Cryptocurrency transactions in the Philippines often sit at the intersection of private agreement, criminal fraud, electronic evidence, securities concerns, money-transfer risk, and regulatory uncertainty. When a crypto deal goes wrong, parties frequently ask the wrong first question. They ask, “Is crypto legal?” when the more useful legal questions are these:
- Was there a valid transaction or agreement?
- Was there deceit, abuse of confidence, or fraudulent conversion?
- Was there merely non-performance of a contract?
- Did the transaction involve investment solicitation, custody, or unauthorized fund handling?
- What evidence exists on-chain, off-chain, and in communications?
- Is the case criminal, civil, regulatory, or all three?
In Philippine law, disputes involving cryptocurrency do not exist outside the legal system merely because the asset is digital, decentralized, or transferred through a blockchain. A crypto transaction can still give rise to estafa, breach of contract, damages, unjust enrichment, quasi-delict issues, cyber-related evidentiary concerns, and possible regulatory consequences. The hard part is not whether the law applies. The hard part is determining which legal theory fits the facts.
This article explains estafa and breach of contract in cryptocurrency transactions in Philippine context, how to distinguish criminal fraud from civil non-performance, what legal elements matter, what evidence must be preserved, and what remedies may be available to aggrieved parties.
I. Why cryptocurrency disputes are legally difficult
Crypto disputes are unusually hard because they mix at least four different layers at once:
- the asset layer, involving tokens, coins, stablecoins, NFTs, or other blockchain-based value;
- the transaction layer, involving wallets, exchanges, smart contracts, custody, and transfers;
- the agreement layer, involving promises, price, delivery, profit-sharing, custody, management, or repayment; and
- the fraud layer, involving false representations, fake trading, wallet substitution, rug pulls, unauthorized conversion, or deceptive solicitations.
A person may think he was “scammed in crypto,” but legally the case may actually be:
- estafa,
- simple breach of contract,
- failure of consideration,
- unauthorized taking,
- investment fraud,
- misrepresentation,
- partnership/accounting dispute,
- agency abuse,
- cyber-enabled deception,
- recovery problem with no practical defendant,
- or a combination of several.
Crypto terminology often hides basic legal realities. If one party accepted money or digital assets under false pretenses, that may be fraud even if the vehicle was USDT, Bitcoin, Ether, or another token. If one party simply failed to perform a lawful promise without criminal deceit, that may be breach of contract instead of estafa.
II. The first legal question: is the issue criminal estafa or civil breach of contract?
This is the most important distinction.
Philippine law does not treat every failed deal as estafa. At the same time, a party cannot escape criminal liability merely by saying, “It was just a business deal.”
The dividing line usually turns on deceit, abuse of confidence, misappropriation, or fraudulent conversion, as opposed to ordinary non-performance.
Estafa generally involves:
- deceit at the outset,
- abuse of confidence,
- receiving money, property, or value under an obligation to deliver, administer, or return it, then misappropriating or converting it,
- inducing another to part with money or property through false pretenses,
- damage or prejudice to the victim.
Breach of contract generally involves:
- a valid agreement,
- failure to perform,
- delay, defective performance, or refusal,
- but without sufficient proof of criminal deceit or fraudulent conversion required for estafa.
The same facts may support both civil and criminal consequences, but the legal basis must be analyzed carefully.
III. Can cryptocurrency be the subject of estafa or contract?
Yes.
Even though cryptocurrency is digital and legally complex, it may still function in disputes as:
- property,
- money’s worth,
- valuable consideration,
- entrusted asset,
- object of delivery,
- object of sale,
- subject of custody or administration,
- subject of fraud.
Philippine law is concerned with the underlying wrong, not merely the technology. If a person receives crypto to invest, hold, trade, remit, return, or deliver and then fraudulently converts it, the digital form of the asset does not by itself prevent legal liability.
Likewise, if two parties agree on a crypto sale, token transfer, mining arrangement, staking arrangement, wallet management service, OTC desk trade, or profit-sharing arrangement, contract principles can still apply.
