Using Stowaway, A Privacy-Enhancing Tool From Samourai Wallet

Animated cover image by @artdesignbySF.

When it comes to defensively guarding the privacy of Bitcoin users, Samourai Wallet has been on the bleeding edge for many years, bringing new features and improvements to users that help achieve anonymity through Whirlpool, its CoinJoin implementation, and to maintain privacy with spending tools like Stowaway, Stonewallx2, Ricochet and PayNyms. Samourai Wallet is also the only Bitcoin wallet to date that has implemented BIP 47. 

Additionally, it recently implemented the app-agnostic, Tor-based communication layer Soroban. Soroban brings tremendous UX improvements to users engaging with its collaborative transaction framework, “cahoots,” with tools like Stowaway and Stonewallx2. (Read more about Cahoots transactions and the  UX evolution of building the transactions manually versus using Soroban here.)

Maintaining privacy while using Bitcoin requires paying close attention to the way your transactions are being built; which inputs are being used and what kind of history your inputs are bringing with them. Common input ownership heuristics (CIOH) are used by chain analysis companies to surveil Bitcoin users. These heuristics make the assumption that when there are multiple inputs to a Bitcoin transaction, those inputs belong to the same entity. Techniques can be used to break these assumptions, thus rendering the ability of a chain analysis company to maintain such assumptions utterly indefensible. 

One technique used in the fight for privacy is a tool brought to you by Samourai Wallet called Stowaway. When someone wants to enhance their privacy while sending bitcoin, they can choose to use Stowaway, which will obfuscate the amount of bitcoin being sent in the transaction.

For example, if Bob wants to send Alice a Stowaway transaction of 0.015 bitcoin, they will both collaborate by providing inputs to the transaction. Then, one output will be given back to Bob as his change and the other output will be given to Alice with her contribution and payment. However, none of the inputs or outputs will match the 0.015 bitcoin amount.

It is necessary for Alice and Bob to communicate the timing of their transaction out of band, meaning that, in the examples below, Bob will have contacted Alice using a communication method outside of the Samourai Wallet application, such as a phone call, an end-to-end encryption text, a secure email, etc. 

To an external observer of Alice and Bob’s transaction, there is no way of determining the actual amount that was sent. The external observer can also no longer make any assumptions about the ownership of inputs and outputs to the transaction. When the external observer looks at Alice and Bob’s transaction on-chain, this is what they will see:

Cahoots transactions can be built between collaborators using Soroban, which makes the process much faster and smoother. Soroban communications happen over Tor. Here is a video example of Alice and Bob’s Stowaway transaction (this video can also be found on Samourai Wallet’s YouTube channel here, and with Spanish subtitles here.)

Alice and Bob have enhanced their privacy by breaking the common input ownership heuristics. Now, any multi-input transaction being looked at by a chain analysis company must be considered to have been a cahoots collaboration.

Here is a detailed Stowaway infographic designed by @BitcoinQ_A, which can also be found here among many other great resources:

Learn More With #GretasFury

There is growing interest from the Bitcoin community in privacy enhancing tools like Stowaway, PayNyms and BIP 47. On February 28, 2021, a group of Bitcoin privacy advocates launched operation #GretasFury. Designed to interrupt common input ownership heuristics by passing a payment torch of 1 sat transactions using Stowaway, operation #GretasFury brought together dozens of users from around the world. Each collaborator anonymously participated in the torch passes by using their PayNyms. Each Stowaway transaction that was made utilized Soroban communications over Tor. Participants managed the timing of their transaction with out-of-band communications over applications like Telegram and Matrix. 

Operation #GretasFury was organized by @biTcOinEneMiEs who maintains, an awesome self-hosted website focused on sharing Bitcoin related privacy resources, projects, and community engagement. Operation #GretasFury was a terrific way to motivate people to try out some of the available privacy tools in a way where there was a lot of community support and many seasoned participants available to answer questions and not only pass the 1 sat torch but to pass the torch of knowledge to new users.

Various sponsors donated prizes to the event to generate a sense of friendly competition as well.  

I had a chance to ask @biTcOinEneMiEs a few questions about the event and here is what we discussed:

What made you want to put operation #GretasFury together?

We had a lot of fun with PayNym Torch. BIP 47 changes bitcoin UX in a profound way. When Soroban was released by Samourai Wallet, it presented an opportunity to pass a PayNym torch without the commit transaction.

