ouija onion resolver 作者: staccoverflow
Type any AllDomains name (mything.stacc, name.bonk, name.abc, name.sol, …) literally in the URL bar — resolves the on-chain owner, derives the matching Tor v3 .onion via identity collapse, and redirects. Built for Brave's native Tor + Tor Browser (Fi
扩展元数据
关于此扩展
Type a name like mything.stacc in the URL bar. The extension intercepts before DNS, looks up the on-chain owner via AllDomains on Solana, re-encodes their 32-byte Ed25519 public key as a Tor v3 .onion address, and redirects. One key, two encodings.
How it works
Every Solana wallet is, by construction, a Tor v3 .onion. The encoding for both is the same 32-byte Ed25519 public key — base58 for the wallet, base32 (with a 2-byte SHA3-256 checksum and a 1-byte version byte) for the .onion. AllDomains is the chain-native naming layer for Solana. Compose: a registered AllDomains name resolves to a wallet, that wallet IS already a .onion, the extension just publishes the mapping.
No oracle. No off-chain registry. No bridge service. The math is one-to-one and trustless — anyone can reproduce the derivation with sha3_256 + base32 in any language.
Where it works
• Tor Browser (Firefox 115+ ESR): the .onion redirect loads natively. No proxies.
• Brave's "Private window with Tor" (Chromium): same — Brave's built-in Tor handles the .onion.
• Regular Firefox / Brave / Chrome: optional tor2web fallback chain (onion.ws → onion.pet → onion.ly, configurable) loads .onion content over clearnet. Disable in Options to require a real Tor window. Tor2web defeats Tor anonymity by design — the gateway operator sees every request.
Setup
1. Install.
2. Open about:addons → ouija → toggle "Run in Private Windows: Allow". Without this, Firefox/Tor Browser silently disables the extension inside private/Tor windows.
3. Type any registered AllDomains name in the URL bar: mything.stacc, name.bonk, name.abc, name.sol, etc. The extension fetches the full set of registered TLDs from the on-chain TldHouse program on first run (~250 TLDs, cached 24 hours), so new TLDs work automatically.
The extension also accepts a bare base58 Solana address — it skips the AllDomains lookup and runs the identity-collapse math directly. Useful for verifying.
What it doesn't do
• It does NOT route your traffic through Tor. The extension only does name resolution + URL redirection. Tor traffic still requires Tor Browser or Brave's Tor window.
• It does NOT track you. Zero analytics. Zero telemetry. The bundled JavaScript contains no gtag, Sentry, Mixpanel, Amplitude, or similar.
• It does NOT inject content scripts on any page. The extension has no read/write access to web page content.
• It does NOT request <all_urls> host access. Permissions are scoped to Solana RPC endpoints, .onion (for redirect targets), and tor2web gateways (when fallback enabled).
• It does NOT sync browsing history. The only data in browser.storage.sync is your own settings (RPC URL, gateway list, toggles).
Verification vector
The standard BIP-39 test mnemonic "abandon × 11 + about" at SLIP-0010 path m/44'/501'/0'/0' must produce:
Solana wallet: HAgk14JpMQLgt6rVgv7cBQFJWFto5Dqxi472uT3DKpqk
.onion address: 6a3coysgu5nz3yzut3kcwfpcgl3fdd6cb5p42ty5mtub7g6sld35qlid.onion
Any implementation (this extension, your own code, Phantom wallet, the Solana CLI, Tor's own keygen) that produces a different result has a bug. Use this vector to validate.
Source code
https://github.com/staccDOTsol/ouija-solana-tor-identity-collapse/tree/main/ouija-onion-resolver
Privacy policy
https://github.com/staccDOTsol/ouija-solana-tor-identity-collapse/blob/main/ouija-onion-resolver/PRIVACY.md
Issues / support
https://github.com/staccDOTsol/ouija-solana-tor-identity-collapse/issues
How it works
Every Solana wallet is, by construction, a Tor v3 .onion. The encoding for both is the same 32-byte Ed25519 public key — base58 for the wallet, base32 (with a 2-byte SHA3-256 checksum and a 1-byte version byte) for the .onion. AllDomains is the chain-native naming layer for Solana. Compose: a registered AllDomains name resolves to a wallet, that wallet IS already a .onion, the extension just publishes the mapping.