IV. Estafa in cryptocurrency transactions
1. Estafa by misappropriation or conversion
One of the clearest crypto estafa scenarios is where a person receives cryptocurrency, or fiat money intended for crypto, under an obligation to hold, administer, trade for a specific purpose, or return it, and instead diverts it for personal use.
Examples include:
- A trader receives USDT to execute an OTC purchase for a client, then sends nothing and keeps the funds.
- A friend asks to borrow crypto for a short arbitrage trade, promising to return the same amount or equivalent, but instead transfers it to his personal accounts and disappears.
- A fund manager receives pooled crypto to place in a specific strategy, but secretly uses it to pay unrelated debts.
- A wallet custodian is entrusted with seed access or controlled transfers and misdirects the assets.
The key legal questions are:
- Was the asset received in trust, for administration, or with an obligation to deliver or return?
- Was there actual misappropriation, conversion, or denial?
- Was there damage to the owner?
In crypto cases, conversion may appear through:
- wallet transfers inconsistent with the agreed purpose,
- tracing to the defendant’s own wallet or exchange account,
- refusal to account,
- false explanations after demand,
- disappearance after receipt.
2. Estafa by false pretenses or fraudulent acts
Another common crypto scenario is inducement by deceit.
Examples:
- A person falsely claims to have access to discounted institutional crypto liquidity.
- A supposed miner or validator claims guaranteed returns from equipment or staking that does not exist.
- A fake exchange agent claims to sell tokens but never had control of the assets.
- A scammer claims to be a broker with “locked allocation” of a token launch.
- A fraudster offers to convert pesos into crypto at favorable rates using fabricated proof of reserves or fake exchange screenshots.
The issue here is not mere failure to profit. The issue is whether the victim was induced to part with money or crypto by material false representation.
3. Estafa through abuse of confidence
This may arise where the offender was trusted because of personal, professional, or business relationship.
Examples:
- An employee handling corporate crypto treasury diverts tokens.
- A family member given temporary custody of a hardware wallet transfers the holdings out.
- A business partner tasked to hold escrow assets releases them without authority.
- A developer given control over project treasury drains the wallet contrary to mandate.
The abuse of trust can be legally significant when it accompanies receipt and conversion.
V. Breach of contract in cryptocurrency transactions
Not every crypto loss is estafa. Many are civil breaches.
A crypto dispute is more likely to be civil when:
- both parties genuinely intended a legitimate transaction,
- the defendant’s promise was real when made,
- there is no clear proof of fraud or conversion,
- the dispute centers on delay, market movement, technical failure, or disagreement over interpretation,
- the issue is defective performance rather than deceit.
Examples include:
- A seller agreed to transfer crypto after payment but claims the buyer failed KYC conditions stated in the agreement.
- A mining-hosting provider failed to deliver expected uptime.
- A token development contractor failed to complete a project milestone.
- A party promised to build or audit a smart contract and did substandard work.
- A borrower of crypto acknowledges the debt but disputes the due date or valuation method.
- An OTC trade collapses because of compliance holds or exchange freezes rather than fraud.
- A staking or yield arrangement fails because the strategy lost money and the contract allocated that risk.
These may still justify damages, rescission, restitution, or collection, but criminal estafa is not automatic.
VI. Why many people wrongly label breach of contract as estafa
In the Philippines, many complainants equate any broken promise with estafa. Courts do not.
A mere failure to pay a debt, failure to perform a promise, or inability to meet business expectations does not automatically become estafa. Criminal law requires more than disappointment. It generally requires deceit or fraudulent conversion, not simply non-payment.
This distinction matters because criminal law is not meant to punish every bad deal. Otherwise, every failed business venture, unpaid investment, or delayed delivery could be criminalized.
In crypto, emotions run high because:
- prices move quickly,
- records are confusing,
- anonymous wallets feel suspicious,
- victims often discover loss only after funds are irretrievable.
Still, legal classification must remain disciplined.
VII. The role of demand in crypto estafa cases
Demand often becomes important, especially in cases involving entrusted assets. If a person was supposed to return or account for crypto and fails to do so after demand, that refusal may help prove misappropriation or conversion.
Demand may be made through:
- formal demand letter,
- email,
- messaging apps,
- exchange support records,
- lawyer correspondence.