Soroban also eliminated QR code workflow for Stowaway and Stonewallx2 transactions. That was a much bigger deal. These transactions are nothing new, but suddenly a massive friction is gone. Without going into all of the reasons why cahoots transactions are amazing, we had to follow it up. If you thought PayNyms were cool, wait until you try them with Soroban and cahoots without a commit transaction. 

Who were your sponsors?

This all transpired in Keybase’s tx_tricks in December. The group did its first Soroban Stonewallx2, and the idea of a torch came shortly after. We kicked around some ideas before @SamouraiDev inspired us with the 1 sat Stowaway.

See Also

A research paper from the University of Qatar serves as a reminder that Bitcoin is not private and that it can negate the privacy of Tor users.

We didn’t contact sponsors until a couple of days before launch. I wasn’t sure what we’d really get but it was a massive outpouring of support, no questions asked. Fifteen different sponsors have contributed already. Big thanks especially to Mamushi Mobile for the Copperhead Pixel, Ronin for its new node and Foundation for two of its new Passports. These guys have really upped the excitement around #GretasFury. 

How many participants and passes of the torch have you seen?

We’ve had 33 participants and 83 passes.

Why should people care about common input ownership heuristics?

These are techniques used in chain analysis. The most nefarious use them everyday. False positives are rampant, but this won’t prevent the analysis from being used until it stops working for more than just the criminals. Average people need to say no as well.

CIOH can be crushed. The people that need to do so already are. It’s within our grasp too, with tools like Soroban Stowaway. An average Joe can pull that off today.

#GretasFury lets us learn this in a fun way, and together, send the signal of just how worthless CIOH are to catching bad guys.

In conclusion, use the tools. There are some amazing resources out there that significantly improve your privacy and help you achieve and maintain your anonymity. It is a lot easier to form good habits from the beginning rather than trying to break bad habits down the road. If you are new to Bitcoin, I encourage you to really think about the advantages of keeping your KYC out of Bitcoin and defensively guarding your privacy.

To learn more about the tools Samourai Wallet offers, check out its website or engage with the Samourai Wallet community on its Telegram channel. Or, if you’re interested in getting an overview of the Samourai Wallet and Ronin Dojo full stack, check out this guide.

A version of this article can be found on Twitter as a thread here.


Tagged : / / / / /

Latest Umbrel Update Further Improves Bitcoin Privacy, Self-Sovereignty

This week, open-source Bitcoin and Lightning Network node developer Umbrel released a significant update to its operating system, bringing a list of notable improvements to its wallet and UX, plus several additions to its celebrated Umbrel App Store. 

The Umbrel App Store was released December 2020 and has brought single-click installation of some of the most popular Bitcoin apps since then. This latest update brings the addition of Samourai Server, a explorer and LNBits.

The Umbrel v0.3.3 operating system update also allows users to easily connect to an external wallet to monitor and send transactions. This update also integrates the latest versions of Bitcoin Core (v0.21.0) and LND (v0.12.0).

About The Apps

Samourai Server is an exclusive, Umbrel-only app that runs both Samourai Dojo and Whirlpool out of the box, and provides easy, step-by-step instructions to the user so they can effortlessly connect their Samourai wallet. This represents the highest-level of privacy that you can achieve as a Samourai Wallet user, because you no longer have to trust its servers with any of your data. Also, with Whirlpool, your Umbrel can now mix your bitcoin at any time. 

Mempool is the self-hosted version of the Bitcoin blockchain explorer. It brings all of the features of to your Umbrel app, allowing you to use your Bitcoin node as a full-fledged explorer, visualize the mempool and get on-chain fee estimates. 

See Also

Bitcoin development nonprofit Brink has awarded its first fellowship to Gloria Zhao, who will work on package relay for Bitcoin mempools.

With LNbits, users can onboard their friends and family members to the Lightning Network relatively easily by hosting their wallets directly through Umbrel, without them having to worry about running a Lightning node or managing channel liquidity. 

Most Bitcoin and Lightning wallets have their own unique procedures for connecting to a personal Bitcoin node, and there isn’t a standard protocol. Some require additional steps, such as installing Tor, and some don’t, but the process isn’t obvious to most non-technically inclined people. The new wallet connector in Umbrel v0.3.3 provides easy to follow, step-by-step instructions for connecting most of the popular Bitcoin and Lightning wallets, like Electrum, Wasabi, Zap and BlueWallet. 

