top of page
Search
pm12543

Peer-to-peer (P2P) trading safety

TL;DR

Peer-to-peer (P2P) trading is becoming increasingly popular among crypto traders but like any type of trading, it comes with potential risks. Being aware of these risks allows traders to protect themselves from potential losses and better understand the process. There are numerous precautions they can take — read on to find out what they are, as well as how and when to apply them.

Summary

Peer-to-peer (P2P) trading entails buying and selling currencies without needing a central deposit account or bank. P2P trading allows buyers and sellers to set their prices, select their trading partners, and decide when to transact. It also enables diligent and experienced traders to look for and take advantage of favorable trading conditions to suit their needs.

P2P platforms facilitate the direct exchange of currencies between individual users. There is no central authority or third-party intermediary, thereby giving users more control over their funds and allowing them to protect their identity during transactions.

Despite these benefits, there are also risks involved in P2P trading every user should be keenly aware of before they decide to use it. Among the common risks traders face are fake proof of payment, chargeback fraud, wrong transfer, man-in-the-middle attacks, triangulation scams, and phishing.

Is P2P Trading Safe?

As with any type of trading, P2P trading has its fair share of risks, which vary depending on the exchange and its safety measures. While older exchanges faced a higher risk of theft and scams, many newer P2P trading platforms have significantly improved their security measures.

A leading P2P exchange today, for instance, typically has a dispute support service, regular security updates, and a stringent identity verification process (among other measures) to keep users safe.

However, even with the appropriate safeguards, all trading activity comes with risks — and P2P trading is no exception.

What Are Some Common P2P Scams?

Fake proof of payment or SMS

Scammers may digitally alter receipts to convince you they have sent payment and trick you into releasing funds to them. One example is the SMS scam where criminals forge a text message to notify the victim that they have received a payment.

How to avoid this scam: As a sender, you should only approve the transaction after checking if the payment is already in your wallet or bank account.

Chargeback fraud

A bad actor may use a chargeback feature on card based accounts (such as Paypal) to reverse their payment upon receiving your assets. In some cases, they try to pay via a third-party account. Some payment methods like card and online wallets allow for chargeback requests.

How to avoid this scam: Do not accept payments from third-party accounts. If it happens, raise an appeal to the platform and initiate a refund to the buyer’s account.

Wrong transfer

As with chargeback fraud, a scammer may attempt to steal your assets by contacting their bank to report an erroneous transaction and requesting that it be reversed. Some scammers may even pressure you into not reporting the incident by using scare tactics, like warning you that selling currency is illegal.

How to avoid this scam: Don’t be intimidated by scare tactics. Systematically gather evidence, such as screenshots, of your correspondence and transaction with the criminal.

Man-in-the-middle attacks

In a man-in-the-middle attack, a bad actor inserts themself between a user and an application, organization, or another individual and communicates on behalf of that counterparty in order to steal assets or sensitive information like account passwords. The three main categories of man-in-the-middle attacks include romance, investment, and e-commerce scams.

  1. Romance scam. In this scenario, a scammer pretends to create an online relationship with their victim. Once they’ve gained the victim’s trust, they manipulate them into helping him with his financial issues, sending some money or 'emergency funds', or sharing sensitive information, only to cease all contact when they’ve achieved their malicious goals.

  2. Investment scam. An investment scam involves a criminal approaching and successfully convincing their victim to invest in a certain enterprise. Being the “man in the middle” between the victim and the investment opportunity, the scammer can direct the user’s funds wherever they wish under the guise of “investing” them.

  3. E-commerce scam. An e-commerce scam entails a scammer pretending to be an online seller offering desirable items at discounted prices. They insist that their victims make payment in currency to their wallets and once this is done, they disappear without providing the products they had promised.

How to avoid this scam: Don't respond to trading requests via social networking platforms, or dating apps. Limit your communication with your counterparty to the official platform before and during a transaction.

Triangulation scams

A triangulation or triangle scam involves two bad actors taking two orders from the same seller almost simultaneously, ultimately confusing a seller into releasing more money than has been paid.

For example, Buyer A takes an order for $500 USD (Order A), while Buyer B takes an order for the equivalent of 500 USD (Order B).

Buyer B then transfers 500 USD to the seller, while Buyer A marks Order A as paid. The seller then releases the funds to Buyer A, thus completing Order A for 500 USD. Buyer B sends another 1,000 USD to the seller, provides payment proof for the 500 USD they received from Buyer A plus 1,000 USD, and convinces the seller to release funds under Order B.