In crypto cases, demand should be precise. It should specify:
- the date of the transaction,
- the type and amount of crypto,
- wallet addresses involved,
- the purpose for which the asset was delivered,
- the obligation to return, deliver, or account,
- the deadline for compliance.
A vague complaint like “You scammed me in crypto” is far less useful than a structured demand tied to verifiable transfers.
VIII. Common crypto fact patterns and their legal classification
1. OTC peso-to-crypto deal with fake seller
A buyer sends pesos to a supposed OTC seller who never sends USDT.
Likely issues:
- estafa by false pretenses,
- possible cyber-enabled fraud,
- civil damages.
2. Entrusted trading capital diverted
A person gives crypto to a trader with strict instructions for spot trading only. The trader transfers it to personal wallets and cannot explain where it went.
Likely issues:
- estafa by misappropriation,
- accounting and civil recovery,
- possible money trail issues through exchanges.
3. Actual trading loss, not theft
A trader genuinely entered positions as authorized, but lost the capital due to volatility.
Likely issues:
- maybe civil liability if unauthorized strategy or negligence is proven,
- not automatically estafa if there was no deceit or conversion.
4. Borrowed crypto not repaid
A friend borrows 2 ETH and later refuses to repay.
Likely issues:
- could be civil collection if it was a true loan with no fraud at inception,
- could become estafa only if evidence shows deceit or fraudulent appropriation under circumstances fitting the penal law.
5. Rug-pull style token launch
Developers solicit funds for a project, promise utility, lockups, and treasury protection, then disappear with the treasury.
Likely issues:
- estafa,
- possible securities or investment-solicitation concerns,
- civil and regulatory consequences.
6. Exchange freeze blamed on “system issue”
A platform or informal operator claims withdrawals are frozen because of compliance or blockchain congestion.
Likely issues:
- may be civil at first,
- may become estafa if the freeze explanation is false and funds were actually diverted.
7. Smart-contract service provider fails to deliver code
A developer accepts payment in stablecoins but fails to produce the contracted work product.
Likely issues:
- breach of contract,
- possible damages,
- only estafa if deceit existed from the beginning.
IX. The significance of intent at the beginning of the transaction
One of the strongest dividing lines between estafa and breach of contract is the defendant’s intent when the transaction was made.
If the accused entered the agreement honestly but later failed, that points more toward civil liability. If the accused never intended to perform, or used false claims to obtain the funds, criminal fraud becomes more plausible.
Relevant indicators include:
- fake identities,
- fake screenshots of balances or trades,
- fabricated exchange credentials,
- false claims of licensing or corporate affiliation,
- immediate transfer of assets to unrelated wallets,
- repeated use of the same scheme against multiple victims,
- inconsistent stories from the outset,
- use of aliases and burner accounts,
- refusal to identify receiving addresses beforehand,
- fake transaction hashes or doctored explorers.
Intent is rarely proved by confession. It is usually inferred from conduct.
X. Contract formation in crypto transactions
A surprising number of crypto deals are made with poor documentation. Yet a contract may still exist even without a formal printed agreement.
Evidence of contractual terms may come from:
- chat messages,
- emails,
- exchange of wallet addresses,
- invoices,
- screenshots of agreed price,
- voice messages,
- spreadsheets,
- wire transfer memos,
- notarized or informal agreements,
- escrow instructions,
- on-chain memos where applicable.
The challenge is proving the exact terms, especially on:
- price,
- timing,
- asset type,
- network,
- delivery obligations,
- slippage tolerance,
- custody conditions,
- risk allocation,
- default consequences,
- valuation date if repayment is in fiat equivalent.
In crypto disputes, sloppy documentation often turns a clear case into a difficult one.
XI. What counts as breach in crypto contracts
A crypto contract may be breached through:
- non-delivery of coins or tokens,
- late delivery,
- delivery on the wrong chain,
- delivery of the wrong token,
- refusal to release escrow,
- failure to return entrusted assets,
- failure to remit proceeds,
- unauthorized rehypothecation or redeployment,
- failure to complete project obligations paid in crypto,
- refusal to recognize agreed wallet or recovery terms,
- failure to comply with security and custody commitments.