Combined with the seven apps that launched with the Umbrel App Store a few weeks ago (BTCPay Server, Specter Desktop, Sphinx Relay, RTL, Lightning Terminal, ThunderHub and BTC RPC Explorer), this latest update further solidifies that one-click install financial self-sovereignty is no longer a far-fetched dream with Umbrel.


Tagged : / / / / / / / /

Education Is The Best Bitcoin Investment

The tech industry abounds with buzzwords and acronyms that seem, at times, designed to exclude the ordinary user. But “UX” isn’t one of these mere buzzwords. User experience is one of the rare bits of tech shorthand that actually mean something to our customers and clients because everybody knows what bad UX looks like. 

But sometimes, great UX isn’t all that it seems, especially for new and inexperienced users. In the last Bitcoin Magazine article penned by a member of the Casa team, we examined Bitcoin’s greatest UX problem, security, and posed the question: How do we make bitcoin self custody simple?

The answer is simple, if not easy: We must teach users how to keep their coins safe by weaving education into the wider user experience, creating an environment where security becomes second nature.

The Industry’s Responsibility To Users

There are many things that distinguish Bitcoin services from other online services, but perhaps the biggest difference is the unique user base. Bitcoiners usually spend a long time reading and researching before taking the plunge. Throughout their product- and ecosystem-vetting process, they remain hungry for knowledge and eager for guidance on how to navigate this new world, with security remaining central to their decision-making methods.

This places enormous responsibility on the Bitcoin businesses that value long-term industry adoption, as well as cultivating strong product loyalty. Because our users are often investing significant amounts — in some cases, a good chunk of their life savings — into the one cryptocurrency proven to be a trusted store of value, providing them

 with products that are well-architected and thoughtfully explained, as well as providing the most up-to-date security enhancements, is critical.  

But this is a responsibility that our industry has, on the whole, shirked.

It could be argued that trading platforms, exchanges, and Bitcoin wallets have tried to educate their users on the basics. But you don’t have to go too far to find proof that they’re not doing enough to help their customers keep their coins secure. 

We’ve already outlined how the Bitcoin ecosystem is failing in its responsibilities. So, let’s look at the corrective: education. We must find a way to provide continuous learning to our users in a way that does not detract from the overall experience of buying, trading or securing our bitcoin. 

Making UX Educational 

Bitcoin companies that commit to teaching users how to stay secure will ultimately help strengthen the entire space. But how do we best go about it? 

Weave learning into the warp and weft of the Bitcoin user experience in a way that users notice as little as possible. This integration should also artfully prompt people to undertake the tasks necessary to take control of their security so both Bitcoin businesses and their users inherently acquire the skills needed to secure their coins. 

The perfect educational system is one where people don’t realize they’re learning. For example, prompting users with regular and well-timed reminders to perform simple security health checks. 

As humans are creatures of habit, creating consistent and repetitive reminder processes helps users encode best practices into their custody solutions. To accomplish this, bitcoin custody providers can ping customers with messages to turn on their computers and perform “handshakes” with their wallets, just to make sure everything is working as it should. It’s simple, takes seconds, but it also brings up important questions: Are you using private keys or public keys? Do you know the difference? Is it easy for you to find your wallet? 

Providers won’t want to overwhelm the user with constant reminders; nor would they benefit from “gamifying” the experience. Honest providers didn’t go into business to patronize our users, or to make a game out of security. Bitcoin is too serious for that.

See Also

The recent ruling that national banks can custody bitcoin raises questions

If we incorporate concise, bite-sized and well-timed reminders to complete simple tasks, however, that’s our opportunity to nudge our users to educate themselves about security best practices without detracting from the seamless experience.

But popups and e-nudges aren’t enough on their own. Yes, our users tend to be highly technically literate, and they’re usually self-taught. They look for answers in the educational resources that Bitcoin businesses provide, or through third-party YouTube tutorials. 

Sometimes, though, only a human will do. That’s why we must complement our educational resources with 24/7 access to expert advice whenever they are in need. 

Technology is increasingly devoid of human connection, and Bitcoin isn’t blameless. If we want to deliver the revolution, we need a return to healthy, positive computing. It might seem a bit “1990s” in a world of AI and chatbots, but user support on the phone, delivered by an expert who’s always there when you need them, is something we should embrace, not disparage.

So, after a year in which we’ve been more divorced from each other than ever before, let’s commit to making 2021 the year we get back in touch with our users, and give Bitcoin the human face it has lacked for so long. And let’s remember the words of Benjamin Franklin: “An investment in knowledge pays the best interest of all.”

