xmr.club ask search guides
← back home

Guides

Plain-English explainers. Each guide funnels into the directory so you can act on it. Grouped by topic — start with whichever matches what you're trying to do.

Start here — Foundation reading before you spend anything.

Privacy stack — Browser, network, and wallet hardening.

Self-custody — Picking, verifying, and protecting your wallet.

Pick a Monero wallet

Mobile, desktop, or hardware? Hot vs cold, view-key vs full custody. The decision tree + xmr.club picks for each path.

How to verify a wallet binary before running it

GPG signature check, hash verification, reproducible builds — the standard procedures for confirming a wallet download is what the project signed, not what an attacker swapped in.

How to receive XMR privately

Subaddresses per payee, view-key disclosure trade-offs, integrated addresses, and the receive-side mistakes that link your payments together on chain.

Monero cold storage — long-term safe self-custody

Paper wallets, view-only wallets, hardware wallets, multisig. Which is right for which threat model + amount, and the mistakes that quietly drain you a year later.

How to run your own Monero node

Why a personal node is the upgrade most XMR users skip, what hardware/bandwidth it needs, and the bootstrap, sync, and remote-access setup — including a Tor hidden service.

How to host a service as a Tor hidden service

Set up a .onion address for your website, wiki, or app — torrc config, hostname rotation, vanity addresses, and the operational pitfalls (clock skew, leaking real-IP via headers, descriptor uptime) that quietly de-anonymize hidden services.

How to break an on-chain link

Cluster, taint, and dust attacks rely on a continuous chain from your address to a known cluster. Five techniques to break that — XMR detour, coin-control, CoinJoin, swap-engine isolation, hop-spacing — with the operational caveats most guides skip.

Spending + swapping — Moving in and out of stables, fiat, and merchant rails.