Security Practices

Operational Security (OPSEC)

Operational security is the practice of protecting sensitive information by analyzing what data an adversary could collect and taking steps to deny them that intelligence. In Bitcoin, OPSEC covers everything from how you buy and store bitcoin to what you say online and who knows about your holdings.

How It Works

Operational security starts with threat modeling: who are your adversaries, what are they capable of, and what information would they need to attack you? For most Bitcoin holders, the primary threats are criminals who target known holders, data breaches from exchanges and services, and oversharing personal information. Each of these threats has specific countermeasures.

Information hygiene is the foundation. Never reveal specific amounts of bitcoin you hold. Don't post screenshots of wallet balances or transaction confirmations. Avoid "laser eyes" or other Bitcoin identity signals that mark you as a holder. Be cautious at meetups and conferences — assume anything you say could be repeated. When buying from exchanges, understand that KYC data creates a permanent link between your identity and your bitcoin purchases, and that this data can be breached, subpoenaed, or sold.

Technical OPSEC includes using Tor or VPN when interacting with Bitcoin services, running your own full node to avoid leaking address queries to third parties, using dedicated devices for Bitcoin operations, and compartmentalizing your digital identity. Don't reuse email addresses between Bitcoin services and personal accounts. Don't access block explorers from your home IP to check addresses linked to your identity. Every data point you leak makes an adversary's job easier. The goal is to minimize the information available about your holdings, your custody methods, and the connection between your identity and your bitcoin.

Key Points

  • Never reveal specific amounts of bitcoin you hold — to anyone, anywhere, for any reason
  • KYC exchange data creates permanent identity-to-bitcoin links that can be breached or subpoenaed
  • Use Tor or VPN when interacting with Bitcoin services and block explorers
  • Run your own full node to avoid leaking address queries to third-party servers
  • Compartmentalize your Bitcoin identity from your personal and professional identity