Creating Highly Anonymous Verus IDs

Verus IDs are pseudonymous just like normal crypto addresses, but there are several ways the owner of a Verus ID may be identified, and ways to mitigate those risks for people choosing to be as anonymous as possible.

Here we’ll look at the proper use of referrers, best strategies for funding a Verus ID registration, good options for maximally private Verus ID names, considerations for the transparent and private addresses associated with the ID, and considerations regarding revocation and recovery authority assignments.

Continue reading “Creating Highly Anonymous Verus IDs”

Seriously Paranoid Cryptocurrency Key Generation

This is a guide for creating highly secure keys to use for cold storage, or more specifically in my case, to assign as the recovery authorities to Verus IDs. The goal is to generate a bulk batch of keys that have never been in a system that’s been online and come away with a copy of those keys and addresses on a pair of thumb drives (for redundancy) and the addresses (without keys) on another drive for monitoring and for reference to use those secure keys (to send to or for Verus ID authority assignments).

You will need: 4 USB drives, a computer running Linux (doable without, but that’s what these instructions are for), and optionally another computer. If you don’t have a Linux system handy but want to follow these directions, you can start by creating the boot media for the Linux live distribution, then booting into that environment, connecting to the internet, and following all of the instructions – just make sure to shut down and perform a cold boot to get back into the fresh environment (without internet) when it’s time for the secure system.

While I’ve tried to be as comprehensive as possible in my directions, it is assumed that you are somewhat familiar with the Linux command line.

Continue reading “Seriously Paranoid Cryptocurrency Key Generation”

Who Sold You Out? – How to Figure out Who Leaked Your Email Address

When setting up accounts or handing out my email address, I use a catchall on a different domain I have, giving a different mailbox to each sender.  So, for instance if I give my address to Bob’s Cream Puffs to get a coupon, it might be  You can do this with a normal (non-catch-all) address too, by using the plus sign after the mailbox name.  In my case, that would be something like  That trick even works with GMail and a number of other web services.

Continue reading “Who Sold You Out? – How to Figure out Who Leaked Your Email Address”