Thank you Elegion for your well thought out and through answer. It is definitely a lot to think so it would be best to be safe. Would a hardware wallet be the best way to avoid many of these issues and get the coins off the exchanges? How would one scrub records from the exchanges or keep the exchanges from releasing the info to the government. I believe that personal confidentiality is very important and I would not be part of any exchange that doesn't respect that principle.
HOW TO DEAL WITH THE EXCHANGES
Because Financial Privacy is a Basic Human Right, Not a PrivilegeIntroduction
I’m sure you’re aware that once you’ve submitted your personal Identification to a company that it will be saved inside of an outdated honey pot, a proverbial treasure trove of highly exploitable information that can be sold at the highest price and to the highest bidder for more money than what the company generates in revenue. People can tell you what you want to hear and so will companies by way of cookie cutter ‘User Agreements’ and ‘Terms of Use’, wholesale documents are drawn to create a false sense of security which often indemnifies them from liability. Liability insurance against selling customer information, blocking certain accounts from withdrawal of their own funds due to credit history, financial discrimination based on geographical location, race, nationality, and political affiliation. I could go on forever, but the example’s above constitute an entire host of grossly unethical and bureaucratic procedures, justifiably aligned to fit within a socially oppressive and technocratic system of centrally planned governance.
The problem with modern compliance is that what could be considered legal today, could very well be seen as illegal tomorrow. Always remember that the laws change based on the state’s perception of a threat. And by submitting your information you’ve agreed to the rules of the state, to participate and be held liable by its arbitrary laws and regulations that govern its citizens.
But there’s a way out...
Sometimes you have people who want to just disappear, and those who want to exit the system. And now in lieu of Crypto Currencies there is a new breed of individual, an individual who desires unbridled freedom without question in the comforts of civilization; to live in the grid but on their own terms.
I’ll tell you how because I know exactly what you did and why you’re asking me this question. You’re holding substantial assets and you’re not inclined to share without a contract, you want to avoid being placed under duress, or to be threatened or coerced into either divulging or being relieved of your assets.
How would one scrub records from the exchanges or keep the exchanges from releasing my information to the government?
In your particular situation your best option for safety and security at this time is not to worry about the information you submitted to the exchanges, that information is on their databases and cannot be removed without hacking into their servers which leads to an entirely new mess. Many of these companies are managed by misguided freedom minded twenty-something-year-old libertarians, that are being constantly bombarded by regulation and threats of prison by the state. A hack on a barely regulated exchange would send their IT departments straight to the cemetery. Hey, but who knows maybe you could upload a little text file after the hack that reads; “Sorry for hacking your 100 million dollar network guys, I didn’t take any money I just had to grab my ID card really quick!”
But on a more serious note, your main objective now is to start cleaning up the mess. To either stop using these centralized exchanges or stop using them in your name.
Skills can be learned, gathered, and taught, I have more than 10 years worth of skills. Nevertheless, later in this chapter I’ll teach you a set of easy to moderate skills to help you accomplish all your current privacy focused objectives.
Another option..You could either exit the system entirely by closing all your bank accounts and choose to accept allyour payments in Bitcoin. Or you could play a game of cat and mouse with the banks and investigators where they’ll call you over the phone to ask you about your financial affairs, so they can either record it for later investigation, or sell it to either the IRS, creditors, investigators (as a verbal confession) which they’ll use in a lawsuit during a court proceeding.
Another terrible option would be to wait for them to close your bank account at the worst possible time, because the laws pertaining to crypto currencies have suddenly changed and you can no longer access your funds at the ATM machine like what happened to the people of Greece in late 2009.
Would a hardware wallet be the best way to avoid many of these issues and get the coins off the exchanges?
Hardware wallets such as the Trezor and Ledger are also know as cold storage devices and are very important tools to securing your Bitcoin or Crypto Assets, however, they cannot ensure your financial privacy and without privacy all efforts to hide your Bitcoins assets from a malicious third-party would be in vain. Before you can consider storing your crypto assets in a cold storage hardware device there are few steps you must first achieve. Bellow you will find a detailed guide on how to accomplish the best security at the most affordable cost using free to low cost tools.
Depending on your skill set and abilities you may or may-not learn something new in this tutorial, but it makes for a fantastic read nonetheless. Let’s begin...
