Funding your burner privately
The whole point of the burner is to break the link between your published content and your real identity. That link gets re-established the moment you fund the burner from a wallet that's tied to you. Here's how to not do that.
When do I need to fund the burner at all?
You don't, unless you want to do on-chain things as the burner:
- Register a
.stacc(or other AllDomains TLD) name so people can type a memorable URL — costs a few cents in SOL + the mint price. - Post to an Ouija group on-chain — costs rent per message (≤ 0.005 SOL).
- Transfer SOL/SPL from the burner to anything.
Publishing content via this site is signature-only. It costs nothing and needs no SOL. Most users never fund the burner.
If you do need to fund it — pick one
Privacy-focused cross-chain swap. Send SOL from main wallet → swap to ETH/XMR/whatever → swap back to SOL → arrives at the burner. The chain hops break naive on-chain tracing.
No-account swap exchanges. SOL → BTC → SOL works; SOL → XMR → BTC → SOL is stronger. They explicitly don't require KYC for small amounts.
Strongest option. Buy XMR on Kraken/Cake Wallet, send to a fresh XMR address, swap XMR → SOL via a no-KYC service (Trocador, eXch), receive on the burner. Monero's privacy is on-chain by default, so the SOL→XMR→SOL transition is unlinkable on the XMR leg.
Buy SOL with cash from a P2P trader. The seller sends SOL to your burner directly. Most privacy-preserving, also most friction.
Existing burner stash
cost: Just network feesIf you already have another burner with SOL in it, just send from there. Anything that breaks the link between your real identity and the new burner works.
What none of these break
- Your IP. When you visit publish.ouija.social or talk to any Solana RPC, your IP is in their logs. Use Tor Browser for everything tied to the burner identity, or a VPN you trust (LOL).
- Browser fingerprint. Your user-agent, screen size, timezone, and the order your TLS extensions ship in are correlate-able. Tor Browser normalizes this.
- Writing style. Stylometry can finger you across pseudonyms. Hard to defend against — keep what you publish from your real-name self separate from what you publish here. Different topics, different vocabulary, different time-of-day.
- Timing correlation. If your real-name Twitter goes quiet at the same time your burner posts, an adversary watching both can correlate. Use timed publishing or schedule offsets.
The strongest single move
Open Tor Browser. Open publish.ouija.social. Generate a burner. Publish. Close Tor Browser. The burner mnemonic dies with the session. No funding ever needed.
You give up: ability to overwrite that .onion later. You gain: zero link between the publication and anything else you do.
This page is general guidance, not legal or security advice. Threat models vary; the right answer for someone leaking a story to a journalist is different from the right answer for someone publishing a recipe blog. If your threat model includes a well-resourced adversary, consult EFF's Surveillance Self-Defense.