❌

Normal view

There are new articles available, click to refresh the page.
Before yesterdayMain stream

The Samourai Wallet Trial: A Test of Financial Privacy and Developer Freedoms

By: Juan Galt
10 December 2025 at 16:27

Bitcoin Magazine

The Samourai Wallet Trial: A Test of Financial Privacy and Developer Freedoms

This piece is featured in the print edition of Bitcoin Magazine, The Freedom Issue. We’re sharing it here as a sample of the ideas explored throughout the full issue.

On November 3, 2025, the freedom for developers to build financial privacy software is on trial.

Samourai Wallet was a Bitcoin privacy wallet developed by Keonne Rodriguez and William Lonergan Hill. It included specialized privacy tools that mixed the coins of wallet users in ways that required no third-party custody. The service’s servers helped coordinate β€œmixing” β€” methods to conceal the origin of coins and offer users some degree of forward privacy.

Rodriguez and Hill were arrested on April 24, 2024, on two charges: conspiracy to operate an unlicensed money transmitting business and conspiracy to commit money laundering.

The U.S. Department of Justice (DoJ) accused the Samurai Wallet developers of facilitating over $2 billion in unlawful transactions through their cryptocurrency mixing service between 2015 and February 2024. Additionally, the DoJ alleges that the developers helped launder more than $100 million in criminal proceeds from illegal dark web markets, such as Silk Road and Hydra Market, as well as other hacking and fraud schemes.

The case of United States v. Rodriguez and Hill threatens the established precedents of code as speech on two major fronts.

The first regards the β€œ$2 billion in unlawful transactions” accusation. The prosecution implies that software that aids or facilitates the movement of money in any way is indistinguishable from money transmission and that it requires a money transmitter license, even if that software never holds custody of user funds. This is entirely at odds with the dynamic that had previously been established by FinCEN’s 2019 guidance and other legacy financial regulations.

The second implication is that software that defends the privacy of communications or transfer of value is not protected speech under the United States’ First Amendment.

Code is Speech

The United States has a long and unique tradition of defending freedom of speech.

Over the years, many court cases have reinforced these values, creating precedents that let developers create great software and share it online. That kind of software has made the United States the technological epicenter of the world, from AI to cryptographic finance; the freedom to build software today is critical to the economic success of the nation.

Texas v. Johnson (1989), for example, established that burning the U.S. flag in protest was indeed protected speech even though the β€œspeech” in this case was β€œfunctional”, i.e., expressed in the destruction of the flag.Β 

In the 1990s, with the rise of the internet, landmark cases like Bernstein v. United States (1996-1999) established that discussions about cryptography β€” specifically the sharing of source code involving cryptographic algorithms β€” was not a β€œmunition” governed and regulated by the Arms Export Control Act and the International Traffic in Arms Regulations. On the contrary, the publication of source code explaining how cryptography worked was expressive speech and thus fully protected under the First Amendment.

The Bernstein case marked a critical victory for the Cypherpunks of the ’90s, whose contributions to open source software laid the foundations for Bitcoin: Many of the technologies that Satoshi Nakamoto used in its construction were indeed invented in the internet forums of the time. It was there that the Cypherpunks discussed the application of cryptography to the defense of freedom of speech, digital privacy, and civil rights.Β 

In the Universal City Studios v. Corley (2001) case, however, something shifted slightly. Jon Lech Johansen, a Norwegian teenager, wrote software that jail-broke copyrighted movies from software locks placed there by Universal Studios, making movies playable in Linux systems. Eric Corley, a U.S. journalist, published the software online, which led to a massive lawsuit spearheaded by Universal Studios.Β 

This landmark case turned on the question of whether something is speech or conduct in the realm of software. It established that when speech in the form of software gained β€œfunction”, such as the breaking of a DVD encryption lock, it suddenly became a tool and could become subject to regulation.

While Corley’s free speech protections were eventually reaffirmed in the Second Circuit Court of Appeals, the distinction between source code publications as a form of expression and functional software as a tool that can be regulated was established.Β 

Despite the rulings β€” Corley even removed the copy of the DeCSS piracy software from his website β€” the damage was done. Internet civil disobedience spread the software far and wide, and the piracy wars of the 2000s raged on for years. They demonstrated not just the limits of free speech protections but also the limits of trying to enforce digital censorship.

Information simply wants to be free.

The Samourai case could face a similar challenge, and it is unclear whether β€œcode is speech” can be a sufficient defense for Rodriguez and Hill.Β 

Chink in the Armor

A controversial project that created as many loyal superusers as it did haters and critics is now on the front lines of the Biden-era lawfare, and the principle that code is speech appears to be at stake once again.Β 

As a result, it has forced critics β€” myself included β€” to rise to the defense of a wallet that, while quite successful in its adoption, made many design choices that were questionable and for which they may be judged harshly in the coming months.

One potential weak point in their defense is their alleged enabling of sanctioned parties to β€œlaunder money” through their coin-mixing service. The U.S. Attorney’s Office for the Southern District of New York (SDNY) went as far as to embed a screenshot of the Samourai wallet account welcoming sanctioned oligarchs:

The Samourai Wallet Trial: A Test of Financial Privacy and Developer Freedoms

Coin mixers are akin to the virtual private networks (VPNs) used by law-abiding citizens and criminals alike. For privacy to exist, one must be able to hide in a crowd, their choices and personal information shielded from prying eyes, and to be revealed or judged after due process.

With that, the Samourai Wallet founders did not make themselves a difficult target. If the allegations by the prosecution are true, and they knowingly helped dress up wolves in sheep’s clothing, then they likely will have to pay a price for violating sanctions doctrines. A deeply chilling legal precedent could then be set, shaping the future of digital finance and directly harming the proliferation of such technology in the United States.Β 

However, there may be hope in the change to a more crypto-friendly administration under the leadership of President Trump.

β€œI Will Defend Your Right to Self Custody” – Trump

During his keynote speech at the Bitcoin Conference in Nashville in 2024, Trump made a promise, one that he still has the opportunity to keep.Β 

He promised to β€œdefend the right to self custody”.

Without financial privacy, self custody is dramatically weakened, as seen by the growing wave of physical attacks on Bitcoiners in recent years. The liberty previously enjoyed by software developers to build self-custodial Bitcoin tools like Samourai Wallet, is on trial.

