ouija onion resolver by staccoverflow
Type any AllDomains name (mything.stacc, name.bonk, name.abc, name.sol, …) literally in the URL bar — resolves the on-chain owner, derives the matching Tor v3 .onion via identity collapse, and redirects. Built for Brave's native Tor + Tor Browser (Fi
Extension Metadata
About this extension
Type a name like mything.stacc in the URL bar. The extension intercepts before DNS, looks up the on-chain owner via AllDomains on Solana, re-encodes their 32-byte Ed25519 public key as a Tor v3 .onion address, and redirects. One key, two encodings.
How it works
Every Solana wallet is, by construction, a Tor v3 .onion. The encoding for both is the same 32-byte Ed25519 public key — base58 for the wallet, base32 (with a 2-byte SHA3-256 checksum and a 1-byte version byte) for the .onion. AllDomains is the chain-native naming layer for Solana. Compose: a registered AllDomains name resolves to a wallet, that wallet IS already a .onion, the extension just publishes the mapping.
No oracle. No off-chain registry. No bridge service. The math is one-to-one and trustless — anyone can reproduce the derivation with sha3_256 + base32 in any language.
Where it works
• Tor Browser (Firefox 115+ ESR): the .onion redirect loads natively. No proxies.
• Brave's "Private window with Tor" (Chromium): same — Brave's built-in Tor handles the .onion.
• Regular Firefox / Brave / Chrome: optional tor2web fallback chain (onion.ws → onion.pet → onion.ly, configurable) loads .onion content over clearnet. Disable in Options to require a real Tor window. Tor2web defeats Tor anonymity by design — the gateway operator sees every request.
Setup
1. Install.
2. Open about:addons → ouija → toggle "Run in Private Windows: Allow". Without this, Firefox/Tor Browser silently disables the extension inside private/Tor windows.
3. Type any registered AllDomains name in the URL bar: mything.stacc, name.bonk, name.abc, name.sol, etc. The extension fetches the full set of registered TLDs from the on-chain TldHouse program on first run (~250 TLDs, cached 24 hours), so new TLDs work automatically.
The extension also accepts a bare base58 Solana address — it skips the AllDomains lookup and runs the identity-collapse math directly. Useful for verifying.
What it doesn't do
• It does NOT route your traffic through Tor. The extension only does name resolution + URL redirection. Tor traffic still requires Tor Browser or Brave's Tor window.
• It does NOT track you. Zero analytics. Zero telemetry. The bundled JavaScript contains no gtag, Sentry, Mixpanel, Amplitude, or similar.
• It does NOT inject content scripts on any page. The extension has no read/write access to web page content.
• It does NOT request <all_urls> host access. Permissions are scoped to Solana RPC endpoints, .onion (for redirect targets), and tor2web gateways (when fallback enabled).
• It does NOT sync browsing history. The only data in browser.storage.sync is your own settings (RPC URL, gateway list, toggles).
Verification vector
The standard BIP-39 test mnemonic "abandon × 11 + about" at SLIP-0010 path m/44'/501'/0'/0' must produce:
Solana wallet: HAgk14JpMQLgt6rVgv7cBQFJWFto5Dqxi472uT3DKpqk
.onion address: 6a3coysgu5nz3yzut3kcwfpcgl3fdd6cb5p42ty5mtub7g6sld35qlid.onion
Any implementation (this extension, your own code, Phantom wallet, the Solana CLI, Tor's own keygen) that produces a different result has a bug. Use this vector to validate.
Source code
https://github.com/staccDOTsol/ouija-solana-tor-identity-collapse/tree/main/ouija-onion-resolver
Privacy policy
https://github.com/staccDOTsol/ouija-solana-tor-identity-collapse/blob/main/ouija-onion-resolver/PRIVACY.md
Issues / support
https://github.com/staccDOTsol/ouija-solana-tor-identity-collapse/issues
How it works
Every Solana wallet is, by construction, a Tor v3 .onion. The encoding for both is the same 32-byte Ed25519 public key — base58 for the wallet, base32 (with a 2-byte SHA3-256 checksum and a 1-byte version byte) for the .onion. AllDomains is the chain-native naming layer for Solana. Compose: a registered AllDomains name resolves to a wallet, that wallet IS already a .onion, the extension just publishes the mapping.
