← blog
OPSEC · Founder playbook

The anonymous founder checklist for OSS crypto infrastructure.

Yoshi · 2026-04-17

MeterCall has no named founders. That is a deliberate product decision, not a marketing trick. Anonymous teams ship crypto infrastructure that named teams cannot, because anonymous teams cannot be pressured out of decentralization by the same levers that bend named teams. It is also, if you do it badly, a short career. This is the checklist we actually use. It is not legal advice. It is survival hygiene.

Threat model first

Before any tool, a threat model. “I do not want my neighbor to know” is a different threat model from “I do not want a state-level actor to know,” and the controls are different. Ours is in the middle. We assume:

We do not model state-level adversaries as a routine threat. If you are building something that attracts them, this checklist is necessary but not sufficient and you should talk to someone who does this professionally.

Identity hygiene

Separate everything

One laptop, one phone, one SIM, one set of accounts. Never cross the stream. The cleanest way is to run the anonymous persona on a dedicated machine that never sees your real email, your real browser profile, your real Apple ID. If you share a machine, at minimum use separate OS user accounts and never sign into both at the same time. Browser profiles are not enough — DNS cache, clipboard, and network-level fingerprints leak across profiles.

Email and domain

Persona email is hosted somewhere that accepts crypto for payment. Domain registration is through a registrar that accepts crypto and permits WHOIS privacy everywhere your persona operates. Renewal calendar is on the persona machine, not your real one.

No voice, no video, no handwriting

Your voice is a biometric. Your writing cadence is a biometric. Your handwriting is obvious. The persona does not do voice calls with external parties. Ever. Written only. Video is similarly off the table; if you absolutely must appear, it is fully-masked or fully-avatared, and the avatar stays consistent.

Wallets and keys

Cold for everything that matters

Treasury, multisig signer, token cold storage — all hardware, all in air-gapped signing. The persona never types a seed phrase on an internet-connected machine. Seed phrases are split, stored geographically, and tested semi-annually.

Hot wallets are expendable

Every hot wallet is considered compromised by default. Rotation is automated. Balances are small. A compromise of any single hot wallet should cost us less than a week of router revenue, not a treasury.

Your address graph is a biometric

Chain analytics will cluster your hot wallets if they ever touch a CEX deposit you also use personally. Never. The persona’s fiat on-ramp, if it needs one, is through a separate KYC’d entity with a dedicated bank account. Most of the time you do not need one — income comes in as stables and stays in stables.

Code and commits

Git is the biggest leak

Every commit you make has a name, email, timestamp, and timezone. Your real name sneaks in through git config --global on a machine you once used for both identities. The fix is a persona-only git config on a persona-only machine, and a commit hook that hard-fails if the configured email is not the persona email.

# ~/.config/git/persona-check.sh
if [ "$(git config user.email)" != "yoshi@metercall.ai" ]; then
  echo "wrong git identity; aborting"
  exit 1
fi

Timezone

Commit timestamps leak timezone, which narrows you geographically. You can normalize to UTC, and you can also rewrite timestamps at merge time. The bigger signal is consistency of working hours. If you always commit 09:00–18:00 Eastern, you are in Eastern. Spread the work. The swarm setup helps here because agents commit at any hour.

Writing voice

Stylometry works. If you write public posts under both identities, a decent stylometry tool will link them. Either do not write under your real name at all, or write very differently. We run every public post through a style-shift pass so voice does not match casual writing.

Travel mode

Travel is the highest-risk vector. A customs inspection of your persona machine at a border is, in most jurisdictions, lawful. “Travel mode” for us means:

The three mistakes that always break anonymity

  1. Cross-contaminated billing. Paying for persona SaaS with a real credit card. Paying for real SaaS with persona crypto. Either way, the paper trail connects.
  2. Casual personal references in public channels. “My dog’s vet” or “my daughter’s recital” in a Discord message is enough context to narrow to a city and a life situation. Public writing is impersonal, always.
  3. Photo metadata. A product screenshot or a whiteboard photo includes EXIF, window chrome, and visible background detail. Every image published under the persona is stripped, cropped, and re-rendered.

Why we do it anyway

Anonymity is not about hiding. It is about refusing to let the product’s integrity depend on one person’s willingness to say yes to whoever asks. Anonymous founders cannot be flown to a conference and pressured into a deal. They cannot be docx’d out of their own repo by a lawyer. The product is the product, and the code is the code. That is the only trust surface we want.

You will slip. Everyone does, eventually. The checklist is not about perfection; it is about raising the cost of de-anonymization until it stops being worth anyone’s afternoon.

Related reading on our own setup

If you want to see how we structure it publicly: the honesty ledger lists what we do not disclose and why; the company page describes the pseudonymous governance; governance documents how decisions get made without named signatories.

The goal is not to be unaccountable. It is to be accountable to the code, the receipts, the chain, and nothing else.

MCP breach timeline — Authzed
CoinDesk agent-payments coverage