The chilling effect

The U.S. government has, for the most part, learned not to attack an already hardened legal precedent like freedom of expression. However, by going after the developers and maintainers of Samourai Wallet directly, the DoJ had a net negative effect on financial privacy in the U.S., and it spread a chilling effect among Bitcoin software developers.Β 


Immediately following the arrest of Rodriguez and Hill, Phoenix Wallet, arguably the best self-custodial Lightning wallet in the industry, exited the U.S. app stores β€” a decision made to protect their business from a U.S. government that appeared hostile to Bitcoin self-custody software. (As of April 2025, Phoenix is once more available in the U.S.) Wasabi Wallet, another financial privacy software company, stopped offering its noncustodial mixing services to the public. And wallets like Blink from El Salvador geofenced American users from their app entirely.Β 

If Trump is going to really defend the right to self custody, and stop the eventual deployment of a central bank digital currency (CBDC) in the United States (another election promise), he will have to address the need for financial privacy in the digital era and reverse the injustices set in course by the Biden administration.Β 

In one way or another, these cases will leave a mark on his presidential legacy.

Foundations of a CBDC

The Biden administration continued to sue, scrutinize, and debank the crypto industry β€” a policy that started under Obama with Operation Choke Point and ultimately resulted in Silicon Valley CEOs losing access to their bank accounts altogether.Β 

A sharp example of permissioned financial rails being abused was also witnessed in Canada in 2022 when the bank accounts of truckers and donors were frozen during the Freedom Convoy COVID protests in Ottawa, following the invocation of the Emergencies Act by then-Prime Minister Justin Trudeau.

Furthermore, top U.S. officials from the Treasury have stated that central bank digital currencies (CBDCs) would need to have strong identity tracking, even while β€œbalancing consumer privacy”, striking at a trade-off that’s sacrificing user privacy altogether:


β€œThe Report notes that β€˜a CBDC system could increase the amount of data generated on users and transactions,’ which would pose β€˜privacy and cyber security risks, but … offer opportunities for proper … supervision and law enforcement efforts.’”

Among the ideals of justice and fairness laid out by the Constitution is one where the privacy of the individual is granted by default, where there is a presumption of innocence, and the prosecution must prove the accused’s guilt beyond a reasonable doubt.

The Fourth Amendment rights of innocent Americans who were using Samourai Wallet in particular are under attack by the kind of lawfare seen in the Samourai case:

β€œThe right of the people to be secure in their persons, houses, papers, and effects, against unreasonable searches and seizures, shall not be violated, and no Warrants shall issue, but upon probable cause, supported by Oath or affirmation, and particularly describing the place to be searched, and the persons or things to be seized.”

Our homes are no longer just made of brick and stone, and our words no longer contained within those four walls. They are often digitized and transmitted, and so is the value they hold and move. Like cash in a sealed envelope, the use of financial privacy software naturally fits the protections of the Fourth Amendment, especially when no custody of funds is ever taken by the infrastructure facilitating its transit.Β 

Yet the few tools that protect this default access to privacy have been systematically attacked and undermined in the digital age, akin to the government suing envelope manufacturers as money launderers for obfuscating the contents of a person’s exchanges.

It’s actually much worse. While developers of privacy software like Samourai Wallet are harassed, legacy financial institutions, in their attempt to be compliant with KYC and AML regulations β€” the same class of regulations used to prosecute Samourai Wallet today β€” are forced to gather excessive private information from their customers in order to report anything β€œsuspicious” to the authorities.

These KYC data vaults are regularly hacked. Indeed, it’s impossible to keep them secure as they grow in size and become targets for cybercriminals, which exposes everyday people to organized crime in the form of identity theft and fraud. By 2012 in the U.S, identity fraud cost more than all other forms of theft combined, reaching over $21 billion, and this figure rose to $52 billion by the 2020s.

This surveillance infrastructure is doing profound and irreversible harm to U.S. citizens and the legacy financial system as a whole.Β 

It is nevertheless sold as the necessary evil that stops money laundering by cartels and ends terrorist financing via sanctions through mechanisms like the OFAC list. And yet it is these same banks who are regularly busted laundering hundreds of millions of dollars for cartels, like TD Bank last year, which had to pay a record fine to U.S. regulators of $3 billion. It was accused of failing to surveil $18 trillion in transactions, of which close to $700 million was allegedly moved by drug cartels. Despite all the regulations and compliance, it turns out it was the banks that were doing the bulk of the money laundering.

When it comes to sanctions, meanwhile, Russia has received the worst lot of U.S. sanctions in recent memory, perhaps in history, including freezing its foreign treasury reserves. Despite that, Russia has run over major territories in Ukraine during the invasion and managed to survive long enough to be in a very strong negotiating position on the other side of the conflict β€” effectively marking the end of the sanctions foreign policy regime. It is no coincidence that the Trump administration is so focused on tariffs, overseeing the flow of goods across borders instead of the flow of money.Β 


Also, let us not forget that when it comes to terrorist financing, it was the CIA that funded and trained the Afghan Mujaheddin in the ’80s, training guerrilla operatives like Osama bin Laden, who later on helped create Al Qaeda and carried out 9/11.Β Β 

None of these crimes were done by Bitcoin or Bitcoiners. But the consequences of these laws weigh heavily on civilian populations. And the exponential growth of identity theft, the demoralizing ironies of the war on cash, the micromanagement overhead of the public’s finances, and the chilling effect on privacy-oriented software developers are the direct consequence of the KYC panopticon being constructed all around us.Β 

All these policies can be summed up as flash points in the war on cash, a broad policy strategy of the pre-Trump era, that I believe was meant to set a foundation for the deployment of CBDCs, a state monstrosity that Trump specifically promised to protect us from.

Lesson Learned

The biggest concern I had with the Samourai Wallet’s mobile app was its backend design. Ambitious and commendable as it was to try and bring cutting-edge, self-custodial coin mixing to the masses, in order to achieve it, Samourai Wallet made some questionable compromises β€” compromises which competitors and critics doubted were worth the upside and which can be judged in the trial as well. The most obvious problem was the way the mobile client was said to handle the xpubs of their users.

Xpubs are very important cryptographic information in Bitcoin and crypto wallets. Similar to IP addresses in the world of VPNs, xpubs represent a key piece of identifying information for Bitcoin users. Anyone who has your xpub can deterministically recreate all public addresses you ever had or ever will have in that wallet, allowing them to know exactly what public Bitcoin addresses are within your control and which funds have moved through them.