This is a guest post by Scott Hurff. Opinions expressed are entirely their own and do not necessarily reflect those of BTC Inc or Bitcoin Magazine.


Tagged : / / / / / /

Unboxing And Review: Hodlr Disk

In this Bitcoin Magazine unboxing, Christian Keroles took a look at the brand new and very impressive Hodlr Disk by Hodlr Swiss.

The Hodlr Disk is a very impressive, robust and complete Bitcoin seed-back device. The team at Hodlr Swiss clearly thought through the main ways that a user would want to back up their Bitcoin private key seed phrase and have devised a simple and straightforward manual to guide a user through backing up their seed phrase correctly.

In the unboxing, Keroles reviewed the following:

  1. Everything that comes in the box
  2. What the device looks like
  3. What the devices feels like
  4. How to use the device
  5. Side-to-side comparison of the Hodlr Disk and the Hodlr Disk BTC edition
  6. An unprofessional opinion of the device’s strength and robustness


Tagged : / / / /

Bitcoiners Run Hardware

The internet, which is the network we currently use for our Bitcoin needs, was supposed to be decentralized, verifiable and private. But after decades of choosing comfort, ease and speed, the internet today is actually quite centralized, with millions of websites and services’ information stored in a few data centers, all of them served by a very limited number of regulated, or even state-owned providers. 

All users’ data travels through a reduced number of cables and cell towers and all of it is being identified, analyzed and allowed to go through most of the time, until now. Even the tools that are meant to liberate us from part of this global surveillance have to rely on this over-controlled infrastructure that is susceptible to attacks, seizures and censorship due to their (as desired by these tools themselves) centralized nature.

Some people believe that they can communicate and transact safely, privately and even anonymously on top of this vicious architecture because they are making use of tools that supposedly effectively hide or protect them from being easily identified — they defend the idea that they won’t be individually targeted or attacked, and that shutting down the internet in a whole region only to specifically disconnect them is too much; that neither the government nor other entities will go that far just to silence them. 

Not only has this happened already — it is happening more regularly. And the situation will only get worse because if the media we use to connect with each other are in reach of those wanting to censor or stop whatever could undermine their power, they’ll do it, no doubt.

2021 has only just begun and we are already seeing a glimpse of what lies ahead. From the targeted silencing of individuals, to the blockade of communities, the deplatforming of apps and services, the breaching and leaking of centrally-stored personally-identifiable information (PII), the levying of fines for accessing the internet through other means beyond those scrutinized by governments, and even the full shutting down of the internet in whole countries. 

Filling Bitcoin’s Infrastructure Gaps

All this just adds to what 2020 showed us. But, Bitcoin users are not affected, right? Well, that’s unfortunately not true. 

To be completely clear, we are all just being allowed to use Bitcoin today. They know we are accessing exchanges and hosted wallets from our homes’ and our phones’ IP addresses; they know we are seeding the full Bitcoin blockchain to others, they know we own a hardware wallet and that we check its balance daily (not only the price); they even know what we are running behind that VPN or that impenetrable anonymity tool we use to buy prohibited items like flags and plastic straws online. We’ll only continue being permitted to do what we do until they don’t want us to.

Luckily Bitcoin has a way to fix its own lack of a resilient infrastructure by continuing to do what it has been doing for the last decade: voluntarily coordinating the funding, development and implementation of solutions that fix each defective piece of the internet that might be undermining Bitcoin’s potential of becoming the censorship-resistant and private electronic cash that we all need. 

It all started with the creation of the hardest form of money ever made, solving problems that we thought were impossible before in a genius way.

Before Bitcoin itself falls into the pit of laziness and low time-preference in the search for swift, effortless (insecure and censorable) transactions by choosing to use IOUs instead of real, proof-of-work-backed bitcoin — mere digits stored in databases of custodial services whose stack runs on top of the infrastructure of the few, already-mentioned authorized service providers — the reborn cypherpunks have reminded us through their ideas that if we really wish to have permissionless freedom, we should not only encrypt our conversations and wait for enough confirmations, but also run our own hardware.

Thanks to them, we now have hardware wallets, because switching from centralized exchanges and hosted wallets services to lightweight wallets wasn’t enough. They even now lead the efforts to bring open-source secret elements to eliminate trusted parties completely from the equation. After it seemed that we were losing the fight against pools, miners are now updating toward a more individual and sovereign way of pooling. The few thousands of full nodes could easily be at the tens- or even hundreds of thousands in no time thanks to all of the amazing tools being built to make it as easy as possible to run the numbers, to run your own node, to run hardware.

