diff --git a/opsec/hide_monero/.$VM_setup.drawio.bkp b/opsec/hide_monero/.$VM_setup.drawio.bkp new file mode 100644 index 0000000..0cbc41f --- /dev/null +++ b/opsec/hide_monero/.$VM_setup.drawio.bkp @@ -0,0 +1,28 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + diff --git a/opsec/hide_monero/VM_setup.drawio b/opsec/hide_monero/VM_setup.drawio new file mode 100644 index 0000000..1b112b0 --- /dev/null +++ b/opsec/hide_monero/VM_setup.drawio @@ -0,0 +1,37 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + diff --git a/opsec/hide_monero/VM_setup.png b/opsec/hide_monero/VM_setup.png new file mode 100644 index 0000000..518eeda Binary files /dev/null and b/opsec/hide_monero/VM_setup.png differ diff --git a/opsec/hide_monero/Whonix_vm_ready.png b/opsec/hide_monero/Whonix_vm_ready.png new file mode 100644 index 0000000..6ce4337 Binary files /dev/null and b/opsec/hide_monero/Whonix_vm_ready.png differ diff --git a/opsec/hide_monero/index.html b/opsec/hide_monero/index.html new file mode 100644 index 0000000..3a65d29 --- /dev/null +++ b/opsec/hide_monero/index.html @@ -0,0 +1,225 @@ + + + + + + + + + + + How to hide your monero wealth + + + + + + + + + + + + + + + + + + + + + + + +
+
+
+
+ Previous Page

nihilist - 00 / 00 / 00

+

Hide your monero wealth

+

In this tutorial I will show an setup how to hide your monero wealth, with plausible deniability provided by veracrypt

+

We need a environment very similar to Nihilism's private + sensitive vm setup, so be familiar with it before continuing. Some details mentioned in the previously tutorial will be omitted here.

+

Sensitive VM setup

+ +
+
+
+
+ + +
+
+
+
+

Initial Setup

+

According to the nihilism's tutorial, first install your kicksecure or debian host OS. Once you have done installing your host OS, start it in persistent mode first for setting up qemu/kvm

+

First install all the necessary software

+

+$sudo apt-get update;  sudo apt install --no-install-recommends qemu-kvm qemu-system-x86 libvirt-daemon-system libvirt-clients virt-manager gir1.2-spiceclientgtk-3.0 dnsmasq-base qemu-utils iptables safe-rm xz-utils 
+
+

Next run some necessary configuration

+
+
+$sudo adduser "$(whoami)" libvirt
+$sudo adduser "$(whoami)" kvm 	
+$sudo systemctl restart libvirtd 
+$sudo virsh -c qemu:///system net-autostart default
+$sudo virsh -c qemu:///system net-start default 
+
+
+

Next create a veracrypt container on another storage device, with a big enough hidden volume according to the nihilism's tutorial

+

Reboot your host OS into live mode, live mode prevents any log or other traces be written to disk. This makes sure digital forensic cannot find out the existence of our private vm

+

In theory if you have done everything correctly according to previous tutorial, we should have a plausible deniability setup available. The private VM will store our decoy monero wallet. The sensitive VM will store our real monero wallet, which contains a lot of $$$ and might be legally questionable.

+ +
+
+
+
+ +
+
+
+
+

Sensitive VM setup



+

First decrypt and mount your hidden veracrypt volume. Next setup Whonix gateway and workstation according to nihilism's tutorial.

+

Once you have done setup the Whonix vms inside the sensitive VM, copy this script so you do not need to manually define the VMs everytime rebooted.

+

+#!/bin/bash
+
+if [ $(virsh -c qemu:///system list --all | grep Whonix | wc -l) -ne 0 ];
+then
+	
+	# if the VMs are imported, remove them:
+	
+	virsh -c qemu:///system destroy Whonix-Gateway
+	virsh -c qemu:///system destroy Whonix-Workstation
+	virsh -c qemu:///system undefine Whonix-Gateway
+	virsh -c qemu:///system undefine Whonix-Workstation
+	virsh -c qemu:///system net-destroy Whonix-External
+	virsh -c qemu:///system net-destroy Whonix-Internal
+	virsh -c qemu:///system net-undefine Whonix-External
+	virsh -c qemu:///system net-undefine Whonix-Internal
+else
+	
+	
+	# if the VMs are not imported, import them:
+	
+	virsh -c qemu:///system net-define /mnt/veracrypt1/Whonix-external.xml
+	virsh -c qemu:///system net-define /mnt/veracrypt1/Whonix-internal.xml
+	virsh -c qemu:///system net-autostart Whonix-External
+	virsh -c qemu:///system net-start Whonix-External
+	virsh -c qemu:///system net-autostart Whonix-Internal
+	virsh -c qemu:///system net-start Whonix-Internal
+	virsh -c qemu:///system define /mnt/veracrypt1/Whonix-Gateway.xml
+	virsh -c qemu:///system define /mnt/veracrypt1/Whonix-Workstation.xml
+fi
+
+ +

Now we are supposed to have our sensitive whonix gateway and workstaiton ready, open them and upgrade the system

+ +

Next access monero website to get the official wallet, or use any wallet you like

+

Create a new wallet inside the sensitive workstation vm, and store the seed into the keepassx vault, remember to safely back up this VM.

+

The setup of sensitive VM is now done, use this VM only for sensitive monero transactions, if you want to have other darknet activities create another dedicated workstation.

+ +
+
+
+
+ + + +
+
+
+
+

Private VM setup



+

Now we are going to set up our private VM, this part is going to differ from nihilism's tutorial. We are going to replicate another group of whonix workstation and gateway inside the outer veracrypt volume

+

We are going to have a decoy monero wallet, this wallet will have much less money in it, and all the transactions are charity related.

+

Mount the veracrypt outer volume, remember also to input the hidden volume password, since you do not want your hidden volume get destroyed!

+

Repeat exactly what you have done in the previous section, import and setup the whonix VMs, and copy the management script to it.

+

Once done open up the workstation VM, download a monero wallet, and create a new wallet, save the seed to the local keepass database.

+

Occasionally open this private VM, and make some donations to open source project you like, so this VM is going to look like a legit active daily VM.

+
+
+
+
+ +
+
+
+
+

Emergency



+

Now we have come to the most important part, which is how to handle the situation when someone has raided your house

+

Situation one: Your computer is not power up, you can simply give adversary the outer volume password and deny the presence of hidden volume, and your sensitive activities will be safe

+

Situation two: Someone kicks the door when you are using the sensitive VM, you have to setup the emergency script and shortcut mentioned in nihilism's tutorial, test it multiple times to make sure it works!

+

You have to make sure your computer can be shutdown properly. I personally prefer a PC than a laptop, since directly unplug the power is always more reliable than a software implementation.

+
+
+
+
+ + + + +
+
+
+
+

Nihilism

+

+ Until there is Nothing left.



Creative Commons Zero: No Rights Reserved
+ +

+
+ +
+

My Links

+

+ + RSS Feed
SimpleX Chat
+ +

+
+ +
+

About nihilist

+

Donate XMR: 8AUYjhQeG3D5aodJDtqG499N5jXXM71gYKD8LgSsFB9BUV1o7muLv3DXHoydRTK4SZaaUBq4EAUqpZHLrX2VZLH71Jrd9k8


Contact: nihilist@contact.nowhere.moe (PGP)

+
+ +
+ +
+
+ + + + + + +