In the marketing and debates about VPNs β€” which are in some sense the early web’s equivalent to Bitcoin mixers β€” IP addresses, and whether a service can or cannot keep IP logs, is critical to their credibility among a savvy user base. Services often boast about their processes and procedures around not keeping their users’ IP addresses, which, if shut down β€” as Samourai Wallet has been β€” could end up in the hands of prosecutors, compromising the browsing history of their users.

In the case of Samourai Wallet and xpubs, a similar rule of thumb should apply. Internet users throughout the decades have discovered that paranoia about the quality of the tools and implementations pays off in the end. This lesson has been learned the hard way as VPN services and privacy-oriented email providers have been hacked or seized by government prosecutors. If there’s user data accumulated, the service can become a juicy target.

We don’t yet know what data Samourai Wallet had in the 17 terabytes confiscated by the U.S. government. Most of it is likely on-chain analysis done by their research arm OXT. But if user data was kept, then the privacy of many of those users might be at risk as well.

The Trump Legacy?Β 

It is fascinating that the future of software developers and their freedom to build private self-custody software will be judged and shaped in an age where Michael Saylor argues that the coin is not a currency and Trump, the self-branded crypto president, promises to protect your self-custody rights.

As Rodriguez and Hill stand trial, those wrapping themselves in the orange flag and those who can influence public policy about financial privacy will also be on trial in the court of public opinion; history will be their judge.

For us plebs who cannot influence public policy directly and can only judge the tools we use on their merit, there is a moral to this story. Compromising on privacy for convenience β€” to avoid the learning curve otherwise required β€” does not come without risk.

And on a long enough time frame, only the paranoid crypto-anarchists survive.

This piece is featured in the print edition of Bitcoin Magazine, The Freedom Issue. We’re sharing it here as a sample of the ideas explored throughout the full issue.

This post The Samourai Wallet Trial: A Test of Financial Privacy and Developer Freedoms first appeared on Bitcoin Magazine and is written by Juan Galt.

Spot Crypto Assets Get Nod For Trading On CFTC-Registered Futures Exchanges

4 December 2025 at 12:58

The US Commodity Futures Trading Commission (CFTC) announced on Thursday that spot crypto asset contracts will soon be available for trading on futures exchanges that are registered with the agency, aligning with the positive regulatory changes championed by President Donald Trump’s administration.Β 

Crypto Sprint Progress

The CFTC disclosed that this recent decision follows recommendations from the President’s Working Group on Digital Asset Markets and insights gathered from the CFTC’s Crypto Sprint initiative, as well as collaborative efforts with the Securities and Exchange Commission (SEC).Β 

Acting CFTC Chairman Caroline Pham highlighted the importance of providing Americans with access to safe and regulated markets, stating, β€œRecent events on offshore exchanges have shown us how essential it is for Americans to have more choice and access to safe, regulated US markets.”

In addition to the introduction of spot trading, the Crypto Sprint initiative includes measures to enable tokenized collateralβ€”such as stablecoinsβ€”within derivatives markets.Β 

The CFTC also plans to implement regulatory updates to facilitate the use of blockchain technology in various operational areas, including collateral, margin, clearing, settlement, reporting, and recordkeeping.

Historic Shift In CFTC’s Digital Asset Trading Move

Market expert MartyParty on social media stated that this latest move is an historic decision that will empower retail and institutional traders to buy, sell, and leverage crypto assets directly on CFTC-registered exchanges. MartyParty further noted:

It’s the culmination of years of regulatory groundwork, including a joint SEC-CFTC statement clarifying that existing laws already permit such trading on registered venues.

Pham remarked on the collaborative efforts of the administration, stating that President Trump’s leadership has fostered a comprehensive plan for the US to reclaim its status as a global leader in digital asset markets. As she noted, β€œThe CFTC has a central role to play” in this initiative.

Crypto

Featured image from DALL-E, chart from TradingView.comΒ 

How to Remove Your Personal Information From the Internet

11 October 2025 at 08:31

Chances are, you have more personal information posted online than you think.

In 2024, the U.S. Federal Trade Commission (FTC) reported that 1.1 million identity theft complaints were filed, where $12.5 billion was lost to identity theft and fraud overallβ€”a 25% increase over the year prior.

What fuels all this theft and fraud? Easy access to personal information.

Here’s one way you can reduce your chances of identity theft: remove your personal information from the internet.

Scammers and thieves can get a hold of your personal information in several ways, such as information leaked in data breaches, phishing attacks that lure you into handing it over, malware that steals it from your devices, or by purchasing your information on dark web marketplaces, just to name a few.

However, scammers and thieves have other resources and connections to help them commit theft and fraudβ€”data broker sites, places where personal information is posted online for practically anyone to see. This makes removing your info from these sites so important, from both an identity and privacy standpoint.

Data brokers: Collectors and aggregators of your information

Data broker sites are massive repositories of personal information that also buy information from other data brokers. As a result, some data brokers have thousands of pieces of data on billions of individuals worldwide.

What kind of data could they have on you? A broker may know how much you paid for your home, your education level, where you’ve lived over the years, who you’ve lived with, your driving record, and possibly your political leanings. A broker could even know your favorite flavor of ice cream and your preferred over-the-counter allergy medicine thanks to information from loyalty cards. They may also have health-related information from fitness apps. The amount of personal information can run that broadly, and that deeply.

With information at this level of detail, it’s no wonder that data brokers rake in an estimated $200 billion worldwide every year.

Sources of your information

Your personal information reaches the internet through six main methods, most of which are initiated by activities you perform every day. Understanding these channels can help you make more informed choices about your digital footprint.

Digitized public records

When you buy a home, register to vote, get married, or start a business, government agencies create public records that contain your personal details. These records, once stored in filing cabinets, are now digitized, accessible online, and searchable by anyone with an internet connection.

Social media sharing and privacy gaps

Every photo you post, location you tag, and profile detail you share contributes to your digital presence. Even with privacy settings enabled, social media platforms collect extensive data about your behavior, relationships, and preferences. You may not realize it, but every time you share details with your network, you are training algorithms that analyze and categorize your information.

