Privacy • Beginner
Crypto Foundations
Privacy Techniques, Wallets & Tracing
3 students enrolled
0.8 hours of content
Last updated Nov 2025
Subscription Required
Access all courses at Dark Web Academy with a subscription
View Pricing Plans →
0.0 rating
3 students
What You'll Learn
Explain core crypto concepts: keys, seeds, addresses, UTXO vs. account models, confirmations, fees, and consensus (PoW vs. PoS).
Compare privacy properties of Bitcoin, Monero, and Zcash; identify when each is appropriate.
Set up and secure hot and hardware (cold) wallets; back up and recover with BIP-39 safely.
Operate Electrum/Sparrow (BTC) and Monero GUI/CLI (XMR); configure watch-only and air-gapped workflows.
Execute end-to-end transactions with OpSec: address hygiene, change handling, avoiding address reuse, output labeling, and seed isolation.
Understand CoinJoin at a technical level (anonymity sets, coordinator models, linkage risks) and where it does/doesn’t help.
Understand Monero privacy primitives: stealth addresses, ring signatures, RingCT, decoys, and network-layer considerations.
Understand Zcash shielding (t-/z-addresses) and practical limitations.
Use Tor/Tails to reduce network-level leakage when interacting with wallets, explorers, and services.
Evaluate “mixing/tumbling” services critically: how they work, failure modes, red flags, and legal/AML risk.
Perform basic blockchain analysis: read transactions on explorers, trace flows at a high level, recognize common heuristics (peeling chains, change detection).
Swap or bridge assets with minimal leakage; understand the privacy and custody risks of exchanges, ATMs, and P2P.
Detect and respond to cryptojacking and ransomware patterns at a conceptual level.
Apply a legal/ethical decision framework (jurisdiction, AML/KYC, reporting obligations) and document a compliant, privacy-respecting workflow.
Tools & Technologies You'll Use
Privacy & OS
Tor Browser, Tails OS (live, amnesic environment)
Bitcoin (BTC)
Electrum or Sparrow (desktop wallet)
JoinMarket or Wasabi (CoinJoin implementations) — conceptual and controlled lab use
mempool.space / Blockstream Explorer (block explorers)
Monero (XMR)
Monero GUI/CLI (wallet + node/RPC, as feasible in labs)
Community Monero explorers (for read-only checks)
Zcash (ZEC)
Zecwallet Lite (or another wallet supporting shielding)
Hardware wallets (optional)
Trezor / Ledger for seed isolation and cold storage workflows
P2P / Exchange (discussion & controlled demos)
Centralized exchanges (KYC implications), P2P marketplaces (e.g., Bisq) — risk, compliance, and privacy trade-offs
Security utilities
KeePassXC (or other password manager) for seed/passphrase management
File checksum/hash utilities for wallet/ISO verification
Analysis (intro level)
OXT (heuristics overview), basic graphing via explorers; emphasis on limitations and false positives
Instructor
asdf
Founder of Dark Web Academy
OSCP | CISSP | M.S. Cybersecurity
Login to Enroll
This course includes:
- 16 video lessons
- Lifetime access
- Access on all devices
Course Curriculum
Introduction and Ethics
-
Pre-Course Warning
-
Community Introduction
-
Cybersecurity Ethics and the Dark Web
-
Course Introdudction (COMING SOON)
-
History of Cryptocurrency
Cryptocurrency Foundations
-
A History of Crypto
-
Blockchain Explained
-
Mining and the source of Funds
-
Transactions Explained
-
Crytocurrency with Hacking and Security
-
Cryptocurrency Wallets (Hot vs. Cold)
-
Blockchain Consensus (PoW vs. PoS)
Privacy and Anonymity with Crypto
-
Bitcoin vs. Monero, vs. Zcash
-
Mixing and Tumbling Services
-
CoinJoins for Anonymity
-
OpSec for Anonymous Transactions
Using Crypto
Understanding Monero
Crypto and Cyber Threats
Investigating and Analyzing Crypto
Ethics and Legal Status of Crypto
Course Final and Review
Student Reviews
No reviews yet
Be the first to share your experience with this course!