Skip to main content

Initiation into the Realm of Crypto Anonymity

An open source guide to create an anon identity
By UniPuff, Stellar Magnet

Crypto exists in a liminal space between transparency and privacy. On one hand, it fully embraces openness and lowering barriers to entry, from permissionless participation in networks and organizations to the funding of open-source products as public goods. But crypto’s origins are built upon the cypherpunk values of cryptographic protection of personal information and web activity, with the option to selectively reveal oneself. Presently when it comes to Ethereum, the balance is tilting towards fully see-through plain text transparency. However, countercultural groups, such as the lunarpunks, have emerged to address issues inherent in the public nature of Ethereum, attributing the issue of see-through plain text transparency to a corruption in the original crypto-anarchist values that first motivated the development of blockchain technologies. In essence, the lunarpunks are intent on bringing back elements of the original cypherpunk spirit within the relevant context of crypto in its present day iterations.

The following guide focuses on how to achieve greater privacy by creating an anonymous identity to more safely transact, develop applications, and participate in DAOs, such that individuals can find sanctuary in the panopticon of public blockchains.


This guide rests "on the shoulders of anon giants", making use of resources such as Mikerah's "anon-guide", 0xngmi's "How to stay anon" guide, and Seth For Privacy's "Privacy first steps". But most importantly, this guide is a living, breathing document intended as a collaborative tool, yet is not fully comprehensive. For example, the guide can still use a section on SIM cards. If you wish to enrich this resource with more tools or tactics, access the "Edit this page" link at the bottom of the page and submit an update by making a pull request. Otherwise, share your feedback in our social space.

A. Setting-up Firm Foundations for Your New Digital Identity

It’s important to note that your digital presence has a lot of moving parts, and you can choose to start anonymizing any of them. However, if you aim for the most protection possible, it is good to start from scratch, setting a solid foundation through creating a new digital identity. This is the only part of the guide that is not optional if you want to maximize privacy and anonymity.

A.1. Start With Hardware and OS

First things first, it’s essential to have a separate laptop and smartphone that are not linked to your true identity.

  • Use these devices whenever communicating or working as your new identity. 0xngmi's guide goes into great detail on this path.
  • Ideally, avoid synching accounts across the smartphone and laptop used for your alternate identity.


  • If you are not in a position to purchase new hardware, try using a virtual machine such as VirtualBox, and run a fully anonymized OS like Qubes or Whonix.

A.2. Protect Internet Traffic through Privacy Browsers and Extensions

Internet traffic is the biggest attack vector. Blocking ads, trackers, malicious links and fingerprinting is very important for privacy. Fortunately, there are browsers that attempt to route around various tracking methods natively, as well as plenty of open-source extensions to fill in the privacy blanks.


Brave is the go-to browser for crypto-related activities.

  • Brave provides various traffic blocking options and allows for a great deal of customizability according to individual privacy needs. For example, if you want to be very aggressive, you may choose to block JavaScript and aim for a more classic read-only web experience.
  • Brave also provides a built-in non-custodial crypto wallet, an in-browser VPN, and the ability to directly open a new private window with Tor for selected sites.

Tor anonymizes internet traffic by shielding messages into multiple layers of encryption, which involve nodes that are spread all around the world.

  • Tor is a protocol embedded within the Tor Browser. Similarly to Brave, the browser blocks all kinds of tracking and can do so more aggressively if desired.
  • While Tor is infamously slow at launch, it provides a level of anonymity that is incredibly hard to pierce through.
  • Note: Tor should not be used alongside a VPN, as it will deanonymize you.

Another option, albeit a less effective one for privacy protection, is creating a new browser profile in Firefox or Chrome (and their derivatives). This is an option that you should only consider if you have a very low threat model when it comes to anonymity.


A.3. Register a New VPN Account

If you aren’t using the Tor Browser or an OS like Whonix, then using a third-party Virtual Private Network (VPN) is a necessity if you want to maximize your sovereignty on the internet. Without a VPN, an ISP will be able to know exactly what websites you’re visiting. With a VPN, however, an ISP will only be able to know that you’re using a VPN.

