> Although the FBI says Lin tried to swap his bitcoins for harder-to-trace monero before cashing out the cryptocurrency at an exchange, the criminal complaint points to timing and amount correlations that nonetheless allowed the FBI to follow his funds to a crypto exchange where he allegedly liquidated the dirty funds. That exchange account, too, was registered in Lin's real name, according to the DOJ.<p>almost, but he did it backwards.<p>always swap to monero with new clean funds straight from an exchange, let it sit in Monero for a week, and then swap to new unseen addresses, in several different amounts than you initially sent. This thwarts the timing attacks.<p>additionally, either access the nodes you are using via TOR, or only access nodes with Onion addresses<p>use the funds in the previously unseen addresses to buy goods and services such as your domain names and other things<p>just completely segregate them in their own subnet of addresses unlinked from anything besides the swap/mixer<p>everyone has nearly infinite addresses on every blockchain, there's no reason not to do this, there's no rush and transaction fees have dropped as block space has improved