR!
altcoins
bts-exchanger-monero or zkesh (but necessarily cold wallets)-shapeshift cue
ball for monerka, put a ring of at least 12 and you will be lucky
for zkesh, a good chain:t-z-z-t, it is practically impossible to untangle, provided you work with 2 wallets on different The
scheme with altos and 2nd exchange is ideal, but requires a lot of time