• econoalchemist

Bitcoin Home Mining Network Privacy

A privacy-focused guide on building a secure home network with a pfSense firewall. How to setup dedicated home networks to separate your family's WiFi web browsing from your Bitcoin mining traffic. How to configure a VPN with WireGuard and how to send all your internet traffic through Mullvad VPN tunnels with automatic load balancing to switch between tunnels during times of high latency. As well as how to configure an ad blocker at the firewall level. This article is published on the Bitcoin Magazine website here.


Listen to the Twitter Spaces discussion on this guide here.


Every Bitcoin home miner is going to need a home network. Building a secure and private network to mine from is an essential part of maintaining a permissionless operation. By following this guide you will see how to build a robust and customizable home mining network that features the following benefits and more:

  • Virtual Private Network (VPN) tunneling to secure and encrypt your internet traffic.

  • Enhanced privacy from the prying eyes of your Internet Service Provider (ISP).

  • Mitigate the potential risk of IP address logging from your mining pool.

  • How to configure a pfSense firewall.

  • How to create sequestered home networks to keep your ASICs separate from your guest WiFi network, etc.

  • How to setup a mesh WiFi network access point.

  • How to configure an ad-blocker at the firewall level.


In this guide you will see some free opensource software like pfSense & WireGuard. As well as some paid opensource software like MullvadVPN.


Undertaking this task started for me when my wife and I decided to sell our house in the city and move to the country. I had visions of setting up new mining infrastructure from scratch and I wanted to take this opportunity to build the ultimate home network that I always wanted. A home network that prevented my ISP from seeing my data and where it was going. A home network that isolated my ASICs from other network connected devices. A home network that wasn't constantly tracking me and selling my browsing information to advertisers. This is when I started taking a close look at a blog post on the subject from K3tan. In his pfSense article, K3tan laid out many of the attributes of a home network that I wanted to build for myself and pointed to several additional resources that made me think I could do this myself if I really tried. I had zero networking experience prior to jumping into this and although there are a lot of steps, it really is very easy to use free and opensource tools to start making leaps and bounds in guarding your privacy. I reached out to K3tan and he was supportive of my efforts and helped me get through some obstacles I ran into, I really appreciate this and want to say thank you, K3tan. All together for this guide I spent $360 USD to build my home network. $160 on a network card and $200 on a mesh WiFi kit (which honestly could have been done with a $40 router but YOLO!).


Some limitations you should be aware of, I literally had zero networking experience prior to this guide. It is very possible that I made some unforeseen mistake. I highly recommend you use this as a guide but also incorporate your own research and due diligence into your own home network setup. VPNs are a great tool in guarding your privacy but they are not a silver bullet. There are several other ways you can leak data and diminish your privacy, the good news is that it is easy to start taking steps in developing good privacy-focused best practices. I recommend reading this guide from Mullvad, listening to this podcast from SethForPrivacy, and checking out additional resources from TechLore.


Let's get right to it and get your home mining network setup in a way that makes your family happy and your keeps your ASICs secure and private.


Building a pfSense firewall from an old desktop computer:

In 10 steps I will show you how I used an old desktop computer to build a pfSense firewall and how I configured my home network:

  1. how to install the new network card

  2. how to download and verify the pfSense image file and flash it to a USB drive

  3. how to flash the desktop and install pfSense

  4. how to connect the pfSense in a home network

  5. how to configure the pfSense basic settings

  6. how to configure the pfSense advanced settings

  7. how to setup and configure a WiFi access point

  8. how to install and configure the WireGuard package with Mullvad

  9. how to configure ad blocker capabilities

  10. how to check for miner latency caused by the VPN


There is also a detailed guide put together by pfSense which you can find here to go over any details or options that I do not cover in this guide. You can also purchase a NetGate device with pfSense already installed and good to go out of the box. If you choose that option instead of building your own, then you can skip to Step #4 below.