Data breaches

You create accounts with retailers, healthcare providers, employers, and service companies, trusting them to protect your information. However, when hackers breach these systems, your personal information often ends up for sale on dark web marketplaces, where data brokers can purchase it. The Identity Theft Research Center Annual Data Breach Report revealed that 2024 saw the second-highest number of data compromises in the U.S. since the organization began recording incidents in 2005.

Apps and ad trackers

When you browse, shop, or use apps, your online behavior is recorded by tracking pixels, cookies, and software development kits. The data collectedβ€”such as your location, device usage, and interestsβ€”is packaged and sold to data brokers who combine it with other sources to build a profile of you.

Loyalty programs

Grocery store cards, coffee shop apps, and airline miles programs offer discounts in exchange for detailed purchasing information. Every transaction gets recorded, analyzed, and often shared with third-party data brokers, who then create detailed lifestyle profiles that are sold to marketing companies.

Data broker aggregators

Data brokers act as the hubs that collect information from the various sources to create comprehensive profiles that may include over 5,000 data points per person. Seemingly separate pieces of information become a detailed digital dossier that reveals intimate details about your life, relationships, health, and financial situation.

The users of your information

Legally, your aggregated information from data brokers is used by advertisers to create targeted ad campaigns. In addition, law enforcement, journalists, and employers may use data brokers because the time-consuming pre-work of assembling your data has largely been done.

Currently, the U.S. has no federal laws that regulate data brokers or require them to remove personal information if requested. Only a few states, such as Nevada, Vermont, and California, have legislation that protects consumers. In the European Union, the General Data Protection Regulation (GDPR) has stricter rules about what information can be collected and what can be done with it.

On the darker side, scammers and thieves use personal information for identity theft and fraud. With enough information, they can create a high-fidelity profile of their victims to open new accounts in their name. For this reason, cleaning up your personal information online makes a great deal of sense.

Types of personal details to remove online

Understanding which data types pose the greatest threat can help you prioritize your removal efforts. Here are the high-risk personal details you should target first, ranked by their potential for harm.

Highest priority: Identity theft goldmines

  • Social Security Number (SSN) with full name and address: This combination provides everything criminals need for identity theft, leading to fraudulent credit accounts, tax refund theft, and employment fraud that may take years to resolve, according to the FTC.
  • Financial account information: Bank account numbers, credit card details, and investment account information enable direct financial theft. Even partial account numbers can be valuable when combined with other personal details from data breaches.
  • Driver’s license and government-issued ID information: These serve as primary identity verification for many services and can be used to bypass security measures at financial institutions and government agencies.

High priority: Personal identifiers

  • Full name combined with home address: This pairing makes you vulnerable to targeted scams and physical threats, while enabling criminals to gather additional information about your household and family members.
  • Date of birth: Often used as a security verification method, your DOB combined with other identifiers can unlock accounts and enable age-related targeting for scams.
  • Phone numbers: This information enables SIM swapping, where criminals take control of your phone number to bypass two-factor authentication and access your accounts.

Medium-high priority: Digital and health data

  • Email addresses: Your primary email serves as the master key to password resets across multiple accounts, while secondary emails can reveal personal interests and connections that criminals exploit in social engineering.
  • Medical and health app data: This is highly sensitive information that can be used for insurance discrimination, employment issues, or targeted health-related scams.
  • Location data and photos with metadata: Reveals your daily patterns, workplace, home address, and frequented locations. Photos with embedded GPS coordinates can expose your exact whereabouts and enable stalking or burglary.

Medium priority: Account access points

  • Usernames and account handles: These help criminals map your digital footprint across platforms to discover your personal interests, connections, and even potential security questions answers. They also enable account impersonation and social engineering against your contacts.

When prioritizing your personal information removal efforts, focus on combinations of data rather than individual pieces. For example, your name alone poses minimal risk, but your name combined with your address, phone number, and date of birth creates a comprehensive profile that criminals can exploit. Tools such as McAfee Personal Data Cleanup can help you identify and remove these high-risk combinations from data broker sites systematically.

Step-by-step guide to finding your personal data online

  1. Targeted search queries: Search for your full name in quotes (β€œJohn Smith”), then combine it with your city, phone number, or email address. Try variations like β€œJohn Smith” + β€œ123 Main Street” or β€œJohn Smith” + β€œ555-0123”. Don’t forget to search for old usernames, maiden names, or nicknames you’ve used online. Aside from Google, you can also check Bing, DuckDuckGo, and people search engines.
  2. Major data broker and people search sites: Search for yourself in common data aggregators: Whitepages, Spokeo, BeenVerified, Intelius, PeopleFinder, and Radaris. Take screenshots of what you find as documentation. To make this process manageable, McAfee Personal Data Cleanup scans some of the riskiest data broker sites and shows you which ones are selling your personal info.
  3. Social media platforms and old accounts: Review your Facebook, Instagram, LinkedIn, Twitter, and other platforms for publicly visible personal details. Check old accountsβ€”dating sites, forums, gaming platforms, or professional networks. Look for biographical information, location data, contact details, photos, and even comment sections where you may have shared details.
  4. Breach and dark web monitoring tools: Have I Been Pwned and other identity monitoring services can help you scan the dark web and discover if your email addresses or phone numbers appear in data breaches.
  5. Ongoing monitoring alerts: Create weekly Google Alerts for your and your family member’s full name, address combinations, and phone number. Some specialized monitoring services can track once your information appears on new data broker sites or gets updated on existing ones.
  6. Document everything in a tracker: Create a spreadsheet or document to systematically track your findings. Include the website name and URL, the specific data shown, contact information for removal requests, date of your opt-out request, and follow-up dates. Many sites require multiple follow-ups, so having this organized record is essential for successful removal.

This process takes time and persistence, but services such as McAfee Personal Data Cleanup can continuously monitor for new exposures and manage opt-out requests on your behalf. The key is to first understand the full scope of your online presence before beginning the removal process.

Remove your personal information from the internet

Let’s review some ways you can remove your personal information from data brokers and other sources on the internet.

Request to remove data from data broker sites

Once you have found the sites that have your information, the next step is to request to have it removed. You can do this yourself or employ services such as McAfee’s Personal Data Cleanup, which can help manage the removal for you depending on your subscription. ​It also monitors those sites, so if your info gets posted again, you can request its removal again.