STEP 1. Purchase a Secure VPNPurchase a VPN at Mullvad.net. I personally recommend Mullvad over any other company as they are trusted by the deep web and are the most privacy-centric service that keeps no logs, and actually destroys user data. You can purchase a VPN subscription for the amount of time you can afford within your budget.
After purchase install Mullvad VPN software on your host operating system, and choose a location. I would choose either a U.S location, Asian, or an Eastern European location. Try to stay away from countries that are considered highly suspect or have been banned from the EU.
STEP 2. Download and Install VirtualBox
Turn on your VPN and choose a location. Make sure it either stays on or you’ve turned it back on for steps
1 - 12 .
If you don’t currently have a copy of Oracle’s VirtualBox on your system then go to
https://www.virtualbox.org and download it to your system. In the next step I will show you how to create a new virtualized instance of WindowsXP 64bit or 32Bit to your machine and where to safely download it.
Install Virtual Box. If any problems arise during the installation process then uninstall the program, read the installation instructions again found at the virtualbox website, and reinstall.
If for some reason the installation process still doesn’t work then you may need to allow “Virtualization” in your Bios settings on your machine. Depending on your machine you may need to experiment by pressing such keys as,
ESC,
F1, or
F5 to boot into your Bios.
Video Instructions:
How to Enable Virtualization in Bios
https://www.youtube.com/watch?v=cAAHWWkmgekHow To Access BIOS and Enable Intel Virtualization Technology on Windows 8/8.1/10
https://www.youtube.com/watch?v=-Wa7TGjmn5M
STEP 3. Download and Install WindowsXPOnce you’ve successfully installed VirtualBox Download a free copy of FraudFox, don’t be alarmed by the name; this is only a modified version of WindowsXP that was stripped of all the bloat-ware and unnecessary and pre-installed software and third-party spyware that often comes with most Windows-based operating systems. Even though FraudFox could be used for illegal activities, your purpose – however, would be to legally preserve your financial privacy by avoiding detection. And Privacy is a human right , not a privileged. You may also notice that this Virtualized instance of Windows runs just as fast as your host OS.
Visit and download from their official page:
http://www.wickybay.xyz/2016/01/fraudfox.html
STEP 4. Installing WindowsXP on VirtualBoxLaunch VirtualBox by locating it on your system and selecting it. Now, let’s begin the FraudFox installation process:
Select the blue circle with the inscription that reads “NEW” on the top left hand side of the software screen.
- A new screen will appear
- Within this new screen you will see the words: “ Name and Operating System” bellow those words you will see a text box. Next to the words “Name:” within the textbox write any name that you wish to call your new operating system. For ease of use I would call mine WindowsXP 1.
- In the next selection screen bellow you will be required to select your operating system. Next to the words “Type:” Select “Microsoft Windows”
- In the next selection screen bellow you will be required to select your operating system’s version. Next to the words “Version:” Select “WindowsXP 64bit”
- For “Memory Size” slide the bar or select 1783MB to be allocated to this machine.
- On the last selection select the box that reads “Create a virtual hard disk now”
- Last select “next”
For the complete tutorial, please be sure to watch the video instructions bellow.
Video Instructions:Virtualbox Tutorial | Set up a Virtual Machine for free
https://www.youtube.com/watch?v=prP2HWenpmQ
STEP 5. Modify your FireFox Browser
Boot into to your new WindowsXP OS and go into the FraudFox instillation folder and launch “Firefox Portable” don’t worry your host VPN is forcing all your virtual traffic through the VPN tunnel.
Go to google and search for “Firefox latest”, and through the search results go to the official FireFox website. Download the developer edition of Firefox. This will help you reconfigure your browser and install a multitude of apps if the need arises.
Install “FireFox: Developer Edition”
Go to:
https://addons.mozilla.org and go to extensions.
Note: You may need to restart Firefox after installing some of these extensions
Let’s continue..On the top right hand corner of your FireFox browser you will see an icon that will allow you to access the setting menu which would be located here,copy and paste the address bellow to your browsers search bar to access your browser’s preference menu :
about:preferences“
In General” within Preferences uncheck the check-box that reads: “
Automatically update search engines”
Within “Search” your default search engine should be set to “duckduckgo”
For other modifications Go to
https://whoer.net to check the level of your anonymity. If you’re not at 100% then follow the instruction on the website. You may need to change the system clock on your virtual machine to match your VPNs location time.
