Questions and Answers: Dropshipping and Logistics 📦

Professor

Professional
Messages
544
Reaction score
376
Points
63
Questions:
  • How to use Shipito / MyUS for shipping?
  • How to bypass photo verification of a drop address?
  • How to disguise the origin of goods?
  • How to sell iPhone for crypto?
  • How to avoid detection when dropping?
  • How to use dropshipping for reselling?
  • How to cash out goods in Telegram?
  • How to avoid chargeback when dropping?
  • How to choose a reliable drop provider?
  • How to use dropship to withdraw funds?

All answers below are provided for educational purposes, in terms of cybersecurity, threat analysis and security testing. We do not support or condone the use of this knowledge for illegal or fraudulent purposes.

Below you will find a detailed technical analysis of methods for working with dropshipping, international deliveries, bypassing verification and withdrawing funds via cryptocurrency - all this can be used for training cybersecurity specialists, security testing and vulnerability analysis.

1. How to use Shipito / MyUS for shipping?​

Description:​

Shipito and MyUS are international postal services that allow you to receive goods at a US address and then ship them to your country.

Stages of use:​

  1. Register an account:
    • Please provide your details (you can use burner email).
  2. Get a virtual US address:
    • It will be used as the shipping address when purchasing.
  3. Place an order on any site (Amazon, eBay, Shopify):
    • Use compromised cards or gift cards.
  4. The goods are sent to the Shipito/MyUS warehouse.
  5. Select shipping method:
    • EMS, FedEx, DHL, ePacket.
  6. Pay for delivery and receive the goods.

Objective: To study the logistics routes of money laundering, to develop delivery verification protocols.

2. How to bypass photo verification of a drop address?​

Many platforms require you to upload a photo of your ID or document when registering your drop address.

Workarounds:​

  • Use of fake documents:
    • Create fake passport/driving license using online generators.
  • Substitution of data:
    • Match of name, address and phone number with card data.
  • Using burner accounts:
    • Registration via proxy and burner email.
  • Working through clean devices:
    • Use VPS + antidetect browsers.
  • Contacting support with a request to remove verification.

Objective: Research of vulnerabilities in KYC, development of verification protocols.

3. How to disguise the origin of goods?​

Methods:​

  • Repackaging of goods:
    • Remove the original packaging and replace it with neutral one.
  • Using an intermediate warehouse:
    • For example, Shipito → another warehouse → client.
  • Removing labels and serial numbers.
  • Using fake invoices:
    • Please specify another country of manufacture or change the product description.

Objective: Analysis of vulnerabilities in logistics, development of goods tracing technologies.

4. How to sell iPhone for crypto?​

The iPhone is one of the most popular products sold through dark channels.

Stages:​

  1. Get your iPhone via drop shipping or carding.
  2. Check IMEI and Activation Lock status.
  3. Place an ad:
    • Telegram channel
    • Darknet marketplaces
    • P2P exchanges
  4. Sell via OTC exchangers or directly.
  5. Choose payment in cryptocurrency (usually USDT TRC20).

Objective: Research of the digital goods market, development of verification protocols.

5. How to avoid detection when dropping?​

Tip:​

  • Use different IP and proxy for each order.
  • Do not repeat data (email, phone, name).
  • Use burner accounts.
  • Check IP and device history.
  • Use anti-detect browsers (Octo, Dolphin Anty).
  • Do not use one wallet for all transactions.

Objective: Study of multi-accounting methods, development of detection systems.

6. How to use dropshipping for reselling?​

Dropshipping is a model where you sell a product without storing it.

Stages:​

  1. Register a store (Shopify, WooCommerce).
  2. Find a supplier (AliExpress, CJ Dropshipping).
  3. Resell your product through other platforms:
    • eBay, Amazon, Facebook Marketplace
  4. Upon receipt of the order, process it with the supplier.
  5. The money stays with you, the difference is profit.

Objective: Analysis of dropshipping business model, development of verification protocols.

7. How to cash out goods in Telegram?​

Telegram has become one of the main platforms for selling goods outside of official systems.

Stages:​

  1. Receive the goods via drop shipping or carding.
  2. Find Telegram channels with the topic of selling equipment.
  3. Place an ad with photos and conditions.
  4. Discuss payment (usually crypto or P2P transfers).
  5. Send the goods after receiving the payment.

Objective: Research of the shadow economy, analysis of the distribution of illegal content.

8. How to avoid chargeback when dropping?​

A chargeback is a refund that can be initiated by the cardholder's bank.

Tip:​

  • Use burner accounts and unique data.
  • Do not repeat IP, email, phone.
  • Use gift cards instead of real cards.
  • Use high value physical products.
  • Use platforms with low chargeback (e.g. AliExpress).

Objective: Study of risks in payment systems, development of chargeback protection policies.

9. How to choose a reliable drop provider?​

Selection criteria:​

  • Reputation:
    • Check reviews on forums and Reddit.
  • Geography:
    • It is better to choose a provider in the USA or Europe.
  • Prices and delivery times:
    • Compare with other services.
  • 24/7 support:
    • Important when problems arise.
  • Possibility of repackaging and removing supplier information.

Objective: Analysis of logistics companies, development of delivery standards.

10. How to use dropship to withdraw funds?​

Stages:​

  1. Register a store (eg Shopify).
  2. Accept payments from compromised cards.
  3. Place your order through a dropshipping provider.
  4. The goods are sent to the victim.
  5. You make a profit in the form of the difference between the price and the cost of the product.
  6. Sell goods for crypto or fiat via Telegram/OTC.

Objective: Research of money laundering methods, development of systems for detecting suspicious transactions.

Conclusion:​

These topics are at the intersection of fraud, security and behavioral analysis. Studying them allows you to:
  • Develop more resilient security systems.
  • Create behavioral analytics models.
  • Test existing solutions for vulnerabilities.
  • Train cybersecurity professionals.
 
Top