Because blockchain transactions can be technically irreversible, the practical importance of pre-transfer obligations is enormous.
XII. The valuation problem: how do you measure damages in crypto?
This is one of the hardest questions.
If someone owed 1 BTC and failed to deliver, should damages be measured by:
- the peso value on the contract date,
- the value on the breach date,
- the value on the demand date,
- the value on filing date,
- the value at judgment,
- or return of the exact asset?
The answer depends on the legal theory, the contract terms, and the remedy sought.
Important possibilities include:
- specific delivery of the agreed crypto,
- restitution of the same token amount,
- peso equivalent,
- actual damages based on provable market value,
- consequential damages where recoverable,
- interest where legally justified.
The volatility of crypto makes timing critical. A token’s value may drastically change between breach and suit, which complicates both civil damages and settlement.
Parties who fail to define valuation rules in advance create major litigation risk.
XIII. On-chain evidence and its legal value
Crypto disputes produce a unique evidence set: blockchain records.
These may show:
- wallet addresses,
- timestamps,
- transaction hashes,
- asset amount,
- destination wallets,
- sequence of transfers,
- interaction with exchanges or smart contracts,
- mixing or bridging behavior,
- treasury drains,
- token approvals.
On-chain evidence can be powerful because it is often publicly verifiable. But it also has limits. A blockchain record usually shows that a transfer happened, not necessarily:
- who legally controlled the wallet,
- why the transfer was made,
- what contract governed it,
- whether the transfer was authorized,
- whether the recipient was a custodian or beneficial owner.
That is why on-chain evidence must be paired with off-chain proof such as:
- chats,
- KYC records,
- exchange documents,
- device logs,
- witness testimony,
- admissions,
- payment receipts,
- business records.
XIV. Wallet control, identity, and attribution
A major problem in crypto litigation is linking a wallet to a person.
To prove estafa or civil liability, the claimant may need to show that a specific wallet was controlled by the defendant. That may be inferred from:
- the defendant sending the wallet address in chat,
- prior transactions from that wallet,
- exchange deposit records,
- admissions,
- screenshots from the defendant,
- transactional behavior tied to known accounts,
- blockchain forensic patterns,
- synchronized messages and transfers.
Anonymous wallets do not automatically defeat liability, but they complicate proof. The legal issue is not only where the funds went, but who controlled the receiving endpoint.
XV. Fake exchanges, fake wallets, and cloned interfaces
Many crypto estafa cases involve deception through interfaces rather than actual blockchain operations.
Examples:
- fake exchange websites,
- fake wallet apps,
- fake proof-of-balance dashboards,
- manipulated transaction confirmations,
- fake OTC portals,
- cloned support pages,
- false “withdrawal tax” or “unlock fee” demands.
In such cases, the victim may believe funds were invested or frozen when in truth they were simply stolen. These cases often present strong estafa indicators because the entire transaction environment was deceitful from inception.
XVI. Breach of contract in smart contract and DeFi arrangements
DeFi and smart contract transactions add another layer of complexity. A party may argue that “code is law” or that losses resulted from automated protocol behavior. Philippine contract law does not disappear merely because execution involved a smart contract.
Legal disputes may still arise over:
- who was obligated to deploy or audit code,
- whether risk was disclosed,
- whether admin keys were misused,
- whether tokenomics were misrepresented,
- whether protocol access was modified unfairly,
- whether a treasury transfer breached governance promises,
- whether a staking strategy matched represented risk.
A failed protocol is not automatically estafa. But a DeFi structure used as a cover for deceit or diversion can still ground criminal and civil liability.
XVII. Regulatory overlap: crypto disputes are not always just private disputes
Some crypto cases go beyond estafa or contract and enter regulatory territory, especially when they involve:
- pooled investments,
- public solicitation,
- guaranteed returns,
- custody of third-party assets,
- operation as an exchange or broker,
- token offerings marketed as investments,
- money service activities,
- large-scale remittance or conversion arrangements.