Limit the data Google collects

You can request to remove your name from Google search to limit your information from turning up in searches. You can also turn on β€œAuto Delete” in your privacy settings to ensure your data is deleted regularly. Occasionally deleting your cookies or browsing in incognito mode prevents websites from tracking you. If Google denies your initial request, you can appeal using the same tool, providing more context, documentation, or legal grounds for removal. Google’s troubleshooter tool may explain why your request was deniedβ€”either legitimate public interest or newsworthinessβ€”and how to improve your appeal.

It’s important to know that the original content remains on the source website. You’ll still need to contact website owners directly to have your actual content removed. Additionally, the information may still appear in other search engines.

Delete old social media accounts

If you have old, inactive accounts that have gone by the wayside such as Myspace or Tumblr, you may want to deactivate or delete them entirely. For social media platforms that you use regularly, such as Facebook and Instagram, consider adjusting your privacy settings to keep your personal information to the bare minimum.

Remove personal info from websites and blogs

If you’ve ever published articles, written blogs, or created any content online, it is a good time to consider taking them down if they no longer serve a purpose. If you were mentioned or tagged by other people, it is worth requesting them to take down posts with sensitive information.

Delete unused apps and restrict permissions in those you use

Another way to tidy up your digital footprint is to delete phone apps you no longer use as hackers are able to track personal information on these and sell it. As a rule, share as little information with apps as possible using your phone’s settings.

Remove your info from other search engines

  • Bing: Submit removal requests through Bing’s Content Removal tool for specific personal information like addresses, phone numbers, or sensitive data. Note that Bing primarily crawls and caches content from other websites, so removing the original source content first will prevent re-indexing.
  • Yahoo: Yahoo Search results are powered by Bing, so use the same Bing Content Removal process. For Yahoo-specific services, contact their support team to request removal of cached pages and personal information from search results.
  • DuckDuckGo and other privacy-focused engines: These search engines don’t store personal data or create profiles, but pull results from multiple sources. We suggest that you focus on removing content from the original source websites, then request the search engines to update their cache to prevent your information from reappearing in future crawls.

Escalate if needed

After sending your removal request, give the search engine or source website 7 to 10 business days to respond initially, then follow up weekly if needed. If a website owner doesn’t respond within 30 days or refuses your request, you have several escalation options:

  • Contact the hosting provider: Web hosts often have policies against sites that violate privacy laws
  • File complaints: Report to your state attorney general’s office or the Federal Trade Commission
  • Seek legal guidance: For persistent cases involving sensitive information, consult with a privacy attorney

For comprehensive guidance on website takedown procedures and your legal rights, visit the FTC’s privacy and security guidance for the most current information on consumer data protection. Direct website contact can be time-consuming, but it’s often effective for removing information from smaller sites that don’t appear on major data broker opt-out lists. Stay persistent, document everything, and remember that you have legal rights to protect your privacy online.

Remove your information from browsers

After you’ve cleaned up your data from websites and social platforms, your web browsers may still save personal information such as your browsing history, cookies, autofill data, saved passwords, and even payment methods. Clearing this information and adjusting your privacy settings helps prevent tracking, reduces targeted ads, and limits how much personal data websites can collect about you.

  • Clear your cache: Clearing your browsing data is usually done by going to Settings and looking for the Privacy and Security section, depending on the specific browser. This is applicable in Google Chrome, Safari, Firefox, Microsoft Edge, as well as mobile phone operating systems such as Android and iOS.
  • Disable autofill: Autofill gives you the convenience of not having to type your information every time you accomplish a form. That convenience has a risk, thoughβ€”autofill saves addresses, phone numbers, and even payment methods. To prevent websites from automatically populating forms with your sensitive data, disable the autofill settings independently. For better security, consider using a dedicated password manager instead of browser-based password storage.
  • Set up automatic privacy protection: Set up your browsers to automatically clear cookies, cache, and site data when you close them. This ensures your browsing sessions don’t leave permanent traces of your personal information on your device.
  • Use privacy-focused search engines: Evaluate the possibility of using privacy-focused search engines like DuckDuckGo as your default. These proactive steps significantly reduce how much personal information browsers collect and store about your online activities.

Get your address off the internet

When your home address is publicly available, it can expose you to risks like identity theft, stalking, or targeted scams. Taking steps to remove or mask your address across data broker sites, public records, and even old social media profiles helps protect your privacy, reduce unwanted contact, and keep your personal life more secure.

  1. Opt out of major data broker sites: The biggest address exposers are Whitepages, Spokeo, and BeenVerified. Visit their opt-out pages and submit removal requests using your full name and current address. Most sites require email verification and process removals within 7-14 business days.
  2. Contact public records offices about address redaction: Many county and state databases allow address redaction for safety reasons. File requests with your local clerk’s office, voter registration office, and property records department. Complete removal isn’t always possible, but some jurisdictions offer partial address masking.
  3. Enable WHOIS privacy protection on domain registrations: If you own any websites or domains, request your domain registrar to add privacy protection services to replace your personal address with the registrar’s information.
  4. Review old forum and social media profiles: Check your profiles on forums, professional networks, and social platforms where you may have shared your address years ago. Delete or edit posts containing location details, and update bio sections to remove specific address information.
  5. Verify removal progress: Every month, do a search of your name and address variations on different search engines. You also can set up Google Alerts to monitor and alert you when new listings appear. Most data broker removals need to be renewed every 6-12 months as information gets re-aggregated.

The cost to delete your information from the internet

The cost to remove your personal information from the internet varies, depending on whether you do it yourself or use a professional service. Read the guide below to help you make an informed decision:

DIY approach

Removing your information on your own primarily requires time investment. Expect to spend 20 to 40 hours looking for your information online and submitting removal requests. In terms of financial costs, most data brokers may not charge for opting out, but other expenses could include certified mail fees for formal removal requestsβ€”about $3-$8 per letterβ€”and possibly notarization fees for legal documents. In total, this effort can be substantial when dealing with dozens of sites.

Professional removal services

Depending on which paid removal and monitoring service you employ, basic plans typically range from $8 to $25 monthly while annual plans, which often provide better value, range from $100 to $600. Premium services that monitor hundreds of data broker sites and provide ongoing removal can cost $1,200-$2,400 annually.

The difference in pricing is driven by several factors. This includes the number of data broker sites to be monitored, which could cover more than 200 sites, and the scope of removal requests which may include basic personal information or comprehensive family protection. The monitoring frequency and additional features such as dark web monitoring, credit protection, and identity restoration support and insurance coverage typically command higher prices.