Step 1) How to install the new network card:

First you will need an old desktop computer. I used a Dell Optiplex 9020 Small Form Factor (SFF). This is a powerful piece of hardware for a firewall; it features an Intel i7-4790 3.6GHz CPU, 16GB of RAM, and a 250GB hard drive.


By default, this computer only has one RJ45 Ethernet port. However, if this is going to serve as a firewall, it will need at least two Ethernet ports. To achieve this, I purchased an Intel i350 network card which comes equipped with four Ethernet ports. The i350 network card is designed to be used in the 4-lane PCIe slot on the desktop's motherboard.


For this SFF chassis, I had to swap out the full-frame sized metal bracket with the included smaller bracket on the network card. Then simply open the chassis and flip open the external clamp covering the empty PCI slots. With a screw driver, you can remove the blank metal bracket insert in front of the 4-lane PCI slot and insert the network card. Close the clamp and put the chassis side-cover back on.


Once installed, it is important to note which Ethernet port is for the Wide Area Network (WAN) and which ports are for the Local Area Network (LAN). WAN is what faces out to the wide open public internet and LAN is what faces in to your local home network.


Once installed you can set your desktop computer to the side for now. You will want to use your network connected computer to download and verify the pfSense image and flash it to a USB drive.


Step 2) How to download and verify the pfSense image file and flash it to a USB drive:

First, navigate to this pfSense download page and once there,

  • Select the "AMD64" Architecture

  • Then "USB Memstick installer"

  • Then "VGA" Console

  • Then select which ever mirror is closest to your geographic location such as demonstrated in the screenshot below and click on "Download".

Next, you can calculate the sha256 checksum on the compressed file you downloaded and verify it against the checksum displayed on the pfSense download page. I like to use a freeware hex editor called HxD for calculating checksums. Just open the file you are interested in, navigate to "Tools" then "Checksums" and select "SHA256" from the menu. If the hash values don't match, do not run the executable file.


The easiest way I have found to flash an image file to a USB drive is to use a program called BelenaEtcher.


Once installed, launch the application, click on "Flash from file", then navigate to the folder where you have the compressed pfSense image file.


Next, select your blank USB drive and then click on "Flash". BelenaEtcher will begin the flashing process and automatically decompress the pfSense image file. This process will take a few minutes.


After the flashing is complete, you should get a green check mark indicating that everything checks out. If you get an error from BelenaEtcher, you may need to try flashing to a different USB drive.



Now you can safely eject the flashed USB drive from your computer and you are ready to flash the other desktop computer.


Step 3) How to flash the desktop and install pfSense:

Connect a keyboard, monitor, power cable, and the flashed USB drive to your desktop computer that you installed the network card in. The monitor needs to be connected via VGA connections, DisplayPort connections won't work in my experience. Do not connect the Ethernet cables yet.


Once everything is connected, power on your desktop. Some computers will automatically detect that there is a bootable USB drive inserted and they will ask you which drive you want to boot from. In my case, the computer just defaulted to booting from the "C:\" drive and launched Windows automatically. If this happens to you, shutdown the computer and then hold down "F12" on the keyboard and turn it back on. This will launch the BIOS where you can tell the computer which drive you want to boot from.


For example, here is my BIOS environment where I was able to select the SanDisk USB drive that I had flashed the pfSense image to. After selecting this option, a script will run briefly and then the pfSense installer will launch.


First, accept the terms & conditions. Then select "Install pfSense", then choose the keymap appropriate for you. If you speak English and live in the US, you will probably just want to use the default.


Next, I just chose the "Auto ZettaByte File System" (ZFS) option because I'm using a hardware platform that is way over spec'd for a home firewall. The ZFS option has more features and is more reliable than the Unix File System (UFS) option but ZFS can be more memory hungry, which I'm not really concerned with given that I have 16GB of RAM in this desktop.


Then you will have some partitioning and redundancy options, which I just kept as simple as possible, e.g., no redundancy and the default configuration options. Then select "Install".