But, what good can all of these innovations and tools be for amplifying the individual’s freedom when it all runs on top of the currently prone to be easily shut down, surveilled, targeted and seized centralized internet infrastructure? What solution do Bitcoiners have for such a crucial part of the stack needed for Bitcoin to exist? To thrive? 

The answer is hardware; Bitcoiners run hardware.

Bitcoiners Run Hardware

The part of the internet that currently poses a risk to our path to a truly unconfiscatable, permissionless, censorship-resistant Bitcoin are the internet providers (state owned and private), their cables, their towers and their desire to keep each and every one of their users identified and located at all times, tracked and surveilled. 

See Also

The Top 5 Products That Every Bitcoiner Needs

The solution to this Orwellian apparatus can be summarized as “own the cables,” or, even better, own the wireless radio frequencies by contributing to a self-sustained sovereign mesh network of hardware devices to build and provide access to the Bitcoin network, communications and data in a decentralized way, with no central servers and enough resilience to overcome any attempt at stopping us from exercising our rights to freedom of speech, of assembly and of trade.

Only open-source software and open-source hardware projects like Locha Mesh, with the goal of developing mesh networking hardware made specifically with all of this in mind, could potentially propel Bitcoin toward achieving its original plans. 

For the creation of sustainable, resilient and authoritarianism-resistant mesh networks, each user will need to be their own means of accessing the network for transmitting Bitcoin block data, transactions, messages, using apps and accessing services. They will need a mobile-first, battery-based device, small enough to be carried around in a concealed manner, so low in energy consumption that it can last for days on one charge or run on solar energy using small panels, versatile enough that can be customized for specific needs (longer range, stationary, attached to other hardware…) and open enough that it can be replicated by anyone anywhere, in case its production, distribution or even its use are also deemed to be a risk to the establishment.

This way, each person can become a node inside the peer-to-peer Locha Mesh network, routing messages that find paths through hops to reach their destinations; offering services; and connecting, transacting and getting paid in bitcoin for enabling others to exercise their rights in this crypto-anarchist, capitalist free market.

We Bitcoiners don’t only need to learn the basics of economics. Let’s open our eyes to the lies that keep the wheel moving toward the abduction of everyone’s liberties, learn the differences between custodial and non-custodial services, run the numbers, run the hardware, teach our children how to use a hardware wallet and teach our parents how to protect their wealth from state-induced inflation and expropriation. 

Let’s join the cypherpunks or become phreakers; if that’s what it takes to be able to have a truly permissionless Bitcoin, so be it.

This is a guest post by Randy Brito. Opinions expressed are entirely their own and do not necessarily reflect those of BTC Inc or Bitcoin Magazine.


Tagged : / / / / / /

Achieving Bitcoin Anonymity Through Mixers

This is a promoted article provided by BitMix.Biz

A bitcoin mixer, also known as a bitcoin blender or tumbler, is a service designed to ensure the anonymity of Bitcoin transactions using a special mixing algorithm where bitcoin from several sources are combined and mixed to rid coins of compromising traces of past transactions to hide their origin and protect the privacy and anonymity of users.

The architecture of the cryptocurrency is designed in such a way that each of the Bitcoin transactions is recorded in the public, unaltered registry on the blockchain, so that any member of the community can verify the validity of any coins transfer.

The trust in Bitcoin and, accordingly, its value in the users’ eyes is based on this. However, the use of Bitcoin itself is pseudonymous, not anonymous. This opens up opportunities for various intruders who want to find out who owns digital funds in specific wallets, usually containing large amounts of crypto, or who want to track the finances of a specific person and their origins.

“Various criminal gangs hack crypto exchanges and extract data about you and your Bitcoin address, thanks to the mandatory KYC/AML verification requirements, when you are forced to confirm your personal data, and then, using analyzers, they can find your main BTC wallet,” explained a representative of bitcoin mixer service BitMix.Biz.

Dangers Of Deanonymization

In June 2020, the marketing base of the French Bitcoin hardware wallet company Ledger was hacked, exposing a vulnerability in a system that was once considered to be one of the safest ways to store cryptocurrencies. The result of this hack was the leak of personal data and contact information of about 1 million users — that is, their names, surnames, mailing addresses, email addresses and phone numbers, as well as information about customer orders.