Note: Be sure to delete all the Fraud Fox folders, and VIP72 files from the system, this isn’t that kind of job.
STEP 6. Create Your Fully Secure and Private Blockchain.info wallet and EmailStep five is one of the most crucial. Your VPN should still be on and your FireFox should have already been installed and modified. You should be logged in to you Virtual environment and be fully encrypted by this stage and ready to create an account at blockchain.info, but before you do that you’ll need an email address.
Go to mail.com and create a new email account by creating a random fake name, date of birth, and an email address and password. Write down everything to a text file detail by detail. Just in case the website decides to lock your account you’ll have a way to reactivate your account. At the very top of the textfile be sure to copy and paste your VPN’s IP address, which will be associated with this new email account you created. You should do the same for your blockchain.info account, your receiving wallet address, your 12 word seed, and password.
Once you’re email account has been created open a new tab and go to blockchain.info. Create a new account. Secure your account by writing down your MEMONIC 12 word seed, copy and paste every word into a text file within your virtual Windows environment. Copy and paste everything that will help you access your account.
But don’t phone verify the account with a phone number that you’re actually using, any hacker worth his salt can get access to that.
EXAMPLE OF TEXT FILE FORMAT:
IP ADDRESS:
----------------------------------------------------------
BLOCKCHAIN.INFO ACCOUNT
---------------------------------------------------------
Email:
Password:
Wallet ID:
Bitcoin Address:
Etherium Address:
Recovery Phrase:
1.
2.
3.
4.
5.
6.
7.
8.
9.
10.
11.
12.
---------------------------------------------------------
MAIL.COM ACCOUNT
---------------------------------------------------------
Email:
Password:
Full Name:
Security Question:
Answer:
DOB:
Customer Number:
STEP 7. Close your FireFox browser, and run Cclearner, which comes preinstalled. This will clean your cookies, DNS, etc. copy and paste your Bitcoin sending address to a text file on your host operating system. And then log out of your Windows Virtual Environment. Turn off your VPN and get back to your IP address which would be the same IP address you used to create an account at the exchange.
Again, log into your account at the exchange from your host operating system with your
VPN turned off and transfer your Bitcoins to your wallet at blockchain.info.
You may need to wait for an hour or so, so grab a cup of coffee and relax. And please, don’t do anything crazy like turn on your VPN while still logged into your account. If by any chance you’re dealing with thousands of dollars then I would personally not even touch my keyboard.
STEP 8. Log out of the exchangeLogout of your account at the exchange and close your browser.
STEP 9. Create Another Blockchain.info AccountThis will be
wallet Number 2. And it will allow you to completely remove your identity from your assets. Whether you mistakenly purchased your Bitcoins from an Exchange or from a BitcoinATM machine you’ll now be starting the process of completely liberating your self from any liability or accusation.
In order to create this wallet you must first turn on your VPN and choose a new IP address. Second step, Start VirtualBox and login to your WindowsXP virtual environment.
Use the same procedure that you used to create your first blockchain.info account. Create another textfile and copy and paste all your information neatly and professionally. Paste your new IP address at the top, username and passwords in their specific sections. You can copy and paste the following format bellow to create your text file.
EXAMPLE OF TEXT FILE FORMAT:
IP ADDRESS:
--------------------------------------------------------
BLOCKCHAIN.INFO ACCOUNT
--------------------------------------------------------
Email:
Password:
Wallet ID:
Bitcoin Address:
Etherium Address:
Recovery Phrase:
1.
2.
3.
4.
5.
6.
7.
8.
9.
10.
11.
12.
--------------------------------------------------------
MAIL.COM ACCOUNT
--------------------------------------------------------
Email:
Password:
Full Name:
Security Question:
Answer:
DOB:
STEP 10. Download Tails, We’re Going on TOR
Make sure your VPN is still turned on. You will not need to change the IP address to your VPN for downloading Tails onto your Operating System.