Next, you will be asked which drive you want to install pfSense onto. The only options I had were the computer's hard drive and the USB drive, obviously I don't want to install pfSense on the USB drive so I chose the computer's hard drive. If you do this make sure any data you want to save is copied to an external drive first because it will erase your existing hard drive. The installer will warn you that this operation will destroy all existing data on the hard drive, which is what I wanted because I'm dedicating this machine to be my firewall and don't need to have Windows on it anymore. After confirming this choice, a few scripts will run and the flashing process will take a couple minutes.


Then, you will see a couple confirmations that the pfSense installation was successful. A prompt will ask you if you want to manually make any final modifications, which I did not. Then it will ask you if want to reboot, select yes. Immediately remove the USB drive at this time before the reboot kicks back on because otherwise it will drop you at the beginning of the installation wizard again. You should wind up at the main terminal menu once the reboot is finished.

Now you are ready to connect your new firewall to your home network.


Step 4) How to connect the pfSense in a home network:

The following steps will all be completed on the keyboard and monitor connected to your new firewall.

  • First, power off your ISP provided router, power off your modem, and disconnect the Ethernet cables from your modem and router.

  • Next, power on your new firewall and let pfSense load. Then power on your modem and wait for it to link to the internet.

  • In the pfSense menu select option #1 "Assign Interfaces". It will ask you if you want to setup VLANs now, enter "n" for no. Then it will ask you to enter the WAN interface name, enter "a" for auto-detect.

  • Connect an Ethernet cable from your modem output to your new firewall network card interface. Remember, the port on the far right-side if the RJ45 release tabs are facing up is your WAN port. Or the far left-side if the RJ45 release tabs are facing down.

  • Once connected, hit enter. It should detect link-up on interface port igb0, if it is igb3 then switch the Ethernet cable to the opposite side and try again.

  • Then it will ask you to enter the LAN interface name, enter "a" for auto-detect. Connect an Ethernet cable from the next available port on the new firewall network card to your Ethernet switch or other access point. Keep in mind that if you intend on running a Virtual Local Area Network (VLAN), you will need to use a managed switch.

  • Once connected, hit enter. It should detect link-up on interface port igb1.

  • Then hit enter again for "nothing" as no other network connections are configured at this time.

  • Then it will inform you that the interfaces will be assigned as follows: WAN = igb0 & LAN = igb1.

  • Enter "y" for yes and pfSense will write the configuration and bring you back to the main menu with your WAN IP v4 & IP v6 addresses displayed on top.

Just to illustrate an example signal path configuration, you could do a setup like this:


At this point, you should be able to enter "192.168.1.1" into your web browser on your regular desktop and launch the pfSense web interface. It is a self-signed certificate, so accept the risk when prompted and continue. The login credentials are admin/pfsense.


You can now disconnect the keyboard and monitor from your new firewall. The rest of the steps will be completed through the web interface on your regular desktop.


Step 5) How to configure the pfSense basic settings:

In this step, you will see how to configure basic settings like the Setup Wizard, change the TCP port, enable SSH, and set up hair-pinning by default. The vast majority of the information presented here and in Step 6 below, came from watching this Tom Lawrence video on pfSense, I highly recommend watching this video, it is lengthy but packed full of valuable information and has way more details than I present in this guide.



First, click on the red warning dialog at the top of the page to change the password used to log into your new firewall, personally I recommend high entropy single use passwords with an accompanying password manager. Then log out and log back in to test your changes.


Once logged back in, open the "Setup Wizard" from the "System" tab:


Then the Wizard will walk you through 9 basic steps to get your new pfSense firewall configured.


Click "Next" on the first step.


Then on the second step you can configure the hostname, domain, and primary/secondary DNS servers. You can leave "Hostname" and "Domain" as their defaults or set them to whatever you want. I chose "100.64.0.3" for the Primary DNS Server for getting out to the internet and unchecked the "Override DNS" box to avoid having DHCP override the DNS servers. I'll go over why I used "100.64.0.3" in Step 9 of this guide.