Following Seth For Privacy’s guide, we recommend using IVPN or Mullvad. Neither maintain user logs and subscriptions can be purchased in Bitcoin, Monero, or even by mailing an envelope of cash.

A.4. Create a New Email Address with a Private Email Provider

There are a few different private email providers to select from with different trade-offs to consider. For email recovery options, ensure that you don't use an email that can dox you or your phone number.

Additionally, if you wish to secure even greater anonymity when sending and receiving emails, you could use an email alias service like SimpleLogin to shield your main email address and protect your inbox.

A.5. Use Trustworthy Password Management and File Encryption Software

As mentioned, online activity is the biggest attack vector, so what happens when spyware gains access to your desktop? Zero-day exploits aren’t uncommon, and important files or passwords must be protected, so password managers and PGP (Pretty Good Privacy) encryption are a must.

  • Use KeyPassXC for managing passwords in a secure way without any cloud-sync. Make sure you consider storing a secure back-up somewhere with this choice so you don’t lose your passwords.
  • You can also use Bitwarden, which is also open source, but it has cloud-sync. Keep in mind that choosing a password manager with cloud-sync is a matter of sacrificing security for convenience.
  • Install OpenPGP software such as Kleopatra to encrypt and decrypt your files with your own unique signature (here's a very helpful video to walk you through the process). This is especially important If you wish to store crypto wallet seed phrases or app API keys on your computer.

Note: It is not recommended to store seed phrases for high value accounts on digital devices continuously connected to the internet due to their vulnerability to hacks.

B. Use Secure and Anonymous Online Tools

Most cryptocurrency projects and DAOs still use highly centralized tools even for their most crucial operations. The obvious suspects are GitHub, Discord, Telegram, and Google Suite. Use of these tools makes the community around a project vulnerable to potential platform or state censorship. However, if you take privacy seriously, there are a lot of open-source alternatives to choose from.

B.1. Use a Self-hosted or Decentralized Git Service

GitHub is the go-to collaborative code platform but they have a history of censorship that warrants skepticism for hosting code with them (e.g. deplatforming the Tornado Cash organization and its many developers). Some alternatives to consider:

  • Use a self-hosting git service such as self-managed GitLab or Gitea.
  • Another collaborative code environment is Radicle, which is a peer to peer network built on Git, and has been developed with censorship resistance in mind.

Make sure you generate new SSH keys associated with your anon identity and email address.

B.2. Use Hosting Service Providers and Domain Registrars that Accept Crypto

If you need to register a domain and create a hosted website, it’s recommended to utilize services that accept crypto payments. Any fiat bank transfer would compromise your real identity. Fortunately there are various service that accept crypto payments:

  • Njalla can anonymously register domains which will technically be owned by Njalla, but you would be able to use it like you own it. They also offer virtual private servers (VPS).
  • Servers Guru and Hostinger are some additional options to consider for hosting, offering both VPS and dedicated servers that are quite affordable.
  • If your project is oriented towards the Ethereum community, you could register a .eth domain with ENS, and associate an IPFS hash with that domain, which can be accessible via the Brave browser.

B.3. Use End-to-end Encrypted Document/Collaboration Tools

Documentation of knowledge is one of the cornerstones of building a project, and collaborative interfaces have signified a leap in productivity and knowledge sharing. Unfortunately collaborative editors such as Notion are riddled with privacy issues, such as whatever you store in Notion can be handed off to prying parties by Notion. So it is good to find apps that guarantee page contents are end-to-end encrypted.

  • CryptPad is one of the most common tools to use for private note sharing and document collaboration. The interface is very easy to use but is limited for larger scale operations.
  • Skiff is going in the direction of becoming a legitimate privacy-preserving contender to Notion, although the current Skiff features are more limited, and are focused on documentation, so they presently lack the core Notion-like ability of creating and cross-linking databases.
  • AFFiNE is another end-to-end encrypted and open source collaborative knowledge management tool. It includes features such as kanban and the ability to transform a page into a free-form canvas. It works well with Chromium, but beware that there may be sync issues if you’re using Brave.

