Module 6 of 7

Spending Safely

What Zcash protects, what it doesn't, and how to think through the full chain when you need to use your funds.

⏱ 5 minute read

Zcash protects your transaction record perfectly. But spending money in the real world involves more than transactions — it involves your physical presence, your device, and sometimes converting to a different form of money.

Spending ZEC directly

When you pay directly in ZEC (from your Zodl wallet, to a shielded merchant address), the transaction is completely private — no name, no bank, no record.

  • Online services accepting ZEC (VPN services, web hosting, some retailers)
  • Direct peer-to-peer payments to individuals who also use Zcash
  • Some travel services and accommodation platforms
  • NGO/charity donations where the organization accepts ZEC

Converting ZEC to cash

Most everyday spending requires cash or a regular card. To convert ZEC to cash, you use a cryptocurrency exchange.

The identity trade-off

Most large exchanges (Coinbase, Kraken, Binance) require you to verify your identity (passport, ID, selfie). This is legally required in most countries. This is acceptable if:

  • The exchange account is in your name — fine if your partner doesn't know about it
  • The bank account receiving the cash is private (your partner doesn't monitor it)
  • You opened the account from a private device and private email

Safer conversion options

  • Bitcoin ATMs with Zcash support — some dispense cash with minimal ID. Find local ones at coinatmradar.com
  • Peer-to-peer exchange — trade ZEC directly with a trusted individual for cash in person
  • Prepaid debit cards — some services allow loading a prepaid card with crypto without a bank account
  • A trusted intermediary — a friend converts ZEC to cash on your behalf and hands it to you physically

Checking for stalkerware on your device

Stalkerware secretly monitors your phone — recording messages, location, and keystrokes.

Signs your phone may have stalkerware:

  • Battery drains faster than usual without explanation
  • Phone is warm even when not in use
  • Partner knows information you only accessed on your phone
  • Partner gave you the phone or insisted on "setting it up" for you
  • Unfamiliar apps in your app list

What to do:

  • Use a different device (borrowed, shelter device, library computer) for financial activities
  • Contact the Safety Net Project (techsafety.org) — they help survivors with technology safety
  • A factory reset removes stalkerware — but only do this if your partner won't notice
  • Do NOT install stalkerware detection apps on a compromised device — they can alert the abuser

The "full chain" checklist

Before spending or withdrawing, trace the full chain and ask at each step: "Is this visible to someone I don't want seeing it?"

StepWhat could reveal itHow to protect it
Receiving ZEC into shielded walletNothing — transaction is private✓ Fully protected by Zcash
Opening the wallet appStalkerware, screen recordingUse a clean, private device
Converting to cash via exchangeExchange knows your ID; bank transfer visibleUse private account; trusted intermediary
Withdrawing cash from ATMATM camera; bank statementUse Bitcoin ATM with ZEC, or physical cash handoff
Spending cashPhysical receipts; merchant camerasMost private option once you have cash

What NOT to do

  • Don't send ZEC to a transparent (non-shielded) address — it creates a visible record
  • Don't use an exchange that sends confirmation emails to a shared inbox
  • Don't spend large amounts at once — gradual withdrawals are less conspicuous
  • Don't keep ZEC on an exchange long-term — keep it in your private Zodl wallet
  • Don't tell anyone how much you have saved until you are safe
The golden rule

Zcash protects the money while it's in the shielded pool. Your job is to protect how you access it: the device, the account, the physical moment of withdrawal. Think of Zcash as a perfectly secure vault — but you still need to be careful about who sees you open it.