Then you can set your time zone in step three:


On the fourth step, you can select "DHCP" for the WAN interface and leave all the other fields as their defaults. If you want to spoof your MAC address you can do so in this step. For the last two fields, ensure the "Block RFC1918 Private Networks" box and the "Block bogon networks" box are checked, this will automatically add the appropriate rules to your firewall.


In step 5 you can change your firewall's IP address. Most home local networks will either use 192.168.0.1 or 192.168.1.1 to access the router or firewall. The reason you may want to change this to a none default local IP address is because if you are on someone else's network and you are trying to VPN back into your home network then you may run into an issue where you have the same address on both ends and the system won't know if you are trying to connect to the local or remote address. For example, I changed my local IP address to "192.168.69.1".


In step 6 you can set your admin password. I was a little confused to see this step inserted here since I had changed the admin password at the beginning, so I just used my same high entropy password from before assuming it was asking for the same password that will be used to log into the router.


Then in step 7 you can click the "Reload" button. As this is reloading, unplug the power cable from your switch. Since the router local IP address was changed to "192.168.69.1" (or whatever you chose), all the devices on the network will now have their IP addresses updated to that IP range. So if you have Putty or other SSH sessions configured to your RaspberryPi node for example, you will now need to update those connection configurations. Unplugging the power from the switch and plugging it back in after the router is rebooted helps get all your devices reassigned.


To figure out the IP addresses for the devices on your local network you can navigate to the "Status" tab and select "DHCP Leases" to see everything listed out:


After the reload in step 7, the Wizard just skipped over steps 8 & 9, so I'm not sure what happens in those steps but we will move on and address things as necessary.


A couple of other basic settings worth noting are found under "System>Advanced>Admin Access". Here, I updated the TCP port to "10443" because I run some services that will access the same default ports like 80 or 443 and I want to minimize congestion.


Also I enabled Secure Shell Server (SSH). Then you can chose how SSH is secured either with a password or keys or both or keys only. Upon saving, give the interface a minute to update to the new port. You may need to reload the page using the local IP address and the new port, e.g., "192.168.69.1:10443". Make sure to save your changes at the bottom of the page.


The last basic setting I'll cover here is hair-pining which means that, for example, you can have your network setup so that you can open a port to a security camera system with a public IP address. This public IP address can also be used inside your network too, which is convenient if you are at home accessing the camera system from your mobile phone on your LAN then you don't have to manually change where it connects to. Because hair-pining will see that you are just trying to access a local IP and it will loop you back around by default with this setting enabled.


  • Under the System tab navigate to "Advanced>Firewall & NAT"

  • Scroll down to the "Network Address Translator" section

  • From the "NAT Reflection Mode" drop-down menu, select "Pure NAT"

  • Click "Save" at the bottom of the page and "Apply Changes" at the top of the page


That is it for the basic settings, the good news is that pfSense is rather secure in it's default installation so there is not a whole lot you need to change to have a great basic foundation. Generally, the position of the pfSense developers is that if there is a more secure way to roll out pfSense then they will just make that the default setting.


One other thing to note is that by default, pfSense enables WAN IPv6 NAT (Network Address Translation) mapping. I chose to disable this so I'm not opening up an IPv6 gateway to the wide open internet. You can do this by going to "Interfaces> Assignments" and then clicking on the "WAN" hyperlink on the first assignment. This will open up the configuration page, then just make sure that the "IPv6 Configuration Type" is set to "None". Save and apply those changes.

Then you can navigate to "Firewall>NAT" and scroll down to the "WAN" interface with an IPv6 Source and delete it.


Step 6) how to configure the pfSense advanced settings:

In this section I will go over some advanced features that you may be interested in for your home network. Here you will see how to setup separate networks from your pfSense router so that for example, guests can access the wide open internet from a WiFi access point in your home but they cannot access your ASICs from that network.