No oracle. No off-chain registry. No bridge service. The math is one-to-one and trustless — anyone can reproduce the derivation with sha3_256 + base32 in any language.
Where it works
• Tor Browser (Firefox 115+ ESR): the .onion redirect loads natively. No proxies.
• Brave's "Private window with Tor" (Chromium): same — Brave's built-in Tor handles the .onion.
• Regular Firefox / Brave / Chrome: optional tor2web fallback chain (onion.ws → onion.pet → onion.ly, configurable) loads .onion content over clearnet. Disable in Options to require a real Tor window. Tor2web defeats Tor anonymity by design — the gateway operator sees every request.
Setup
1. Install.
2. Open about:addons → ouija → toggle "Run in Private Windows: Allow". Without this, Firefox/Tor Browser silently disables the extension inside private/Tor windows.
3. Type any registered AllDomains name in the URL bar: mything.stacc, name.bonk, name.abc, name.sol, etc. The extension fetches the full set of registered TLDs from the on-chain TldHouse program on first run (~250 TLDs, cached 24 hours), so new TLDs work automatically.
The extension also accepts a bare base58 Solana address — it skips the AllDomains lookup and runs the identity-collapse math directly. Useful for verifying.
What it doesn't do
• It does NOT route your traffic through Tor. The extension only does name resolution + URL redirection. Tor traffic still requires Tor Browser or Brave's Tor window.
• It does NOT track you. Zero analytics. Zero telemetry. The bundled JavaScript contains no gtag, Sentry, Mixpanel, Amplitude, or similar.
• It does NOT inject content scripts on any page. The extension has no read/write access to web page content.
• It does NOT request <all_urls> host access. Permissions are scoped to Solana RPC endpoints, .onion (for redirect targets), and tor2web gateways (when fallback enabled).
• It does NOT sync browsing history. The only data in browser.storage.sync is your own settings (RPC URL, gateway list, toggles).
Verification vector
The standard BIP-39 test mnemonic "abandon × 11 + about" at SLIP-0010 path m/44'/501'/0'/0' must produce:
Solana wallet: HAgk14JpMQLgt6rVgv7cBQFJWFto5Dqxi472uT3DKpqk
.onion address: 6a3coysgu5nz3yzut3kcwfpcgl3fdd6cb5p42ty5mtub7g6sld35qlid.onion
Any implementation (this extension, your own code, Phantom wallet, the Solana CLI, Tor's own keygen) that produces a different result has a bug. Use this vector to validate.
Source code
https://github.com/staccDOTsol/ouija-solana-tor-identity-collapse/tree/main/ouija-onion-resolver
Privacy policy
https://github.com/staccDOTsol/ouija-solana-tor-identity-collapse/blob/main/ouija-onion-resolver/PRIVACY.md
Issues / support
https://github.com/staccDOTsol/ouija-solana-tor-identity-collapse/issues
Rated 0 by 0 reviewers
Permissions and data
Required permissions:
- Display notifications to you
- Access browser tabs
- Access browser activity during navigation
Optional permissions:
- Access your data for sites in the solana.com domain
- Access your data for sites in the helius-rpc.com domain
- Access your data for sites in the triton.one domain
- Access your data for sites in the rpcpool.com domain
- Access your data for sites in the onion domain
- Access your data for sites in the onion.ws domain
- Access your data for sites in the onion.pet domain
- Access your data for sites in the onion.ly domain
- Access your data for api.mainnet-beta.solana.com
Data collection:
- The developer says this extension doesn't require data collection.
More information
- Add-on Links
- Version
- 0.3.3
- Size
- 676.46 KB
- Last updated
- 4 days ago (May 20, 2026)
- Related Categories
- License
- MIT License
- Privacy Policy
- Read the privacy policy for this add-on
- Version History
- Add to collection