{
  "version": "v1",
  "slug": "buy-domain-anonymously",
  "title": "How to buy a domain name anonymously",
  "description": "Registrar choice, WHOIS privacy, payment privacy, TLD politics, and the operational mistakes that link a \"private\" domain back to your identity anyway.",
  "intro": "Domains are the most KYC-prone layer of running a site. ICANN requires accurate registrant data; most TLD registries enforce it; most registrars KYC payment + identity at signup. Below: the registrars that work around this, the TLDs that help, and the operational steps that prevent the domain from being trivially de-anonymized later.",
  "body_plain": "Why domains are different ICANN policy requires registrants to provide accurate name, email, address, phone. Registries enforce via the registrar. WHOIS was historically a public lookup; GDPR redaction applies in EU + a few jurisdictions; outside that, registrant data is sometimes searchable. Privacy services (the registrar's own \"WHOIS privacy\") proxy the public record but the registrar still holds the underlying identity. Payment is often the strongest deanon vector — the registrar saw your card or wallet; that record persists even if WHOIS is private. Court-compelled disclosure can compel the registrar to reveal the underlying registrant data on legal request. The three privacy levers Registrar choice. Pick one that doesn't KYC payment + accepts crypto and explicitly markets privacy-respecting service. TLD choice. Some TLDs are more privacy-tolerant. .is , .ch , .li , .com in Iceland-friendly registrars > .uk , .de , .us for sensitive use. Payment. XMR > cash by mail > BTC > prepaid card > regular credit card. Privacy-respecting registrars Njalla: Sweden-based, registers the domain in their name on your behalf, hands over operational control. Accepts XMR. The reference no-KYC registrar. 1984 Hosting: Iceland. Accepts crypto. Long-running, privacy-friendly jurisdiction. Orangewebsite: Iceland reseller. Crypto-accepted. Caveat: Njalla owns the domain. If they go out of business or revoke service, you lose the domain. The trade-off for the privacy. The operational checklist Buy from Tor session on a fresh wallet. Pay in XMR. Use a throwaway email dedicated to the registration. Never link to your real identity. Set DNS to a privacy-respecting nameserver (e.g. 1984 or a self-hosted authoritative server). Cloudflare's nameservers are convenient but Cloudflare sees every query going through them. Don't host content that links to your real identity from this domain. Email handles, X usernames, GitHub repos under your real name all link back trivially. Don't pay your hosting provider with the same wallet you used for the registrar. Chain analysis joins them. Renew on time , ideally a year ahead. Lapsed domains get auctioned or sniped; a privacy-respecting domain in someone else's hands is worse than no domain. Common de-anonymization mistakes Reusing your real-name email anywhere on the domain. Even a \"Contact us\" page leaks if the mailto is your real address. Setting Cloudflare in front. The TLS termination + cache + analytics surface = Cloudflare sees your traffic + can be compelled to disclose. (Yes, we use Cloudflare for this directory; we accept the trade because we're not hiding the operator. If you are, route differently.) Letting Whois leak through DNS. Some registries publish nameserver assignment publicly even when WHOIS is private. Use generic nameservers. Domain age vs. account age. A 1-month-old domain registered to a 1-month-old account at a privacy registrar is a thin alibi if pressed. Reverse-image / favicon cross-correlation. Tools index favicons across the web; an identical favicon between your \"anonymous\" domain and your real-name domain links them. When you actually want a hidden service instead If the domain's only purpose is to host a service that's already privacy-sensitive, skip the clearnet domain entirely and run a Tor hidden service . No registrar to subpoena, no WHOIS, no payment trail. Trade-off: most users won't reach a .onion casually. Recommended stack",
  "body_html": "\n      <section>\n        <h2 class=\"section-h\">Why domains are different</h2>\n        <ul class=\"bullet-list\">\n          <li><strong>ICANN policy</strong> requires registrants to provide accurate name, email, address, phone. Registries enforce via the registrar.</li>\n          <li><strong>WHOIS</strong> was historically a public lookup; GDPR redaction applies in EU + a few jurisdictions; outside that, registrant data is sometimes searchable.</li>\n          <li><strong>Privacy services</strong> (the registrar's own \"WHOIS privacy\") proxy the public record but the registrar still holds the underlying identity.</li>\n          <li><strong>Payment</strong> is often the strongest deanon vector — the registrar saw your card or wallet; that record persists even if WHOIS is private.</li>\n          <li><strong>Court-compelled disclosure</strong> can compel the registrar to reveal the underlying registrant data on legal request.</li>\n        </ul>\n      </section>\n\n      <section>\n        <h2 class=\"section-h\">The three privacy levers</h2>\n        <ol class=\"bullet-list\">\n          <li><strong>Registrar choice.</strong> Pick one that doesn't KYC payment + accepts crypto and explicitly markets privacy-respecting service.</li>\n          <li><strong>TLD choice.