If you used the i350 network card like I did then you have 4 Ethernet ports available, and if you used a Dell Optiplex like I did then you also have a 5th Ethernet port on the motherboard. Which means that I have 5 interfaces I can configure, 4 of which can be secondary local networks. What I am going to do here is keep my work desktop and my dedicated Bitcoin desktop on one network (LANwork). Then I will configure a secondary LAN that my home's WiFi access point will be on (LANhome). This way, I can keep traffic from my family's web browsing totally separate from my work and Bitcoin related activities. Then I will setup another LAN which will be dedicated for my ASICs (LANminers) separate from the other two networks. Finally I'll create a test network (LANtest) which I will use to integrate new ASICs and ensure there is no malicious firmware on them before exposing my other ASICs to them. You could also add a security camera network on one of the interfaces, the possibilities are endless.


If you navigate to the "Interfaces" tab then "Interface Assignments", you will see all of your available network card RJ45 ports. They should be labeled "igb0, igb1, igb2", etc. Now, simply add the one you are interested in by selecting it from the drop down menu and clicking on the green "Add" box.


Then click on the hyperlink on the left-hand side of the interface you just added to open up the "General Configuration" page for that interface.

  • Click the "Enable Interface" box.

  • Then change the "Description" to something that helps identify it's function, like "LANhome", for example.

  • Then set the "IPv4 Configuration" type to "Static IPv4" and assign a new IP range. I used "192.168.69.1/24" for my first LAN so for this one, I will use the next sequential IP range, "192.168.70.1/24".


You can leave all the other settings on their defaults, click "Save" at the bottom of the page and then "Apply Changes" at the top of the page.



Now you need to setup some firewall rules for this new LAN. Navigate to the "Firewall" tab then "Rules". Click on your newly added network, "LANhome", for example. Then click on the green box with the up arrow and the word "Add".


On the next page,

  • Make sure the "Action" is set to "Pass".

  • The "Interface" is set to "LANhome" (or whatever your secondary LAN is called).

  • Be sure to set the "Protocol" to "Any" otherwise this network will restrict the type of traffic that can be passed on it.

  • Next, you can add a short note to help indicate what this rule is for, such as "Allow All Traffic".

  • Then all other settings can remain in their defaults and click "Save" at the bottom of the page and "Apply Changes" at the top of the page.

Before you can test your new network, you need to have an IP address setup on it.

  • Navigate to "Services" then "DHCP Server".

  • Then click on the tab for your new LAN.

  • Click on the "Enable" box and then add your IP address range in the two "Range" boxes. For example, I used the range from "192.168.70.1 to 192.168.70.254". Then click on "Save" at the bottom of the page and "Apply Changes" at the top of the page.


Now you can test your new network by physically connecting a computer to the corresponding RJ45 port on the network card and then try to access the internet. If everything worked then you should be able to browse the wide open web.


However, you may notice that if you are on your secondary LAN and you try to log into your firewall, you will be able to do so using the "192.168.70.1" IP address. Personally, I only want my firewall accessible from my "LANwork" network. I do not want my wife and kids or guests to be able to log into the firewall from their designated "LANhome" network. Even though I have a high entropy password to get into the firewall I am still going to configure the other LANs so that they cannot talk to the router.


One area of concern I have that this kind of configuration will help alleviate is if I plug an ASIC into my network with some malicious firmware installed on it, I can keep that device isolated and prevent that security concern from effecting other devices and information that I have. Which is why one of the LANs I am setting up is called "LANtest" which will be dedicated to keeping new ASICs totally isolated so I can test them in safety without allowing a potential attack to occur on my other ASICs or other devices on my home's networks.


To setup a rule so that port 10443 cannot be accessed from your other LAN networks, navigate to "Firewall>Rules" and then select the tab for your corresponding network of interest. Click on the green box with the up arrow and word "Add" in it.


