Your Privacy Checklist
Use this checklist to track your Bitcoin privacy journey. Start with the basics and work your way up as you gain knowledge and confidence.
Beginner: The Essentials
These are the absolute minimum steps everyone should take.
-
Control Your Keys
Move your bitcoin into a wallet where you control the seed phrase. If you do not control the keys, you do not control the bitcoin.
-
Never Reuse Addresses
Always use a fresh address for each receive. Address reuse is the number one privacy killer.
-
Label Your UTXOs
Know where each UTXO came from: KYC, non-KYC, CoinJoin, dust, etc.
-
Never Mix KYC and Non-KYC
Keep your KYC and non-KYC bitcoin completely separate. Never spend them together.
-
Freeze Dust UTXOs
Any UTXO under 1000 sats should be frozen. It might be a surveillance attack.
-
Do Not Look Up Addresses on Public Explorers
Searching your own addresses from your home IP leaks your interest and links you to those addresses.
Intermediate: Building Privacy
Once you have the basics, add these layers.
-
Run Your Own Node
Connect your wallet to your own node so queries do not leak to third-party servers.
-
Use a Hardware Wallet
Store your seed phrase on a dedicated hardware device that never touches the internet directly.
-
Use CoinJoin
Break the transaction graph by mixing your bitcoin with others.
-
Use Tor
Route all Bitcoin traffic through Tor to hide your IP address.
-
Practice Coin Control
Choose which UTXOs to spend. Do not let your wallet pick them automatically.
-
Use Secure Messaging
Use Signal or similar for Bitcoin discussions. Never share seed phrases over any digital channel.
Advanced: Maximum Privacy
For users who want the strongest possible privacy.
-
Use Multisig
Require multiple signatures to spend. This increases security and privacy.
-
Use PayJoin
Poison the Common Input Ownership Heuristic by having the recipient contribute an input.
-
Use GrapheneOS
A hardened Android build that provides strong isolation and privacy.
-
Self-Host Infrastructure
Run your own node, explorer, Electrum server, and Lightning node.
-
Audit Your Privacy
Learn about privacy with tools like am-i.exposed.
-
Use BIP47 or Silent Payments
Reusable payment codes that generate a fresh address for each sender.
How to Use This Checklist
- Start at the top - Complete all Beginner items first
- Move to Intermediate - Once comfortable, add Intermediate layers
- Advance gradually - Do not rush into Advanced without understanding the basics
- Test your privacy - Use tools like am-i.exposed to verify your progress
- Keep learning - Privacy is not a destination, it is a journey
You do not need to implement every single item to have good privacy. Even doing the Beginner items puts you ahead of most Bitcoin users.
Focus on the items that fit your threat model and technical ability. Build your privacy stack one layer at a time.