{
  "site": "https://fuckyc.org",
  "generated": "2026-05-13T10:35:31.099Z",
  "count": 24,
  "license": "CC-BY-SA-4.0",
  "categories": [
    {
      "slug": "swap-instant-no-account",
      "name": "Instant swap (no account)",
      "short": "Instant crypto-to-crypto swappers that don't require an account.",
      "long": "Non-custodial-feeling instant exchangers that accept a deposit address and forward swapped funds. Most aggregate rates from CEX backends, so the no-KYC promise depends on each backend route. Watch for AML address-screening that freezes outputs after the fact.",
      "url": "https://fuckyc.org/categories/swap-instant-no-account/",
      "service_count": 15
    },
    {
      "slug": "exchange-p2p",
      "name": "P2P exchanges",
      "short": "Peer-to-peer marketplaces where buyer and seller settle directly.",
      "long": "Order-book or escrow systems where you trade with an individual counterparty instead of an exchange. KYC is up to the peer; payment methods are wide (cash, SEPA, gift cards). Trade safety depends on the escrow design.",
      "url": "https://fuckyc.org/categories/exchange-p2p/",
      "service_count": 10
    },
    {
      "slug": "exchange-cex-no-kyc",
      "name": "CEX (no/threshold KYC)",
      "short": "Centralized exchanges with no, optional, or threshold-only ID checks.",
      "long": "Centralized order-book exchanges that historically allowed signup and withdrawals up to a daily threshold without identity verification. This bucket is volatile — limits and policies change without notice and may not apply in your jurisdiction.",
      "url": "https://fuckyc.org/categories/exchange-cex-no-kyc/",
      "service_count": 10
    },
    {
      "slug": "dex",
      "name": "DEX & atomic swaps",
      "short": "Smart-contract and cross-chain decentralized exchanges.",
      "long": "On-chain trading venues. No accounts, but they leak on-chain history; combining them with privacy coins or coinjoin is what produces the privacy. Cross-chain venues like atomic-swap protocols avoid bridge custody.",
      "url": "https://fuckyc.org/categories/dex/",
      "service_count": 13
    },
    {
      "slug": "wallet-privacy",
      "name": "Privacy wallets",
      "short": "Wallets built for non-correlation, coin control, or privacy-coin support.",
      "long": "Self-custody wallets oriented toward privacy: Monero/Zcash support, coinjoin clients, Tor by default, no account creation, no telemetry.",
      "url": "https://fuckyc.org/categories/wallet-privacy/",
      "service_count": 17
    },
    {
      "slug": "coin-privacy",
      "name": "Privacy coins",
      "short": "Cryptocurrencies with on-chain privacy guarantees.",
      "long": "Protocols whose ledgers obscure sender, receiver, amount, or all three. Each has different threat-model trade-offs and very different liquidity profiles on the swap market.",
      "url": "https://fuckyc.org/categories/coin-privacy/",
      "service_count": 5
    },
    {
      "slug": "vpn",
      "name": "VPN providers",
      "short": "VPNs that accept anonymous payment and don't require an identity.",
      "long": "Commercial VPNs whose signup and payment paths can be completed without real-name disclosure. Cash-by-post is the strongest signal here, crypto is second-best.",
      "url": "https://fuckyc.org/categories/vpn/",
      "service_count": 9
    },
    {
      "slug": "hosting-anon",
      "name": "Anonymous hosting",
      "short": "VPS, dedicated, and shared hosting with no ID required.",
      "long": "Hosts whose signup, payment, and abuse-handling don't require government ID. Jurisdiction and physical hardware location matter a lot more than the marketing 'offshore' label.",
      "url": "https://fuckyc.org/categories/hosting-anon/",
      "service_count": 13
    },
    {
      "slug": "domains-anon",
      "name": "Anonymous domain registrars",
      "short": "Registrars who put their own contact in WHOIS and accept anonymous payment.",
      "long": "ICANN's accuracy-of-WHOIS rules mean the safest model is a registrar that registers the domain in its own name and licenses it back to you. A small set of registrars are explicit about doing this.",
      "url": "https://fuckyc.org/categories/domains-anon/",
      "service_count": 3
    },
    {
      "slug": "email-privacy",
      "name": "Privacy email",
      "short": "Email providers that minimize signup data and respect mail privacy.",
      "long": "Providers whose signup does not require phone, recovery email, or government ID, and whose terms of service and operator history support resistance to compelled disclosure.",
      "url": "https://fuckyc.org/categories/email-privacy/",
      "service_count": 11
    },
    {
      "slug": "sim-esim",
      "name": "Anonymous SIM / eSIM",
      "short": "Mobile data or phone-number services with no real-name SIM activation.",
      "long": "Mobile data eSIMs and number-leasing services that accept crypto and don't tie a SIM to a real-name owner. Most are roaming-only data; voice/SMS support varies.",
      "url": "https://fuckyc.org/categories/sim-esim/",
      "service_count": 5
    },
    {
      "slug": "messaging",
      "name": "Messaging",
      "short": "Encrypted messengers with minimal identity binding.",
      "long": "End-to-end encrypted messengers, evaluated by what identity they require to register (phone, email, none) and what metadata the server retains.",
      "url": "https://fuckyc.org/categories/messaging/",
      "service_count": 12
    },
    {
      "slug": "search",
      "name": "Search engines",
      "short": "Search engines that don't profile or track signed-out users.",
      "long": "Privacy-respecting search — independent indexes, proxied front-ends, or paid-for ad-free search. None is a perfect substitute for the others.",