Although company representatives said at the time that this leak of personal data had no effect on their Ledger hardware wallets and their security, as well as on the safety of the company’s customers’ cryptocurrency, the leak poses a real danger. This appeared fully six months later, just before Christmas, when the stolen data appeared in the public domain on the darknet.

Now that user data had been disclosed, it is easy to use Bitcoin analysis programs to see how much cryptocurrency each individual has from the compromised database, as well as the origin of the coins. This information can be used, for example, by the tax service or other special services, and this is far from the worst possible consequence of a leak.

People from the stolen list became targets of phishing attacks and then the victims began to receive letters containing threats of physical violence, which would be easy to implement with the obtained data of physical addresses. Attackers are extorting the equivalent of $500 in Bitcoins for abandoning their intentions, but paying the ransom does not guarantee security or that attackers will not again extort money from victims in the future.

In recent years, there have been many reports of attacks, abductions and even murders of cryptocurrency holders, whose data has been compromised in one way or another, regardless of whether the users shared it themselves on the internet (for example, on social networks) or if it was stolen as a result of some kind of leak. This is why, if you are using or just holding cryptocurrency, you need to be extra careful.

An expert from BitMix.Biz said that: “Knowing your real data and information about the current balance of your BTC wallet, attackers can trick or, even by brute force, make you give them your funds. With Bitcoin mixers, you can break this chain.”

Using a Bitcoin mixing service can provide an extra layer of privacy that can help protect your digital finances from hackers and blockchain analytics companies, thus protecting you and your family from intruders. And Bitcoin blenders are surprisingly easy to use these days.

Use Maximum Mixing Abilities

Bitcoin mixing services have come a long way since Bitcoin was first introduced. The result of years of trial and error, undertaken by various crypto enthusiasts in an attempt to achieve the maximum level of anonymity, BitMix.Biz has absorbed the best, eliminating known disadvantages.

The service offers multilingual support, altcoin integration and other internet access methods such as Tor, Clearnet and NoJS. Users can set individual mixing fees in the range of 0.4 to 4 percent, making it even more difficult for potential attackers to analyze their blockchain activity. They can also use a “randomize” option, which, after mixing, will send more than one transaction from the mixing service to your wallet, which they target for the cleared coins, making it more difficult to analyze their cryptocurrency transaction.

See Also

“We ask for the minimum information required, solely to ensure that the harddrive is encrypted and never stores any logs,” explained the BitMix.Biz team. “All records are deleted after 72 hours or immediately upon request via the order page.”

BitMix.Biz maintains the world’s largest reserve of mixed bitcoin, so there is no need to wait for consensus of multiple mixing transactions. When a user completes a transaction by sending coins to the mixer, they instantly receive pre-cleared bitcoin from this huge pool to their address. After your first exchange of your coins for cleared ones, you receive a special code that will prevent you from receiving any of the previous bitcoin that you sent in any subsequent transactions.

A minimum of 0.005 BTC is required to use the Bitcoin mixing service BitMix.Biz. You can save your settings of the website to duplicate the mix types that you would like to use again. The Bitcoin tumbler service also supports an affiliate program that provides instant payouts for every transaction made by a referred user, as well as an API key that websites can use to provide mixed bitcoin, litecoin and dash to their customers, taking care of their customers’ safety and increasing their loyalty.

Finally, the Bitcoin mixer BitMix.Biz provides a letter of guarantee as an additional promise of integrity as well as a security measure.

“When we provide you with our Bitcoin address to which your coins should be sent for mixing, we digitally sign in a letter of guarantee to confirm that this address was indeed generated by our server,” the BitMix.Biz spokesperson said.

In addition, if any failure occurs, then with the help of a letter of guarantee within 72 hours, you can prove that you sent your coins to the service in order to resolve the issue. Another reason to entrust your cryptocurrency to this particular Bitcoin blender is a unique guarantee — a deposit of $15,000 on a special service that BitMix.Biz created to compensate for the unlikely losses of users, which allows you to trust the mixer even for large amounts of cryptocurrency. 

You can learn more about BitMix.Biz on YouTube, Twitter, Bitcoin Wiki and Bitcointalk.


Tagged : / / / / /
Bitcoin (BTC) $ 26,578.12 0.10%
Ethereum (ETH) $ 1,594.57 0.30%
Litecoin (LTC) $ 64.56 0.29%
Bitcoin Cash (BCH) $ 208.54 0.58%