No oracle. No off-chain registry. No bridge service. The math is one-to-one and trustless — anyone can reproduce the derivation with sha3_256 + base32 in any language.
Where it works
• Tor Browser (Firefox 115+ ESR): the .onion redirect loads natively. No proxies.
• Brave's "Private window with Tor" (Chromium): same — Brave's built-in Tor handles the .onion.
• Regular Firefox / Brave / Chrome: optional tor2web fallback chain (onion.ws → onion.pet → onion.ly, configurable) loads .onion content over clearnet. Disable in Options to require a real Tor window. Tor2web defeats Tor anonymity by design — the gateway operator sees every request.
Setup
1. Install.
2. Open about:addons → ouija → toggle "Run in Private Windows: Allow". Without this, Firefox/Tor Browser silently disables the extension inside private/Tor windows.
3. Type any registered AllDomains name in the URL bar: mything.stacc, name.bonk, name.abc, name.sol, etc. The extension fetches the full set of registered TLDs from the on-chain TldHouse program on first run (~250 TLDs, cached 24 hours), so new TLDs work automatically.
The extension also accepts a bare base58 Solana address — it skips the AllDomains lookup and runs the identity-collapse math directly. Useful for verifying.
What it doesn't do
• It does NOT route your traffic through Tor. The extension only does name resolution + URL redirection. Tor traffic still requires Tor Browser or Brave's Tor window.
• It does NOT track you. Zero analytics. Zero telemetry. The bundled JavaScript contains no gtag, Sentry, Mixpanel, Amplitude, or similar.
• It does NOT inject content scripts on any page. The extension has no read/write access to web page content.
• It does NOT request <all_urls> host access. Permissions are scoped to Solana RPC endpoints, .onion (for redirect targets), and tor2web gateways (when fallback enabled).
• It does NOT sync browsing history. The only data in browser.storage.sync is your own settings (RPC URL, gateway list, toggles).
Verification vector
The standard BIP-39 test mnemonic "abandon × 11 + about" at SLIP-0010 path m/44'/501'/0'/0' must produce:
Solana wallet: HAgk14JpMQLgt6rVgv7cBQFJWFto5Dqxi472uT3DKpqk
.onion address: 6a3coysgu5nz3yzut3kcwfpcgl3fdd6cb5p42ty5mtub7g6sld35qlid.onion
Any implementation (this extension, your own code, Phantom wallet, the Solana CLI, Tor's own keygen) that produces a different result has a bug. Use this vector to validate.
Source code
https://github.com/staccDOTsol/ouija-solana-tor-identity-collapse/tree/main/ouija-onion-resolver
Privacy policy
https://github.com/staccDOTsol/ouija-solana-tor-identity-collapse/blob/main/ouija-onion-resolver/PRIVACY.md
Issues / support
https://github.com/staccDOTsol/ouija-solana-tor-identity-collapse/issues
评分 0(1 位用户)
权限与数据
必要权限:
- 向您显示通知
- 获取浏览器标签页
- 获知浏览器导航时的行为状态
可选权限:
- 访问您在 solana.com 域名的数据
- 访问您在 helius-rpc.com 域名的数据
- 访问您在 triton.one 域名的数据
- 访问您在 rpcpool.com 域名的数据
- 访问您在 onion 域名的数据
- 访问您在 onion.ws 域名的数据
- 访问您在 onion.pet 域名的数据
- 访问您在 onion.ly 域名的数据
- 访问您在 api.mainnet-beta.solana.com 的数据
收集的数据:
- 开发者称此扩展无需收集数据。
更多信息
- 附加组件链接
- 版本
- 0.3.3
- 大小
- 676.46 KB
- 上次更新
- 4 天前 (2026年5月20日)
- 许可证
- MIT 许可证
- 隐私政策
- 阅读此附加组件的隐私政策
- 版本历史
- 添加到收藏集