The value of continuous monitoring

The upfront cost may seem significant, but continuous monitoring provides essential value. A McAfee survey revealed that 95% of consumers’ personal information ends up on data broker sites without their consent. It is possible that after the successful removal of your information, it may reappear on data broker sites without ongoing monitoring. This makes continuous protection far more cost-effective than repeated one-time cleanups.

Services such as McAfee Personal Data Cleanup can prove invaluable, as it handles the initial removal process, as well as ongoing monitoring to catch when your information resurfaces, saving you time and effort while offering long-term privacy protection.

Aside from the services above, comprehensive protection software can help safeguard your privacy and minimize your exposure to cybercrime with these offerings such as:

  • An unlimited virtual private network to make your personal information much more difficult to collect and track
  • Identity monitoring that tracks and alerts you if your specific personal information is found on the dark web
  • Identity theft coverage and restoration helps you pay for legal fees and travel expenses, and further assistance from a licensed recovery pro to repair your identity and credit
  • Other features such as safe browsing to help you avoid dangerous links, bad downloads, malicious websites, and more online threats when you’re online

So while it may seem like all this rampant collecting and selling of personal information is out of your hands, there’s plenty you can do to take control. With the steps outlined above and strong online protection software at your back, you can keep your personal information more private and secure.

Essential steps if your information is found on the dark web

Unlike legitimate data broker sites, the dark web operates outside legal boundaries where takedown requests don’t apply. Rather than trying to remove information that’s already circulating, you can take immediate steps to reduce the potential harm and focus on preventing future exposure. A more effective approach is to treat data breaches as ongoing security issues rather than one-time events.

Both the FTC and Cybersecurity and Infrastructure Security Agency have released guidelines on proactive controls and continuous monitoring. Here are key steps of those recommendations:

  1. Change your passwords immediately and enable multi-factor authentication. Start with your most critical accountsβ€”banking, email, and any services linked to financial information. Create unique, strong passwords for each account and enable MFA where possible for an extra layer of protection.
  2. Monitor your financial accounts and credit reports closely. Check your bank statements, credit card accounts, and investment accounts for any unauthorized activity. Request your free annual credit reports from all three major bureaus and carefully review them for accounts you didn’t open or activities you don’t recognize.
  3. Place fraud alerts or credit freezes. Contact Equifax, Experian, and TransUnion to place fraud alerts, which require creditors to verify your identity before approving new accounts. Better yet, consider a credit freeze to block access to your credit report entirely until you lift it.
  4. Replace compromised identification documents if necessary. If your Social Security number, driver’s license, or passport information was exposed, contact the appropriate agencies to report the breach and request new documents. IdentityTheft.gov provides step-by-step guidance for replacing compromised documents.
  5. Set up ongoing identity monitoring and protection. Consider using identity monitoring services that scan the dark web and alert you to new exposures of your personal information.
  6. Document everything and report the incident. Keep detailed records of any suspicious activities you discover and all steps you’ve taken. File a report with the FTC and police, especially if you’ve experienced financial losses. This documentation will be crucial for disputing fraudulent charges or accounts.

Legal and practical roadblocks

As you go about removing your information for the internet, it is important to set realistic expectations. Several factors may limit how completely you can remove personal data from internet sources:

  • The United States lacks comprehensive federal privacy laws requiring companies to delete personal information upon request.
  • Public records, court documents, and news articles often have legal protections that prevent removal.
  • International websites may not comply with U.S. deletion requests.
  • Cached copies could remain on search engines and archival sites for years.
  • Data brokers frequently repopulate their databases from new sources even after opt-outs.

While some states like California have stronger consumer privacy rights, most data removal still depends on voluntary compliance from companies.

Final thoughts

Removing your personal information from the internet takes effort, but it’s one of the most effective ways to protect yourself from identity theft and privacy violations. The steps outlined above provide you with a clear roadmap to systematically reduce your online exposure, from opting out of data brokers to tightening your social media privacy settings.

This isn’t a one-time task but an ongoing process that requires regular attention, as new data appears online constantly. Rather than attempting to complete digital erasure, focus on reducing your exposure to the most harmful uses of your personal information. Services like McAfee Personal Data Cleanup can help automate the most time-consuming parts of this process, monitoring high-risk data broker sites and managing removal requests for you.

The post How to Remove Your Personal Information From the Internet appeared first on McAfee Blog.

Kscan - Simple Asset Mapping Tool

By: Unknown
18 January 2023 at 06:30


0 Disclaimer (The author did not participate in the XX action, don't trace it)

  • This tool is only for legally authorized enterprise security construction behaviors and personal learning behaviors. If you need to test the usability of this tool, please build a target drone environment by yourself.

  • When using this tool for testing, you should ensure that the behavior complies with local laws and regulations and has obtained sufficient authorization. Do not scan unauthorized targets.

We reserve the right to pursue your legal responsibility if the above prohibited behavior is found.

If you have any illegal behavior in the process of using this tool, you shall bear the corresponding consequences by yourself, and we will not bear any legal and joint responsibility.

Before installing and using this tool, please be sure to carefully read and fully understand the terms and conditions.

Unless you have fully read, fully understood and accepted all the terms of this agreement, please do not install and use this tool. Your use behavior or your acceptance of this Agreement in any other express or implied manner shall be deemed that you have read and agreed to be bound by this Agreement.

1 Introduction

 _   __
|#| /#/ Lightweight Asset Mapping Tool by: kv2
|#|/#/ _____ _____ * _ _
|#.#/ /Edge/ /Forum| /#\ |#\ |#|
|##| |#|___ |#| /###\ |##\|#|
|#.#\ \#####\|#| /#/_\#\ |#.#.#|
|#|\#\ /\___|#||#|____/#/###\#\|#|\##|
|#| \#\\#####/ \#####/#/ \#\#| \#|

Kscan is an asset mapping tool that can perform port scanning, TCP fingerprinting and banner capture for specified assets, and obtain as much port information as possible without sending more packets. It can perform automatic brute force cracking on scan results, and is the first open source RDP brute force cracking tool on the go platform.

2 Foreword

At present, there are actually many tools for asset scanning, fingerprint identification, and vulnerability detection, and there are many great tools, but Kscan actually has many different ideas.