      "url": "https://fuckyc.org/categories/search/",
      "service_count": 9
    },
    {
      "slug": "dns",
      "name": "DNS resolvers",
      "short": "Recursive DNS resolvers with privacy or filtering features.",
      "long": "Public DNS-over-HTTPS / DNS-over-TLS resolvers, evaluated by logging policy, jurisdiction, filtering options, and ECS handling.",
      "url": "https://fuckyc.org/categories/dns/",
      "service_count": 5
    },
    {
      "slug": "storage",
      "name": "Encrypted storage",
      "short": "Cloud storage with end-to-end or zero-knowledge encryption.",
      "long": "File storage services where the operator cannot read your data and where signup data is minimal.",
      "url": "https://fuckyc.org/categories/storage/",
      "service_count": 9
    },
    {
      "slug": "card-crypto",
      "name": "Crypto debit cards",
      "short": "Crypto-funded debit cards. A graveyard category — be skeptical.",
      "long": "Cards that draw against a crypto balance. The no-KYC end of this category dies regularly: issuers and BIN sponsors get pressured into KYC, programs shut down, balances strand. List entries here come with explicit volatility caveats.",
      "url": "https://fuckyc.org/categories/card-crypto/",
      "service_count": 0
    },
    {
      "slug": "mixer-coinjoin",
      "name": "Mixers & coinjoin",
      "short": "Bitcoin coinjoin coordinators and Monero churning notes.",
      "long": "Tools that break the deterministic on-chain link between an input and an output. Bitcoin coinjoin (Wasabi-style, JoinMarket) is collaborative; Monero churning is a self-spend pattern, not a service.",
      "url": "https://fuckyc.org/categories/mixer-coinjoin/",
      "service_count": 4
    },
    {
      "slug": "browser",
      "name": "Privacy browsers",
      "short": "Browsers oriented toward anti-fingerprinting and tracker resistance.",
      "long": "Browsers whose default configuration resists tracking, fingerprinting, or both. Tor Browser is the only one designed against a network adversary.",
      "url": "https://fuckyc.org/categories/browser/",
      "service_count": 4
    },
    {
      "slug": "marketplace-gift-card",
      "name": "Crypto-for-gift-card marketplaces",
      "short": "Spend crypto on retail and travel gift cards.",
      "long": "Services that sell merchant gift cards (Amazon, supermarkets, Steam, airlines) in exchange for crypto. The privacy claim is in the signup path; the gift card itself is normal retail.",
      "url": "https://fuckyc.org/categories/marketplace-gift-card/",
      "service_count": 6
    },
    {
      "slug": "network",
      "name": "Anonymity networks",
      "short": "Network-layer anonymity protocols beyond commercial VPNs.",
      "long": "Network protocols designed to hide who you are from your ISP, the destination service, and the network operators in between. Tor is the reference. I2P and Lokinet are independent designs with different threat models; Yggdrasil is a mesh-friendly overlay. The trade-off versus a commercial VPN is operator-free routing at the cost of higher latency and a smaller anonymity set on lesser-used networks.",
      "url": "https://fuckyc.org/categories/network/",
      "service_count": 2
    },
    {
      "slug": "password-manager",
      "name": "Password managers",
      "short": "Self-hostable or local-first password vaults.",
      "long": "Tools that store and generate credentials with end-to-end encryption. Picked on whether the vault stays local (KeePassXC), is self-hostable (Vaultwarden), or runs as a managed service with E2E (Bitwarden). All let you use unique passwords per service, which is the single highest-leverage privacy practice for online accounts.",
      "url": "https://fuckyc.org/categories/password-manager/",
      "service_count": 2
    },
    {
      "slug": "encryption-tools",
      "name": "Encryption tools",
      "short": "Disk encryption, file encryption, and PGP for users.",
      "long": "Tools that encrypt data at rest or in transit under user-controlled keys. VeraCrypt for full-disk and volume encryption. GnuPG for file and mail encryption. age for modern file encryption. The common property: the operator does not hold your keys; you do.",
      "url": "https://fuckyc.org/categories/encryption-tools/",
      "service_count": 2
    },
    {
      "slug": "proxy",
      "name": "Proxies & residential IPs",
      "short": "Residential, mobile, and ISP proxies usable without account verification.",
      "long": "Proxy providers — residential IP pools, mobile-carrier (4G/5G) endpoints, datacenter routes — whose signup and billing accept crypto and do not require identity. Used as front-ends for scraping, AI request routing, geo-restricted access, and account-creation work where a clean client IP matters. Providers differ by geography (US city-level targeting, EU residential, Iranian 4G) and by use case (AI inference routing vs. account warm-up).",
      "url": "https://fuckyc.org/categories/proxy/",
      "service_count": 3
    },
    {
      "slug": "software-licenses",
      "name": "Software licences (crypto-paid)",
      "short": "Resellers of OS and software licence keys with crypto payment and no identity.",
      "long": "Marketplaces and resellers that sell Windows, Office, Adobe, antivirus and other software licence keys against crypto or card payment without account or identity verification. Licences are usually OEM, retail, or volume keys sourced from grey-market channels; legality of the key varies by SKU and jurisdiction. The privacy property sits in the checkout: no account binding and no fiat trail when paying with crypto.",
      "url": "https://fuckyc.org/categories/software-licenses/",
      "service_count": 1
    }
  ]
}