</strong> Some TLDs are more privacy-tolerant. <code>.is</code>, <code>.ch</code>, <code>.li</code>, <code>.com</code> in Iceland-friendly registrars > <code>.uk</code>, <code>.de</code>, <code>.us</code> for sensitive use.</li>\n          <li><strong>Payment.</strong> XMR > cash by mail > BTC > prepaid card > regular credit card.</li>\n        </ol>\n      </section>\n\n      <section>\n        <h2 class=\"section-h\">Privacy-respecting registrars</h2>\n        <ul class=\"bullet-list\">\n          <li><strong>Njalla:</strong> Sweden-based, registers the domain in their name on your behalf, hands over operational control. Accepts XMR. The reference no-KYC registrar.</li>\n          <li><strong>1984 Hosting:</strong> Iceland. Accepts crypto. Long-running, privacy-friendly jurisdiction.</li>\n          <li><strong>Orangewebsite:</strong> Iceland reseller. Crypto-accepted.</li>\n          <li><strong>Caveat:</strong> Njalla owns the domain. If they go out of business or revoke service, you lose the domain. The trade-off for the privacy.</li>\n        </ul>\n      </section>\n\n      <section>\n        <h2 class=\"section-h\">The operational checklist</h2>\n        <ol class=\"bullet-list\">\n          <li><strong>Buy from Tor session</strong> on a fresh wallet. Pay in XMR.</li>\n          <li><strong>Use a throwaway email</strong> dedicated to the registration. Never link to your real identity.</li>\n          <li><strong>Set DNS to a privacy-respecting nameserver</strong> (e.g. <a href=\"https://1984.is\">1984</a> or a self-hosted authoritative server). Cloudflare's nameservers are convenient but Cloudflare sees every query going through them.</li>\n          <li><strong>Don't host content that links to your real identity</strong> from this domain. Email handles, X usernames, GitHub repos under your real name all link back trivially.</li>\n          <li><strong>Don't pay your hosting provider with the same wallet</strong> you used for the registrar. Chain analysis joins them.</li>\n          <li><strong>Renew on time</strong>, ideally a year ahead. Lapsed domains get auctioned or sniped; a privacy-respecting domain in someone else's hands is worse than no domain.</li>\n        </ol>\n      </section>\n\n      <section>\n        <h2 class=\"section-h\">Common de-anonymization mistakes</h2>\n        <ol class=\"bullet-list\">\n          <li><strong>Reusing your real-name email anywhere on the domain.</strong> Even a \"Contact us\" page leaks if the mailto is your real address.</li>\n          <li><strong>Setting Cloudflare in front.</strong> The TLS termination + cache + analytics surface = Cloudflare sees your traffic + can be compelled to disclose. (Yes, we use Cloudflare for this directory; we accept the trade because we're not hiding the operator. If you are, route differently.)</li>\n          <li><strong>Letting Whois leak through DNS.</strong> Some registries publish nameserver assignment publicly even when WHOIS is private. Use generic nameservers.</li>\n          <li><strong>Domain age vs. account age.</strong> A 1-month-old domain registered to a 1-month-old account at a privacy registrar is a thin alibi if pressed.</li>\n          <li><strong>Reverse-image / favicon cross-correlation.</strong> Tools index favicons across the web; an identical favicon between your \"anonymous\" domain and your real-name domain links them.</li>\n        </ol>\n      </section>\n\n      <section>\n        <h2 class=\"section-h\">When you actually want a hidden service instead</h2>\n        <p>If the domain's only purpose is to host a service that's already privacy-sensitive, skip the clearnet domain entirely and run a <a href=\"/guides/host-a-tor-hidden-service\">Tor hidden service</a>. No registrar to subpoena, no WHOIS, no payment trail. Trade-off: most users won't reach a .onion casually.</p>\n      </section>\n\n      <section>\n        <h2 class=\"section-h\">Recommended stack</h2>\n      </section>\n    ",
  "picks": [
    {
      "category": "email",
      "id": "njalla-domains",
      "name": "Njalla (domains)",
      "url": "https://xmr.club/email/njalla-domains",
      "markdown_twin": "https://xmr.club/llm/email/njalla-domains.txt",
      "why": "Reference no-KYC registrar. Domain held in Njalla's name, operational control to you. Accepts XMR."
    },
    {
      "category": "hosting",
      "id": "njalla-vps",
      "name": "Njalla (VPS)",
      "url": "https://xmr.club/hosting/njalla-vps",
      "markdown_twin": "https://xmr.club/llm/hosting/njalla-vps.txt",
      "why": "Pair the domain with VPS from the same operator — single trust boundary."
    },
    {
      "category": "hosting",
      "id": "1984-hosting",
      "name": "1984 Hosting",
      "url": "https://xmr.club/hosting/1984-hosting",
      "markdown_twin": "https://xmr.club/llm/hosting/1984-hosting.txt",
      "why": "Icelandic alternative + free-speech jurisdiction. Crypto-accepted."
    },
    {
      "category": "hosting",
      "id": "incognet",
      "name": "Incognet",
      "url": "https://xmr.club/hosting/incognet",
      "markdown_twin": "https://xmr.club/llm/hosting/incognet.txt",
      "why": "No-KYC hosting if you want to split registrar + host across operators."
    }
  ],
  "url": "https://xmr.club/guides/buy-domain-anonymously",
  "markdown_twin": "https://xmr.club/llm/guides/buy-domain-anonymously.txt"
}