Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

That's certainly a risk.

If you're using a market that's not compromised, you trust sellers' ratings. Sellers who were police honeypots would arguably not have high ratings. Unless, of course, police had created user bot armies.

From what I've read, you place a test order, shipped to your third-party address. Relying on tracking information, you anonymously hire someone to "steal" the package, with the contents as part of the payment. To get the rest of the payment, they need to message you anonymously, and you pay well-mixed Bitcoin. You never actually meet them again.

If that works out, you place a real order, shipped to the same address. And hire someone else anonymously to "steal" the package, and drop it somewhere for you. And then pay them anonymously, with well-mixed Bitcoin. But it's gotta be a decent payment, comparable to what they could get by selling the contents.

Too iffy for me.



define 'well-mixed Bitcoin' please?

Is there a threshold that you'd use? How do you judge whether a BTC tx is well-mixed?


Between my meatspace identity and Mirimir, which is my least ~anonymous persona, well-mixed means mixing successively by three different services: A, B and C. I mix via Tor, using Whonix VM instances, and Electrum wallets. So three Whonix/Electrum instances: X, Y and Z.

    source to X via A
    A to Y via B
    B to Z via C
Bitcoin in Whonix/Electrum instance Z is available to spend, or transfer to another VM.

For transfers among ~anonymous personas, I just mix once or twice, depending on the desired compartmentalization level.


Damn, I was brain-dead when I wrote that. Make it:

    source to X via A
    X to Y via B
    Y to Z via C




Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: