Security Protocol for P2P Exchanges
Financial sovereignty implies total responsibility. As there are no intermediaries (banks), the security of the operation depends exclusively on the precautions taken by both parties. This guide establishes the best practices to minimize risks.

Read carefully
Before starting an operation
You will avoid last minute confusion and wasted time.
Communication
We recommend using encrypted messaging tools such as Telegram or Session. Unlike WhatsApp, these allow you to negotiate without exposing your personal phone number, preserving your digital identity.
Time Management
Financial sovereignty operates at a human, not algorithmic, pace. P2P transactions require coordination and mutual availability. Never operate in a hurry: urgency is the most common attack vector in scams. Take the time to verify each step without external pressure.
Planning
Clearly define the terms of the exchange (exchange rate, network commissions and final amount) before the meeting. Clarity avoids disputes and streamlines the process.
Logistics
As your own bank, you are responsible for your physical security. Always arrange the exchange in a public, neutral and crowded space (such as shopping malls or coffee shops). Avoid private homes or isolated areas, regardless of the distance to be traveled.
Check
Bitcoin is governed by the maxim:‘Don’t trust, verify’. Never hand over cash or release cryptocurrencies until both parties have verified the authenticity of the bills and confirmation on the blockchain (or the status of the transaction). You are your own auditor.
Reputation
Build your network of trust progressively. For new contacts, start with small amounts. Systematically be wary of ‘too good’ offers or below-market prices, as these are often scam attempts.
