xmr.club ask search guides
← all guides

How to spot a crypto-privacy-tool scam

Bad actors target the privacy-tool space specifically because the audience self-selects for caring less about reputational signals than the average crypto user. The deployment pattern is consistent enough that one careful read of a project's homepage tells you 80% of what you need to know. Below: the twelve patterns that show up across exit-scams, fund-freeze incidents, and outright phishing, with the questions that surface them.

Pattern 1 — Fake "no-KYC" branding

Site loudly markets "no-KYC" but withdrawal flow asks for ID at certain thresholds, certain jurisdictions, or "for security review". The marketing lie is the first signal. Test: read the privacy policy + ToS top-to-bottom; if you can't make a small withdrawal end-to-end without ID, the marketing was the bait.

Pattern 2 — Sudden "service maintenance"

An operator that's been running for 6 months posts a "service maintenance" notice that lasts 48+ hours, then says funds are stuck pending a "compliance review". Almost always the exit-scam playbook in slow motion. Test: check social media + status pages immediately, look for similar reports from other users.

Pattern 3 — Withdrawals "queued"

Deposits are instant; withdrawals are "in the queue for processing". Queue length grows. Eventually withdrawals stop entirely. Test: do a small withdrawal as your first action after signup, before sending real volume.

Pattern 4 — Anonymous operator + no track record

Anonymous operators are normal in crypto. Anonymous operators of a brand-new service with no track record + no public commitments + no community presence is different. Test: search for the operator handle across forums; look for any thread older than the service launch.

Pattern 5 — Aggressive affiliate program

Legitimate privacy services have modest affiliate programs (often 10-30% of the spread). Scam services offer 70-90% commissions to flood the search results with positive reviews. Test: search "X review" — if the top results are obvious affiliate farm content, the service is either a scam or is heading there.

Pattern 6 — Bonus / promo / yield offers

"Deposit X and get 10% bonus" or "earn 8% APY on stables" in the privacy-services space is almost always a Ponzi-shaped trap. The math doesn't work for an honest operator. Test: ask yourself where the yield comes from; if you can't answer, don't deposit.

Pattern 7 — Domain age vs claims

"We've been operating since 2018" + a domain registered last month. WHOIS or Wayback Machine reveals the contradiction. Test: whois domain.com + web.archive.org/web/*/domain.com.

Pattern 8 — Identical UI to a known operator

Pixel-clone phishing of a legitimate operator, deployed at a typo-domain or a homoglyph. Test: visit the canonical URL from a different source (bookmark, this directory, the operator's verified social) before logging in.

Pattern 9 — Unauditable rate

Swap engine that quotes worse-than-market rates by 3-5% — extracting margin claiming "best privacy" or "no-KYC premium". A legitimate aggregator (like kyc.rip) has zero markup; the engine spread is the engine's. Test: compare the quote against an aggregator + against the engines directly.

Pattern 10 — KYC-on-tail-events

No KYC at signup, no KYC at deposit, no KYC at small withdrawal. KYC at large withdrawal, or when chain analysis flags the source. The default is privacy; the exception captures users at the moment they can't easily withdraw. Test: read the ToS for "may require additional verification at our discretion".

Pattern 11 — Discord-only support

Real support → email + chat + ticket system, response within SLA. Scam support → Discord-only, slow responses, eventual ghosting + ban from the server. Test: try to find support channels other than Discord before depositing.

Pattern 12 — Frequent re-branding

Operator runs a service for a year, exit-scams, rebrands under a new domain, repeats. The team handle / operator persona is often consistent across rebrands. Test: search the listed founder / team handle and look for prior services under different domain names.

The triage flow

Before you fund any new no-KYC service:

  1. Run the 12 patterns above. Each hit is a yellow flag; two or more is a red flag.
  2. Cross-check this directory's /audit, /archive, and removal policy. If we've never listed it, we haven't tested it.
  3. Check kycnot.me, r/privacy, r/Monero for community reports.
  4. If you proceed, deposit a small amount first. Withdraw immediately. If withdrawal is clean + matched the quoted rate, you've cleared the most-common failure mode.
  5. Never send a meaningful balance to a service you haven't successfully withdrawn from at least once.

When in doubt, the listed alternatives

  • kyc.rip aggregator → /exchanges/kyc-rip-aggregator

    No markup, multi-engine routing — known-quantity swap path.

  • SideShift → /exchanges/sideshift

    Long-running no-account engine. Withdraw-first testable.

  • Trocador → /exchanges/trocador

    Long-running aggregator; verifiable Tor mirror.

  • Feather → /wallets/feather

    Wallet you control. The right default if you're unsure about a service's honesty.

More guides

Spotted a gap? submit a listing · @xmr_club · @xmrclub_bot.