This matters because the defendant may face not only private claims but also possible consequences under financial, securities, anti-money laundering, or licensing regimes. A civil defendant’s promise that “this was only a private token deal” may not hold if the structure functioned like an unauthorized investment or financial service.
Even so, a victim’s private cause of action must still be pleaded and proved on its own theory.
XVIII. Criminal complaint versus civil action
A wronged party must think carefully about remedy selection.
A criminal estafa route may be useful when:
- there was clear deceit or misappropriation,
- the defendant received and diverted assets,
- the facts involve intentional fraud,
- criminal leverage is justified by law.
A civil action may be more appropriate when:
- the main issue is contractual breach,
- the facts are commercially complex,
- deceit is hard to prove,
- the claimant wants recovery, accounting, rescission, or damages rather than penal consequences.
Both may be possible when:
- the same act gives rise to criminal fraud and civil injury.
Still, one must avoid using criminal process to pressure payment of what is really just an ordinary debt. Courts are alert to that danger.
XIX. The problem of “investment language” and profit guarantees
A recurring Philippine crypto dispute pattern involves promises such as:
- guaranteed daily returns,
- no-loss trading,
- fixed arbitrage profits,
- insured staking,
- principal-protected yield,
- VIP insider allocations,
- “double your USDT in 30 days.”
These promises often signal either:
- outright deceit,
- unauthorized investment solicitation,
- impossible business representations,
- or at minimum a deeply risky and poorly documented arrangement.
When a person parts with funds because of these representations, the legal analysis should carefully examine whether the transaction was induced by fraud rather than mere failed speculation.
XX. Demand letters, rescission, and restitution
Before litigation, a well-drafted demand letter can be crucial. In crypto disputes it should attach or identify:
- contract or chats,
- transaction hashes,
- wallet addresses,
- bank transfer receipts,
- screenshots of promises,
- breakdown of amount due,
- asset valuation method,
- demand for return, delivery, accounting, or payment,
- deadline.
Possible civil theories may include:
- collection of sum of money,
- specific performance,
- rescission where appropriate,
- restitution,
- damages,
- unjust enrichment.
The goal is to force legal precision. Many defendants exploit ambiguity unless confronted with a detailed record.
XXI. Evidence that victims should preserve immediately
A crypto victim should preserve all available proof, including:
- wallet addresses,
- transaction hashes,
- blockchain explorer captures,
- seed or access history where relevant,
- screenshots of balances before transfer,
- chat logs,
- voice notes,
- emails,
- exchange account details,
- KYC information of the counterparty if available,
- payment receipts,
- bank and e-wallet confirmations,
- IDs used in onboarding,
- copies of agreements,
- promotional materials,
- website captures,
- social media posts,
- names of other victims if known,
- demand and response correspondence.
Do not rely only on screenshots of chats without preserving the rest of the context. Do not assume the blockchain “speaks for itself.” Courts and investigators often need a coherent narrative tied to authentic records.
XXII. Common defenses raised by crypto defendants
Defendants often argue:
- “It was just a market loss.”
- “You knew the risks.”
- “The wallet was hacked.”
- “The transaction was irreversible.”
- “I never guaranteed anything.”
- “I was only an introducer.”
- “The coin crashed; I did not steal it.”
- “You sent to the wrong network or address.”
- “It was an investment, not a debt.”
- “There was no formal contract.”
- “I intended to pay later.”
- “The wallet is not mine.”
Some of these may be valid in certain cases. Others are excuses masking fraud. The success of the claim usually depends on whether the evidence shows:
- what was promised,
- what was received,
- who controlled the destination,
- what happened afterward,
- whether the explanation matches the transaction trail.
XXIII. Special issue: third-party escrow and peer-to-peer trades
Many crypto transactions use escrow agents or P2P platforms. Problems arise when:
- the escrow agent absconds,
- the platform chat is manipulated,
- payment is reversed,
- fake proof of payment is used,
- release occurs before funds are confirmed,
- a middleman impersonates the real counterparty.
Where an escrow holder or intermediary was entrusted with assets and diverts them, estafa analysis becomes particularly strong. Where a platform merely failed as a neutral venue, the liability picture may be different.