  • Make sure "Action" is set to "Block".

  • Then under the "Destination" section, set the "Destination" to "This Firewall (self)" and then the "Destination Port Range" to "10443" using the "Custom" boxes for the "From" and "To" fields.

  • You can add a description to help you remember what this rule is for. Then click on "Save" at the bottom of the page and then "Apply Changes" at the top of the page.


Having a high-entropy password to log into the router and locking down the port is a great start but you can further sequester your LAN networks and ensure that devices on one network cannot get onto any of the other networks at all by setting up an alias for your primary LAN.


Navigate to "Firewall>Aliases". Then under the "IP" tab click on the "Add" button.

  • Then I named this alias "SequesteredNetworks0".

  • I entered a description to remind me of what it's function is.

  • Since I will be adding a firewall rule to my "LANhome" network referencing this alias, I added the other the LANs to the "Network" list. This way, "LANhome" cannot talk to "LANwork", "LANminers", or "LANtest".

  • Click on "Save" at the bottom of the page and then "Apply Changes" at the top of the page.


Now I can add additional aliases that will be referenced in firewall rules on the other LANs to prevent "LANminers" from talking to "LANwork", "LANhome", and "LANtest". So on and so forth until all my networks are sequestered in a way that only my firewall can see what is connected on the other networks.


With the alias created, a new firewall rule can be applied referencing this alias on the secondary LAN.

  • Navigate to "Firewall>Rules", select the LAN you want to apply the rule to, e.g, "LANhome".

  • Then for "Action" set it to "Block. For "Protocol" set it to "Any".

  • For "Destination" set it to "Single host or alias".

  • Then enter your alias name.

  • Click on "Save" at the bottom of the page and then "Apply Changes" at the top of the page.


Once I created the aliases and set the firewall rules, I was then able to connect my laptop to each network card RJ45 interface port and attempt to ping each of the other networks. I could get out to the wide open internet from each LAN but I was not able to communicate with any of the other LANs or the firewall. Now I know any devices on any of my LANs will not have access to devices on any of my other LANs. Only from my primary "LANwork" network am I able to see what is connected on all the other LANs.


That takes care of the advanced features that I wanted to share with you. You should now have some firewall rules setup and multiple networks sequestered. Next, we'll get into setting up a WiFi access point on one of the secondary LANs.

Step 7) How to setup and configure a WiFi access point

In this section I'll show you how I configured my home's mesh WiFi using the secondary "LANhome" network. The key points to keep in mind here is that I made this a dedicated LAN specifically for a WiFi access point for my family and guests to link to without giving them access to my pfSense firewall or any other LANs. But they still have unrestricted access to the wide open web. I will add a VPN tunnel for this LAN later in this guide.

To ensure I was providing adequate WiFi signal to the entire house, I decided to go with a NetGear NightHawk AX1800 kit.


Inside this kit is a WiFi router and a repeater satellite. The basic idea is that the WiFi router gets connected to the pfSense firwall directly with an Ethernet cable on the igb2 "LANhome" port. Then the WiFi router broadcasts the signal to the repeater satellite in another area of the house. Like this, I can increase the WiFi signal coverage to a wider area.


To accomplish this I simply followed these steps:

  1. Plug the WiFi router in the pfSense firewall on port igb2 "LANhome" using an Ethernet cable to the port labeled "Internet" on the back of the WiFi router.

  2. Plug a laptop into the port labeled "Ethernet" on the back of the WiFi router with an Ethernet cable.

  3. Plug the WiFi router into power using the supplied power adapter.

  4. Wait for the light to turn solid blue on the front of the WiFi router.

  5. Open a web browser on the laptop and type in the IP address for the WiFi router. I found the IP address next to the "MR60" device in my pfSense dashboard under "Status>DHCP Leases".