B.4. Don't Solely Build Community on Discord

Discord is a privacy hellscape. It doesn't offer end-to-end encrypted direct messaging or channels, is not open source, and is very easy to get terminally censored even as a false flag. For essential operations, you are better off using a fully encrypted solution. Some possible alternatives are:

  • Host your own server on your self-hosted domain and use the Element client for access.
  • Keybase offers end-to-end encrypted team chats and direct messaging. Users don't own the data, however, so there is some censorship risk. But this is a better option than Discord and has better UX compared to Element.
  • Urbit offers an interesting response to the problem of chat platform privacy. In contrast to other proprietary software, Urbit is a super-app with p2p messaging capabilities built into its basic infrastructure. Every participant enters the network with their own pseudonymous self-sovereign ID and you only need to know another person's pseudonym to be able to message them.
    • Urbit runs natively on macOS and Linux (including WSL), and serves a web interface where apps can be installed and used. Self-hosting can be performed at home or on a remote server.
    • The "Groups" and "Talk" apps allows users to make their own private community chats, with the ability to make channels and publish files inside the group chat.
  • Lastly, keep an eye out for what Status and DarkFi are building. Status’s chat doesn’t appear to have team features yet, but they might offer these features at some point. DarkFi is developing a p2p irc that is still in an alpha stage of development. However, members of their community appear to be using it already for core operations.

B.5. Pay for Services Using Anonymized Crypto

As mentioned above, paying for services with crypto is the best way to not dox yourself through your bank account details. However, be aware that the most widely used cryptocurrencies operate on a public blockchain where transactions are fully transparent and can be traced back to your wallet. For this reason, you will need to make sure you use services that anonymize your crypto.

For Bitcoin:

For Ethereum:

  • You can anonymize your ETH with by depositing ETH and then withdrawing after a certain period. For increased anonymity, deposit a lot of ETH at once, and then withdraw small amounts of that over time. For more details, refer to our guide.

Alternatively, the best option is to use privacy coins which enable anonymous and untraceable transactions by default:

  • Zcash shielded transactions offers some of the best privacy guarantees.
  • Monero offers less privacy than Zcash shielded transactions, but there is greater adoption when it comes to being able to pay for services with Monero over Zcash.

Checkpoint: After having followed all the above steps and have all protections in place and working, you can now proceed to introducing your new anon identity to the world.

C. Embrace Your New Digital Self

C.1. Create New Social Identities

Anonymity is better done in the shadows of a pseudonym. Make sure you choose a 'nym that represents you (you are gonna be using this a lot) and make social media accounts with it to "legitimize" your new identity. A Twitter account is a must to build up reputation among Crypto Twitter. GitHub, Discord and Reddit accounts can be created on an as-needed basis, depending on the purpose of your identity. Just make sure to use your new anon email when signing up for social accounts.

The crucial thing is to remain consistent y between all of your social profiles, in terms of display names, usernames, bios and details. Don't underestimate the use of non-technical measures for protection, as doxing is how most anons are unwillingly dragged out of their shell of privacy.


Remember that all the above web apps have data extraction practices in play, so always make sure that you: a) use your new VPN or Tor b) your new email, and c) stay consistent, each time you access these accounts!

C.2. Role Play is Your Friend

Even with the most maximizing privacy preservation stack, there are a lot of ways to dox yourself and make mistakes. Mindful behavior and vigilance are equally important, as you don’t want to throw away all of your hard work due to a misguided tweet.

Sometimes using social media is unavoidable, such as the case when you're building your own project. Many anon devs have managed to safely use social media by adopting a pseudonymous identity. In doing so, make sure to not only adopt a name and consistent life history details, but a whole personality to accompany your new digital persona. This is the time to be creative and come up with your own character, vocabulary, and personality traits, and then be consistent about them.

If you are planning on working on multiple projects, follow this guide from scratch and make sure to follow principles of heteronymity. Try to adopt a new digital identity plus persona for each of your individual projects.

If you want to dive deeper into anonymous identity play, make sure to check out Zentaipunks.

Support or Join Black Sky

If you appreciated this resource and would like to see more like it, please consider making a donation to Black Sky. Additionally, follow Black Sky on Twitter or join our Telegram.

Resources & References