XXIV. What if there was no written contract?
A formal signed contract is helpful, but not indispensable. Philippine contract law generally recognizes consent manifested through conduct and communications. In crypto disputes, the absence of a formal contract does not eliminate all remedies.
But it does make proof more fragile. The claimant must reconstruct:
- the offer,
- acceptance,
- consideration,
- obligation,
- performance expected,
- deadline,
- breach,
- damage.
Chat-based contracts are real, but they must be proved carefully.
XXV. Corporate crypto disputes and fiduciary problems
Where crypto is handled in a business setting, liability may involve:
- directors,
- officers,
- treasury managers,
- employees,
- project founders,
- signatories,
- DAO-like teams acting through a company or partnership structure.
Misuse of corporate or pooled crypto assets may trigger:
- estafa,
- breach of fiduciary duty,
- accounting actions,
- corporate internal disputes,
- labor or agency issues,
- damages,
- regulatory consequences.
A founder cannot automatically treat project treasury as personal money merely because the wallet is under his practical control.
XXVI. Jurisdictional and practical enforcement problems
Even if the claimant has a strong case, crypto disputes face practical barriers:
- the defendant may be abroad,
- the wallets may be anonymous,
- the funds may be bridged or mixed,
- exchanges may require legal process,
- records may disappear,
- the asset may crash in value,
- the defendant may be insolvent,
- the platform may not cooperate promptly.
This means a strong legal theory is necessary but not sufficient. Early evidence preservation and rapid identification of service providers are often decisive.
XXVII. When victims make their own case worse
Victims sometimes undermine their claims by:
- deleting chats,
- failing to preserve wallet information,
- continuing to send money after obvious red flags,
- making vague accusations without transaction detail,
- calling every failed trade estafa,
- accepting partial repayments without documenting terms,
- paying “recovery agents” who are themselves scammers,
- confronting the defendant in ways that trigger evidence destruction.
The law can only work with the facts that can still be proved.
XXVIII. Practical legal framework for analyzing a crypto dispute
A disciplined Philippine legal analysis should ask the following in order:
1. What exactly was transferred?
Was it fiat, BTC, ETH, USDT, another token, NFT, or access credentials?
2. Under what agreement?
Sale, loan, custody, trading mandate, investment management, development contract, escrow, partnership, or agency?
3. What exact obligation arose?
Deliver crypto, return principal, account for trades, build software, remit proceeds, safeguard treasury?
4. What evidence proves the obligation?
Chats, contract, receipts, transaction hashes, witness testimony, exchange records?
5. Was there deceit from the start?
False identity, fake platform, fake balances, fake guarantees, fabricated authority?
6. Was there misappropriation or conversion?
Did the defendant receive the asset and divert it contrary to obligation?
7. Or was it simply failure to perform?
Delay, technical failure, misunderstanding, market loss?
8. What remedy is most viable?
Criminal complaint, civil action, damages, restitution, rescission, accounting, regulatory referral?
This framework prevents category confusion.
XXIX. Final legal conclusion
In the Philippines, cryptocurrency transactions can give rise to both estafa and breach of contract, but the two are not interchangeable. The fact that a transaction involves Bitcoin, stablecoins, token wallets, exchanges, or blockchain records does not remove it from ordinary legal analysis. What matters is the substance of the act.
If a person obtained crypto or fiat intended for crypto through deceit, false pretenses, abuse of confidence, misappropriation, or fraudulent conversion, the case may support estafa and related criminal remedies. If the dispute involves a genuine agreement later broken through delay, defective performance, non-payment, or commercial disagreement without sufficient proof of criminal fraud, the case is more likely one for breach of contract, damages, restitution, or other civil relief.
The hardest part of crypto litigation is often not legal doctrine but proof: tracing transfers, linking wallets to persons, proving the agreed terms, and separating real market risk from fabricated excuses. For that reason, the most important rules in crypto disputes are still the oldest legal ones: identify the obligation, preserve the evidence, trace the value, classify the wrong correctly, and choose the right remedy.
In Philippine context, crypto may be new, but fraud, broken promises, and misuse of entrusted value are not. The law already knows how to deal with them. The challenge is applying the correct legal lens to a technologically modern transaction.