  6. Immediately I was prompted to change the password. Again I used a high entropy random password with an accompanying password manager. I don't want my family or guests to be able to access this WiFi access point administrative settings, so placing a strong password here is recommended. You may also be prompted to update the firmware as well, which will result in a reboot.

  7. Then you can log back in with your new admin password and change the default network name to whatever you want and add a WiFi password to access the WiFi network; this is the password shared with family and guests so this one I made pretty easy to remember and share. Even if a nefarious actor cracks the password and gains access to the WiFi network, it is totally sequestered from everything else and the WiFi router itself has a high entropy password.

  8. Then, navigate to "Advanced>Wireless AP" and enable "AP Mode". "AP" stands for Access Point. Then apply the changes.

  9. The router will reboot again. At this point, the local IP address will be updated, this change can be monitored in the "DHCP Leases" status page. Now the laptop can be unplugged from the WiFi Router and the WiFi router can be logged into from the same machine as the pfSense interface is running.

  10. Once logged in again, click on "Add Device" and you will be prompted to set the satellite repeater in place and connect it to power. Then follow the prompts on the interface to sync the satellite.


Now my family, guests, and I can browse the wide open web from our devices via WiFi with no drop outs in the whole house and I don't have to be concerned with anyone access my sensitive work network, or my ASIC network, or my test network. Next, we'll get into adding VPN tunnels to the networks we've created so far.


Step 8) How to install and configure the WireGuard package with Mullvad:

WireGuard is a Virtual Private Network (VPN) software protocol that can be installed on your pfSense firewall, then you can use that protocol to define how you construct your tunnels with your VPN provider. VPNs create a secure and encrypted tunnel from your computer to your VPN provider's server. This prevents your Internet Service Provider (ISP) from seeing your data or where it's final destination is. There are several types of VPN protocols such as OpenVPN, IKEv2/IPSec, L2TP/IPSec, and WireGuard but they all essentially have the same goal to outline the instructions for creating a secure tunnel for encrypting your data to be sent over public networks.


WireGuard is a recent addition to the lineup of VPN protocols, it is open source, and comparatively "light" with less code and faster speeds than some others. The speed part was key for me considering that added latency can decrease an ASICs efficiency.


Another benefit of VPNs is that your geographic location can be spoofed. Meaning that if you are in one part of the world, you can use a VPN tunnel to a VPN provider's server in another part of the world and it will appear as though your internet traffic is coming from that server. This is beneficial for people who live in authoritative countries where access to certain website and services is restricted.


Keep in mind, you have to trust that your VPN provider is not logging your IP address or that they could or would turn this information over to authorities if pressed. Mullvad collects no personal information about you, not even an email address. Plus they accept Bitcoin or cash so you can pay for the service without the risk of linking your banking details. Mullvad also has a "no-logging" policy which you can read here.


For my specific use case here, I will be using a VPN to ensure my ISP does not see that I am mining Bitcoin and to also prevent my mining pool, SlushPool, from seeing my real IP address. Not because I am doing anything illegal or because I think SlushPool is logging my IP address but simply because these are tumultuous times with a quickly changing political environment and the things I do legally today could very well be outlawed tomorrow. Or if some legislation was passed making it illegal for a person to operate a Bitcoin miner in the United States without a money transmitter's license, for example, then I could spoof my location so that if SlushPool's hand were forced to block IP address coming from the United States, I could continue mining as it would appear my hashrate were originating from outside the United States. Considering that the blockchain is forever and the future is uncertain, I think it is worth taking the time to figure out how to guard my privacy. By taking steps today to increase my privacy and security, I can ensure that my freedom and my pursuit of happiness are guarded.


The vast majority of the information presented in this section comes from watching Christian McDonald videos on YouTube. You can find all of his WireGuard & Mullvad VPN videos here.