  • Kscan hopes to accept a variety of input formats, and there is no need to classify the scanned objects before use, such as IP, or URL address, etc. This is undoubtedly an unnecessary workload for users, and all entries can be normal Input and identification. If it is a URL address, the path will be reserved for detection. If it is only IP:PORT, the port will be prioritized for protocol identification. Currently Kscan supports three input methods (-t,--target|-f,--fofa|--spy).

  • Kscan does not seek efficiency by comparing port numbers with common protocols to confirm port protocols, nor does it only detect WEB assets. In this regard, Kscan pays more attention to accuracy and comprehensiveness, and only high-accuracy protocol identification , in order to provide good detection conditions for subsequent application layer identification.

  • Kscan does not use a modular approach to do pure function stacking, such as a module obtains the title separately, a module obtains SMB information separately, etc., runs independently, and outputs independently, but outputs asset information in units of ports, such as ports If the protocol is HTTP, subsequent fingerprinting and title acquisition will be performed automatically. If the port protocol is RPC, it will try to obtain the host name, etc.

3 Compilation Manual

Compiler Manual

4 Get started

Kscan currently has 3 ways to input targets

  • -t/--target can add the --check parameter to fingerprint only the specified target port, otherwise the target will be port scanned and fingerprinted
IP address: 114.114.114.114
IP address range: 114.114.114.114-115.115.115.115
URL address: https://www.baidu.com
File address: file:/tmp/target.txt
  • --spy can add the --scan parameter to perform port scanning and fingerprinting on the surviving C segment, otherwise only the surviving network segment will be detected
[Empty]: will detect the IP address of the local machine and detect the B segment where the local IP is located
[all]: All private network addresses (192.168/172.32/10, etc.) will be probed
IP address: will detect the B segment where the specified IP address is located
  • -f/--fofa can add --check to verify the survivability of the retrieval results, and add the --scan parameter to perform port scanning and fingerprint identification on the retrieval results, otherwise only the fofa retrieval results will be returned
fofa search keywords: will directly return fofa search results

5 Instructions

usage: kscan [-h,--help,--fofa-syntax] (-t,--target,-f,--fofa,--spy) [-p,--port|--top] [-o,--output] [-oJ] [--proxy] [--threads] [--path] [--host] [--timeout] [-Pn] [-Cn] [-sV] [--check] [--encoding] [--hydra] [hydra options] [fofa options]


optional arguments:
-h , --help show this help message and exit
-f , --fofa Get the detection object from fofa, you need to configure the environment variables in advance: FOFA_EMAIL, FOFA_KEY
-t , --target Specify the detection target:
IP address: 114.114.114.114
IP address segment: 114.114.114.114/24, subnet mask less than 12 is not recommended
IP address range: 114.114.114.114-115.115.115.115
URL address: https://www.baidu.com
File address: file:/tmp/target.txt
--spy network segment detection mode, in this mode, the internal network segment reachable by the host will be automatically detected. The acceptable parameters are:
(empty), 192, 10, 172, all, specified IP address (the IP address B segment will be detected as the surviving gateway)
--check Fingerprinting the target address, only port detection will not be performed
--scan will perform port scanning and fingerprinting on the target objects provided by --fofa and --spy
-p , --port scan the specified port, TOP400 will be scanned by default, support: 80, 8080, 8088-8090
-eP, --excluded-port skip scanning specified ports,support:80,8080,8088-8090
-o , --output save scan results to file
-oJ save the scan results to a file in json format
-Pn After using this parameter, intelligent survivability detection will not be performed. Now intelligent survivability detection is enabled by default to improve efficiency.
-Cn With this parameter, the console output will not be colored.
-sV After using this parameter, all ports will be probed with full probes. This parameter greatly affects the efficiency, so use it with caution!
--top Scan the filtered common ports TopX, up to 1000, the default is TOP400
--proxy set proxy (socks5|socks4|https|http)://IP:Port
--threads thread parameter, the default thread is 100, the maximum value is 2048
--path specifies the directory to request access, only a single directory is supported
--host specifies the header Host value for all requests
--timeout set timeout
--encoding Set the terminal output encoding, which can be specified as: gb2312, utf-8
--match returns the banner to the asset for retrieval. If there is a keyword, it will be displayed, otherwise it will not be displayed
--hydra automatic blasting support protocol: ssh, rdp, ftp, smb, mysql, mssql, oracle, postgresql, mongodb, redis, all are enabled by default
hydra options:
--hydra-user custom hydra blasting username: username or user1,user2 or file:username.txt
--hydra-pass Custom hydra blasting password: password or pass1,pass2 or file:password.txt
If there is a comma in the password, use \, to escape, other symbols do not need to be escaped
--hydra-update Customize the user name and password mode. If this parameter is carried, it is a new mode, and the user name and password will be added to the default dictionary. Otherwise the default dictionary will be replaced.
--hydra-mod specifies the automatic brute force cracking module: rdp or rdp, ssh, smb
fofa options:
--fofa-syntax will get fofa search syntax description
--fofa-size will set the number of entries returned by fofa, the default is 100
--fofa-fix-keyword Modifies the keyword, and the {} in this parameter will eventually be replaced with the value of the -f parameter

The function is not complicated, the others are explored by themselves

6 Demo

6.1 Port Scan Mode

6.2 Survival network segment detection

6.3 Fofa result retrieval

6.4 Brute-force cracking

6.5 CDN identification



Kscan - Simple Asset Mapping Tool

By: Zion3R
18 January 2023 at 06:30


0 Disclaimer (The author did not participate in the XX action, don't trace it)

  • This tool is only for legally authorized enterprise security construction behaviors and personal learning behaviors. If you need to test the usability of this tool, please build a target drone environment by yourself.

  • When using this tool for testing, you should ensure that the behavior complies with local laws and regulations and has obtained sufficient authorization. Do not scan unauthorized targets.

We reserve the right to pursue your legal responsibility if the above prohibited behavior is found.

If you have any illegal behavior in the process of using this tool, you shall bear the corresponding consequences by yourself, and we will not bear any legal and joint responsibility.

Before installing and using this tool, please be sure to carefully read and fully understand the terms and conditions.

Unless you have fully read, fully understood and accepted all the terms of this agreement, please do not install and use this tool. Your use behavior or your acceptance of this Agreement in any other express or implied manner shall be deemed that you have read and agreed to be bound by this Agreement.

