The first anonymous secrets site most people remember was PostSecret, the project where strangers mailed handwritten secrets on postcards and Frank Warren photographed and posted them. It started in 2004. It's still going. Twenty years later there are dozens of digital equivalents — most of them worse than the original postcard project at the one thing that mattered: actually being anonymous.
If you're thinking about putting a secret somewhere, this is a short, honest guide to what to look for and what to avoid.
What 'safe' means here
Safety has two pieces:
- You can't be identified from what you post. No one can trace the secret back to you using IP, account, fingerprint, or content metadata.
- The platform won't betray that later. It doesn't quietly start collecting identifying data, get acquired by an ad company, or hand over server logs without resistance.
Most sites get the first part roughly right and the second part wrong. The pattern is: launch as 'anonymous', collect data quietly in the background, eventually monetize that data.
What to look for in a platform
- No accounts. If it requires sign-up — even with a throwaway email — you're already not anonymous in the sense that matters.
- No fingerprinting. Open the page with browser dev tools and look at the network tab. If you see calls to fingerprinting services (FingerprintJS, browser-fingerprint, third-party analytics), assume your secret is tagged.
- Hashed or discarded IPs. A reasonable platform hashes IPs with a salt server-side, so the raw IP isn't stored in queryable form. The better ones discard the raw IP entirely after a short moderation window.
- No precise location. A confession that shows your exact city is not anonymous from the people who already know you. State or country only is the right granularity.
- Open about moderation. A platform that tells you what gets removed and why, with a stable policy, is more trustworthy than one that's vague.
- Owner doesn't run ads. Ad networks are the primary economic pressure to collect identifying data. A site that doesn't take ad money has less reason to know who you are.
Red flags
- Sign-up walls 'just for safety'.
- Connecting via Google / Facebook / Apple — these tie the post to a verified identity even if the username is fake.
- Aggressive permission requests (microphone, location, contacts) on first load.
- Vague privacy policy with no IP retention information.
- Recently sold to a larger company that hasn't published a fresh policy.
How to share without leaving a trail
Even on a well-designed platform, what *you* do matters as much as what the platform does:
- Don't include identifying details — full names, specific addresses, exact dates that only a few people would know.
- Don't post from the same network you use for everything else if the secret is extraordinarily sensitive. Mobile data instead of home Wi-Fi is a meaningful difference.
- Don't screenshot your post and share it to a place that has your real identity. That's the most common way people accidentally de-anonymize themselves.
- Don't tell anyone you posted it. This is the second most common way.
The platform can be perfect and you can still out yourself in the way you talk about the secret afterward. The discipline matters more than the technology.
Why we built saynothing.io this way
We built saynothing.io under these constraints because most of the alternatives didn't meet them. No accounts. No usernames. Salted IP hashes that the admin UI can't trivially reverse. Coarse public locations only. No ads. No tracking pixels. The public feed shows what people said and where they roughly were and nothing else.