I want to specifically point out this video of his on using the WireGuard package in pfSense to setup Mullvad in a way to have multiple tunnels that allow load balancing your traffic seamlessly:


Mullvad is a paid VPN subscription, the fee is €5 per month. However, Mullvad does accept bitcoin and does not require any identifying information. Before I show you how to setup your Mullvad subscription, we'll get the WireGuard package installed to your pfSense firewall. Then we'll setup a Mullvad account and generate the configuration files. Then we can get multiple tunnels set up and do some fancy configurations in pfSense.


In pfSense, navigate to "System>Package Manager>Available Packages" then scroll down to the WireGuard link and click on "Install". On the next page click on "Confirm". The installer will run and let you know when it has successfully completed.


Now you can navigate to "VPN>WireGuard" and see that the package has been installed but nothing is configured yet. Now that the firewall has WireGuard ready, we will work on getting the VPN client installed.

Navigate to https://mullvad.net/en/ and click on "Generate Account".


Mullvad does not collect any information from you such as name, phone number, email, etc. Mullvad generates a unique account number and this is the only identifying piece of information you get related to your account so write it down and secure it.


Next select your payment method. You get a 10% discount for using bitcoin. The subscription works for as long as you want to pay for (up to 12 months) at the rate of €5 per month. So a 1 year subscription for example would be €60 or ~0.001 BTC at today's rate (November 2021). You will be presented with a Bitcoin address QR code to send your payment to.


Check the mempool to see when your Bitcoin transaction gets confirmed. You may need to wait a while depending on network congestion.


After confirmation on-chain, the Mullvad account is topped off and should show that you have time remaining, make considerations about selecting a server location from Mullvad's long list of servers. If you're planning on running ASICs behind your VPN, then I recommend connecting to a server relatively close to your actual geographic location to try and help reduce any latency as much as possible.


The way Mullvad works is with configuration files that assign a unique public/private key pair for each tunnel address. The basic idea here is that I want to have a primary tunnel setup for the ASICs but I also want a secondary tunnel setup with another server in a different geographic location just in case the primary tunnel connection goes off line. This way, my mining internet traffic will automatically switch over to the other tunnel and there will be no interruption in concealing my public IP address or encrypting my traffic data. I'm also going to setup other tunnels specifically for my WiFi network and my "LANwork" network.


To do this I will need as many key pairs as I want tunnels. One Mullvad subscription includes up to 5 key pairs. Navigate to: https://mullvad.net/en/account/#/wireguard-config/ and select your platform, e.g, Windows. Then click on "Generate Keys" for as many key pairs as you want up to 5 keys. Then click on "Manage Keys" below that to see your list.

*all keys and sensitive information presented in this guide has been nuked prior to publishing. Be cautious about sharing this information with anyone, you want to keep your Mullvad keys private.


You can see I generated 4 keys for this guide, which I will destroy after I'm finished using them as examples. Each configuration file needs to be setup with a specific Mullvad server of your choosing.

  • Select the "Public Key" you are interested in creating a configuration file for by selecting the circle under the "Use" column next to the appropriate public key.

  • Select the country, city, and server you want to configure with this public key.

  • Click on "Download File".

  • Save the configuration file in a convenient place because you will need to open it in a moment.

*Remember, for each tunnel to a new server you want to configure, you will need to use a separate public key. If you try to assign two tunnels to the same key, pfSense will encounter problems with your VPN.


Repeat this process for as many keys as you generated, selecting a different server for each unique key and generating the configuration file. I found it helpful to name the configuration file as the city and server used.


Now navigate back to pfSense and go to "VPN>WireGuard>Settings" and click on "Enable WireGuard" and then "Save".


  • Navigate to the "Tunnels" tab and select "Add Tunnel".


  • Open your first Mullvad configuration file with a text editor like Notepad and keep it to the side.

  • In WireGuard, add a "Description" for your tunnel that describes what it is, like "Mullvad Atlanta US167".

  • Copy/paste the "PrivateKey" from the Mullvad configuration file and add it to the "Interface Keys" dialog box.

  • Click on "Save Tunnel", then "Apply Changes" at the top of the page.