Get the App
Secure Drop
Anonymous · Encrypted · No login required
Your message is sealed and anonymous. We cannot identify you. No account or login is needed.
Your message
Max 3 files, 10 MB each
Secure Channel
Anonymous · Bidirectional · Encrypted
Start an anonymous conversation. You'll receive a thread code to check for replies later.
Your message
Max 3 files, 10 MB each
Thread Code
Enter your thread code above to check for replies.
🎭 Disposable Hat

Temporary Identity.
Permanent Privacy.

Create throwaway anonymous identities that auto-expire. Communicate freely, then vanish without a trace. Premium unlocks custom durations, codes, and extended lifetimes.

Free vs Premium

Everyone gets Disposable Hats. Premium users unlock custom codes, extended durations up to 365 days, and advanced burn policies.

City of Hats Disposable Hat
Standard (Free)
City of Hats Disposable Hat Premium
Premium

Built to Disappear

Disposable Hats are engineered for impermanence. Every identity is isolated, encrypted, and destined for destruction.

⏱️

Auto-Expiring Identity

Every Disposable Hat has a countdown. When time runs out, the hat, its encryption keys, and all associated data are permanently destroyed.

TEMPORARY
🔐

Cryptographic Isolation

Each Disposable Hat gets its own encryption key pair. No link to your permanent identity exists on the server or in the protocol.

ENCRYPTED
🔥

Zero-Trace Burn

When a Disposable Hat expires, all message history, keys, pairing data, and metadata are permanently erased. No forensic recovery possible.

BURN
👑

Premium Flexibility

Unlock custom hat codes, durations from 24 hours to 365 days, advanced burn policies, and the ability to create multiple Disposable Hats simultaneously.

PREMIUM

How Disposable Hats Work

Four steps from creation to destruction. Your permanent identity is never exposed.

1

Create Disposable

Tap "Create Disposable" from the main menu. Choose duration (or customize with Premium). A new anonymous identity is generated instantly.

2

Share the Code

Share your temporary Hat code with anyone. They pair with you using this disposable identity — your real Hat stays hidden.

3

Communicate Freely

Send messages, files, and media through your Disposable Hat. All communications are end-to-end encrypted under the disposable key pair.

4

Auto-Destroy

When the timer expires, the hat burns. Messages, keys, pairings — everything is permanently destroyed. No trace remains.

🎭
Create
Generate new identity
💬
Communicate
Chat anonymously
Countdown
Timer ticking down
🔥
Burn
Permanently destroyed

Free vs Premium

Every user can create Disposable Hats. Premium unlocks the full power of temporary identities.

Free

Available to all users

  • 24-hour Disposable Hats
  • Random hat code assigned
  • End-to-end encrypted messages
  • Auto-burn on expiration
  • One active Disposable Hat at a time

👑 Premium

Full control over disposable identities

  • Custom duration: 24h to 365 days
  • Choose your own hat code
  • Multiple active Disposable Hats
  • Advanced burn policies (manual, auto-read, timed)
  • Priority pairing and delivery
  • All free features included

When to Use a Disposable Hat

Anytime you need a temporary identity that leaves no trace. Here are some common scenarios.

🤝

Meeting Strangers

Share a temporary identity with new contacts. If things don't work out, the hat expires and they can never reach you again.

🛒

Online Marketplaces

Communicate with buyers or sellers without exposing your permanent identity. Once the transaction is done, burn the hat.

📰

Source Protection

Journalists and sources can establish temporary channels that auto-destroy, leaving no forensic trail.

✈️

Travel & Events

Create short-lived identities for travel companions, conference contacts, or event organizers. No long-term commitments.

🏥

Sensitive Consultations

Legal, medical, or financial professionals can create temporary channels for sensitive client communications.

🔬

Security Research

Researchers can communicate findings through disposable channels that self-destruct after the engagement ends.

What We Enforce

Disposable Hats are built on strict isolation and destruction principles.

Enforced by Architecture

  • Unique encryption key pair per Disposable Hat
  • Cryptographic isolation from permanent identity
  • Automatic destruction on timer expiration
  • All message history erased on burn
  • No server-side link between disposable and permanent Hats
  • End-to-end encryption for all communications
  • Zero-knowledge server architecture

Never Allowed

  • No recovery of burned Disposable Hats
  • No extension after expiration
  • No linking disposable to permanent identity
  • No server-side message storage after burn
  • No third-party access to encryption keys
  • No metadata retention after destruction