On your host operating system open your browser and go to the following website:
https://tails.boum.org/Download the latest version of Tails and install it on your VirtualBox instillation. Bellow I will list the step by step process on how to install Tails Safely:
- Select the blue circle with the inscription that reads “NEW” on the top left hand side of the software screen.
- A new screen will appear
- Within this new screen you will see the words: “ Name and Operating System” bellow those words you will see a text box. Next to the words “Name:” within the textbox write any name that you wish to call your new operating system. For ease of use I would call mine Tails.
- In the next selection screen bellow you will be required to select your operating system. Next to the words “Type:” Select “Linux”
- In the next selection screen bellow you will be required to select your operating system’s version. Next to the words “Version:” Select “Other Linux 64bit”
- For “Memory Size” slide the bar or select 1783MB to be allocated to this machine.
- On the last selection select the box that reads “Do not add a virtual hard disk”
For the complete tutorial, please be sure to watch the video instructions bellow.
Video Instructions:
Set up Tails 3.0 Official Release | Surf Anonymously | Virtual Box Setup
https://www.youtube.com/watch?v=GpX0m33CQ34
WARNING
ONCE YOU’VE INSTALLED TAILS DON’T START THE OPERATING SYSTEM UNTIL YOU’VE SUCCESSFULLY CHANGED YOUR VPN’S IP ADDRESS
STEP 11. Clean your Coins (Follow these steps carefully)Step1. Again, with your VPN still turned on change your VPN’s IP address. First Step, start the Tails operating system and wait for the onion to turn green and for the operating system to inform that it is active, you will be notified through a pop-up notification that will read “Tor is now ready”.
Step 2. Open the built in Tor Browser, and on the top left hand corner of your browser increase your security level to maximum. Don’t stretch your browser to full scale, a notification will warn you of the dangers of surfing with a maximized browser window in the Tor network.
Step 3. Go to Grams: Helix Light
Visit the following page : http://grams7enufi7jmdl.onion/helix/lightOfficial Reddit Support Page: https://www.reddit.com/r/grams/Now, this is a very important section, read each of my instructions bellow very carefully before you start the process of moving your funds so that you are less likely to make any mistakes:- Follow the instructions on Grams Helix Light website carefully and send the minimum amount of Bitcoins that they recommend.
- Open a new tab or a second tab next to the other and go to blockchain.info
- Within the new tab go to blockchain.info and enter the first account you created in this tutorial, it will be the account that you sent money to from the exchange.
- Again, your sending wallet will be the first blockchain.info wallet you created in this tutorial. Send the minimum amount of Bitcoins that Grams Helix Light Requires to your second blockchain.info wallet.
- I repeat, your receiving address will be the second Blockchain.info wallet you created in this tutorial. This wallet will receive all your clean coins and will separate your identity from your Bitcoins.
STEP 12. You can now buy your Hardware Wallet
And extra layer of precaution and safety would be to purchase your hardware device from the official websites of these hardware wallets and not from third party vendors.
In closing you should now be using “clean” Bitcoins or Bitcoins that aren’t directly connected to your identity or IP address. As exactly found in the last part of the tutorial above, we have tumbled the coins to a second blockchain.info wallet that you created and can personally access with a VPN.
And from that second blockchain wallet you are now free to send your money to the official hardware wallet website of your choice to place your order.
coming soon...
If for some reason you’re coins are mixed with those that aren’t accepted by some centralized company in the future then you could simply “jump the chain”. A section entitled
“STEP 13. FREE BONUS: Jumping the Chain.. Off the Chain and into the Ice, like a Crypto Savage!” will be available in a FEATURE Packed ebook entitled:
“The Crypto Anarchist’s Cook Book: Dawn of the Crypto Runner”, is a book of sheer will , an Enticing book of Tactics with a Heavy Drop of Cool.
Experience 135 pages of Pure Funky Action with Bitcoin Billionaires, Rogues, and Rebels as they throw you head-first into a labyrinth of On-chain and Off-chain tactics, and tutorials that were specifically handcrafted for the Golden Elite and the VIP Crypto Masters.
“The Crypto Anarchist’s Cook Book” Is a Real Life STEP by STEP red pill out of the Matrix to a world of your own creation and foreseeable wealth within the age of... The Crypto Runner.
[/list][/list][/list][/list][/list]