1 Introduction

 _   __
|#| /#/ Lightweight Asset Mapping Tool by: kv2
|#|/#/ _____ _____ * _ _
|#.#/ /Edge/ /Forum| /#\ |#\ |#|
|##| |#|___ |#| /###\ |##\|#|
|#.#\ \#####\|#| /#/_\#\ |#.#.#|
|#|\#\ /\___|#||#|____/#/###\#\|#|\##|
|#| \#\\#####/ \#####/#/ \#\#| \#|

Kscan is an asset mapping tool that can perform port scanning, TCP fingerprinting and banner capture for specified assets, and obtain as much port information as possible without sending more packets. It can perform automatic brute force cracking on scan results, and is the first open source RDP brute force cracking tool on the go platform.

2 Foreword

At present, there are actually many tools for asset scanning, fingerprint identification, and vulnerability detection, and there are many great tools, but Kscan actually has many different ideas.

  • Kscan hopes to accept a variety of input formats, and there is no need to classify the scanned objects before use, such as IP, or URL address, etc. This is undoubtedly an unnecessary workload for users, and all entries can be normal Input and identification. If it is a URL address, the path will be reserved for detection. If it is only IP:PORT, the port will be prioritized for protocol identification. Currently Kscan supports three input methods (-t,--target|-f,--fofa|--spy).

  • Kscan does not seek efficiency by comparing port numbers with common protocols to confirm port protocols, nor does it only detect WEB assets. In this regard, Kscan pays more attention to accuracy and comprehensiveness, and only high-accuracy protocol identification , in order to provide good detection conditions for subsequent application layer identification.

  • Kscan does not use a modular approach to do pure function stacking, such as a module obtains the title separately, a module obtains SMB information separately, etc., runs independently, and outputs independently, but outputs asset information in units of ports, such as ports If the protocol is HTTP, subsequent fingerprinting and title acquisition will be performed automatically. If the port protocol is RPC, it will try to obtain the host name, etc.

3 Compilation Manual

Compiler Manual

4 Get started

Kscan currently has 3 ways to input targets

  • -t/--target can add the --check parameter to fingerprint only the specified target port, otherwise the target will be port scanned and fingerprinted
IP address: 114.114.114.114
IP address range: 114.114.114.114-115.115.115.115
URL address: https://www.baidu.com
File address: file:/tmp/target.txt
  • --spy can add the --scan parameter to perform port scanning and fingerprinting on the surviving C segment, otherwise only the surviving network segment will be detected
[Empty]: will detect the IP address of the local machine and detect the B segment where the local IP is located
[all]: All private network addresses (192.168/172.32/10, etc.) will be probed
IP address: will detect the B segment where the specified IP address is located
  • -f/--fofa can add --check to verify the survivability of the retrieval results, and add the --scan parameter to perform port scanning and fingerprint identification on the retrieval results, otherwise only the fofa retrieval results will be returned
fofa search keywords: will directly return fofa search results

5 Instructions

usage: kscan [-h,--help,--fofa-syntax] (-t,--target,-f,--fofa,--spy) [-p,--port|--top] [-o,--output] [-oJ] [--proxy] [--threads] [--path] [--host] [--timeout] [-Pn] [-Cn] [-sV] [--check] [--encoding] [--hydra] [hydra options] [fofa options]


optional arguments:
-h , --help show this help message and exit
-f , --fofa Get the detection object from fofa, you need to configure the environment variables in advance: FOFA_EMAIL, FOFA_KEY
-t , --target Specify the detection target:
IP address: 114.114.114.114
IP address segment: 114.114.114.114/24, subnet mask less than 12 is not recommended
IP address range: 114.114.114.114-115.115.115.115
URL address: https://www.baidu.com
File address: file:/tmp/target.txt
--spy network segment detection mode, in this mode, the internal network segment reachable by the host will be automatically detected. The acceptable parameters are:
(empty), 192, 10, 172, all, specified IP address (the IP address B segment will be detected as the surviving gateway)
--check Fingerprinting the target address, only port detection will not be performed
--scan will perform port scanning and fingerprinting on the target objects provided by --fofa and --spy
-p , --port scan the specified port, TOP400 will be scanned by default, support: 80, 8080, 8088-8090
-eP, --excluded-port skip scanning specified ports,support:80,8080,8088-8090
-o , --output save scan results to file
-oJ save the scan results to a file in json format
-Pn After using this parameter, intelligent survivability detection will not be performed. Now intelligent survivability detection is enabled by default to improve efficiency.
-Cn With this parameter, the console output will not be colored.
-sV After using this parameter, all ports will be probed with full probes. This parameter greatly affects the efficiency, so use it with caution!
--top Scan the filtered common ports TopX, up to 1000, the default is TOP400
--proxy set proxy (socks5|socks4|https|http)://IP:Port
--threads thread parameter, the default thread is 100, the maximum value is 2048
--path specifies the directory to request access, only a single directory is supported
--host specifies the header Host value for all requests
--timeout set timeout
--encoding Set the terminal output encoding, which can be specified as: gb2312, utf-8
--match returns the banner to the asset for retrieval. If there is a keyword, it will be displayed, otherwise it will not be displayed
--hydra automatic blasting support protocol: ssh, rdp, ftp, smb, mysql, mssql, oracle, postgresql, mongodb, redis, all are enabled by default
hydra options:
--hydra-user custom hydra blasting username: username or user1,user2 or file:username.txt
--hydra-pass Custom hydra blasting password: password or pass1,pass2 or file:password.txt
If there is a comma in the password, use \, to escape, other symbols do not need to be escaped
--hydra-update Customize the user name and password mode. If this parameter is carried, it is a new mode, and the user name and password will be added to the default dictionary. Otherwise the default dictionary will be replaced.
--hydra-mod specifies the automatic brute force cracking module: rdp or rdp, ssh, smb
fofa options:
--fofa-syntax will get fofa search syntax description
--fofa-size will set the number of entries returned by fofa, the default is 100
--fofa-fix-keyword Modifies the keyword, and the {} in this parameter will eventually be replaced with the value of the -f parameter

The function is not complicated, the others are explored by themselves

6 Demo

6.1 Port Scan Mode

6.2 Survival network segment detection

6.3 Fofa result retrieval

6.4 Brute-force cracking

6.5 CDN identification



❌
❌