When the dust settles, it turns out that the seller has released 500 + 500 = 1,000 USD but has been paid only 500 USD.

How to avoid this scam: Always make sure to check your bank account or wallet to confirm that you have received the full payments for all pending P2P transactions.

Phishing

Phishing is where a scammer uses a fake profile to deceive users into sending assets or information to them. For example, a bad actor may impersonate a P2P platform’s customer service representative to gain access to private information or accounts.

How to avoid this scam: Some scammers may send fake security alerts regarding your account via email or text message. When checking messages, do not click on unknown links before you have verified the source. You should also only seek assistance from the official P2P exchange.

How To Identify Risks

Before trading

  1. Check P2P advertising profiles. Screen potential trading candidates before you enter a trade with any of them. Some things to note while looking at a P2P profile are:

    • Number of trades: Low numbers aren’t necessarily bad, but a high number of completed transactions may be a sign of a reliable P2P party.

    • Completion rate: Reconsider if it’s below 80% as this may indicate the trader has a habit of backing out of transactions.

    • Merchant or user feedback: Very few positive comments or many negative comments can indicate higher trading risk.


  1. Check advertisements carefully. Evaluate each P2P advertisement to determine if it meets your needs and goals. Consider the price, quantity, accepted payment methods, restrictions (like trading limits), and other terms and conditions. For instance, too large a disparity between the offered P2P price and the official FX market price is suspicious.

When trading

  1. Stay alert when interacting with a P2P buyer. Red flags include:

    • The buyer pushing you to release the payment.

    • The buyer requests unnecessary information.

    • The buyer becoming unresponsive.

    • The buyer asking you for a loan.

    • The buyer paying less than the amount agreed upon in the order.

    • The buyer paying more than the amount agreed upon in the order.

    • The buyer asking to communicate outside the P2P platform.

    • The buyer asking to pay via a third party.


  1. Stay alert when interacting with a P2P seller. Red flags include:

    • The seller asking you to cancel the order after you’ve already paid.

    • The seller asking to communicate outside the P2P platform.

    • The seller asking you to trade outside the P2P platform.

    • The seller asking you to pay an additional commission.


After trading

When interacting with a P2P buyer, red flags include:

  • Not yet receiving the asset you paid for.

  • Receiving a fake transaction receipt

  • Your bank account is blocked after receiving payment from a buyer.

  • The buyer initiates a chargeback via their bank after you’ve transferred your currency to them.

General Tips to Protect Yourself Against Scams

Trade on reputable platforms

Choose leading P2P platforms that offer their users robust safety features. Common features include:

  1. Risk management features. A platform that enforces specific requirements before buying or selling can help reduce inactive, unreliable, or low-quality advertisements. Better yet, there should be a sophisticated order-matching logic to match users with trusted traders and verified merchants only, as well as risk management algorithms to monitor suspicious activity. Some algorithms are even optimized to limit the trading activities of potential bad actors. In addition, withdrawal limits or delays can help to protect user funds.

  2. Know Your Customer (KYC) protocols. P2P platforms with KYC protocols can help beginners find reliable trading partners by enforcing user identity verification. This allows beginners to conduct trades with verified merchants with a proven track record and reliable sources of funds.

  3. Escrow services. Escrow services provide a safe way for buyers and sellers to exchange goods or assets. A trusted third party — typically the P2P platform — handles the exchange of funds between transacting parties to uphold safety and fair trading.

  4. Customer support. While P2P trading usually functions with no middlemen, a P2P platform’s customer support team can intervene if a user faces problems with a trade.

  5. Automated payment. New automated payment methods enable P2P platforms to automatically process the release of funds held in escrow. Buyers can receive their purchased assets instantly and sellers don’t have to check each order payment or release assets manually.

  6. Block feature. The block feature allows you to block suspicious users — if you’ve had an unpleasant experience with someone, you can block that user and prevent them from trading with you again.

Communicate on the platform only

Avoid contacting potential trading counterparties on dubious websites and stay alert to prices that sound too good to be true. Also, communicating using outside channels will make it easier for a scammer to raise a false dispute against you and deny the transaction ever happened.

Double-check your transactions

Remember to verify all information from the counterparty when transacting with a peer. Scrutinize all receipts and transactions to ensure that nothing has been digitally altered. Here are some tips to identify fake proof of payment:

  • Overlapping text

  • Different colors

  • Different typography

  • Difference in sizes

You can also use a free image forensics tool online. Search for “fake image detector” or “doctored image forensics tool” to get an idea of what’s available.

1 view
bottom of page