Operational privacy, delivered

Private phones. Zero exposure. Total control.

Burner Man Co. acquires, prepares, and optimizes smartphones so your communications stay unlinked to your identity — legally, cleanly, and permanently.

No credit or debit trail No account reuse No retained records
Order by phone: (732) 633‑0200
Order by email: burnerman01@protonmail.com
What Burner Man Co. does

A complete, end‑to‑end privacy service

From acquisition to recycling, every step is designed to keep your communications detached from your identity.

Personal acquisition

Your phone is purchased in person by Burner Man using his own payment methods — no credit or debit trail, no store surveillance linking you to the device.

Privacy‑optimized setup

Tracking, bloatware, and unnecessary services are removed. VoIP tools are installed and the system is tuned for fast, private communication.

Temporary accounts & global data

Accounts are created solely for your temporary use and never reused. Your phone arrives ready with worldwide mobile data and Wi‑Fi capability.

Guaranteed recycling

Each phone ships with a prepaid return path. When you’re done, send it back for proper recycling and compliant disposal — no loose ends.

A privacy system engineered for zero attribution.

Burner Man Co. is not an app, a platform, or a cloud service. It’s a physical workflow designed so that no one — including Burner Man — can meaningfully link you to the device you use.

“Burner Man only exercises his First Amendment right in the form of silence.”

  • No credit or debit card trail tied to your identity.
  • No store surveillance footage linking you to the purchase.
  • No reused accounts, usernames, or phone numbers.
  • No logs, no CRM, no database, no analytics profile.
  • No association with your home Wi‑Fi or existing devices.
  • No memory of your interactions — digitally or physically.
Why this exists

Why we need Burner Man Co.

Modern networks, platforms, and devices are built to observe, record, and correlate. Burner Man Co. exists to give you a way to speak and research without that weight.

  • Internet traffic is routinely observable and recordable by providers and entities that buy or access that data, including metadata about the tools you use to connect, use on it, and that attempt to obscure as much. See https://www.comparitech.com/blog/vpn-privacy/stop-isp-tracking-browsing-history/ ; https://harvardlawreview.org/print/vol-126/the-dangers-of-surveillance/ ; and https://today.duke.edu/2025/01/yes-youre-being-watched-internet ... just to name a few.
  • Even persons accessing the internet via VPNs, while useful, still depend on infrastructure, logs, and operators that are predominantly compromised in some fashion in addition to being coercible and/or misconfigurable; and all are not only subject to their repective applicable law enforcers (which is an ever-growing list), but also their their respective human and/or machine errors. See https://www.theverge.com/2021/12/1/22812761/ubiquiti-data-breach-aws-doj-indictment-inside-job ; https://www.welivesecurity.com/2021/06/30/global-police-vpn-service-cybercriminals/ ; and https://cyberwaters.com/can-police-track-vpn-users-and-activity/ ...
  • “Private” messaging and calling platforms can be accessed under various legal and technical regimes; encryption alone does not guarantee practical or actual anonymity of any kind. See https://www.pcmag.com/news/fbi-document-shows-how-popular-secure-messaging-apps-stack-uphttps://www.pcmag.com/news /fbi-document-shows-how-popular-secure-messaging-apps-stack-up ; https://www.lawfareblog.com/law-enforcement-accessing-locked-devices-quite-well-thank-you ; https://www.nytimes.com/2020/10/21/technology/iphone-encryption-police.html ; and https://olhardigital.com.br/en/2020/12/15/noticias/empresa-israelense-descobre-metodo-para-acessar-conversas-do-signal/ ...
  • SIM swaps, public libraries, anonymizing browsers, overlay networks--even TORR-- all have their own identifiers and weaknesses that can be correlated back to you. See https://www.inthelibrarywiththeleadpipe.org/2019/ice-surveillance/ ; https://www.maketecheasier.com/imei-number/?amp ; https://thehackernews.com/2021/11/researchers-demonstrate-new.html ; and https://gizmodo.com/someone-is-running-hundreds-of-malicious-servers-on-the-1848156630 ...
  • Even end‑to‑end encrypted services can be targeted, infiltrated, or worked around at the device, network, or legal layer. See https://olhardigital.com.br/en/2020/12/15/noticias/empresa-israelense-descobre-metodo-para-acessar-conversas-do-signal/ ; and https://www.foxbusiness.com/technology/fbi-tool-access-private-signal-messages-locked-iphones ...
  • Even if you use encryption keys to secure any of your data, if you’re not savvy enough and/or possess the resources to manifest and utilize them ENTIRELY on your own (meaning using any service for any part of its process), third parties can and will access your data). See https://search.app/rwwXB ...
  • Institutions increasingly seek visibility into communications and behavior, almost always in ways that erode the practical lawful right to private speech and anonymous inquiry. See https://www.androidpolice.com/qualcomm-has-a-solution-for-stingray-devices-hijacking-your-cell-connection-and-apps-will-be-able-to-use-it-too/ ; https://www.bleepingcomputer.com/news/security/fbi-and-afp-created-a-fake-encrypted-chat-platform-to-catch-criminals/ ; https://www.computerweekly.com/news/252497791/Arrest-warrants-for-Candians-behind-Sky-ECC-cryptophone-networks-used-by-organised-crime ; and https://apnews.com/article/ef3c658b08314817a77f7f0e9c2fb490 ...
  • Credit and risk scoring are drifting toward incorporating an individual's digital behavior, which risks tying your curiosity and your communications to your financial and material life. See https://finance.yahoo.com/news/credit-score-based-history-183000645.html ; https://www.extremetech.com/internet/326088-should-your-web-history-impact-your-credit-score-the-imf-thinks-so ; and https://www.marketwatch.com/story/your-digital-footprint-could-provide-a-more-accurate-credit-score-2018-05-03 ...
  • Without a way to think, search, and collaborate privately, creativity and innovation are chilled long before any law is broken. See https://hbr.org/2014/03/why-china-cant-innovate ; and The Surveillance Nexus: Digital Culture and the Society of Control, at pgs 10-11, pp 5, by Simon Schleusener, et al...
  • The ever-growing list of entities with access to each individual's communications and research is not slowing. See https://www.forbes.com/sites/zakdoffman/2025/05/26/fbi-wants-access-to-encrypted-iphone-and-android-data-so-does-europe/
  • ***(Burner Man Co. in no way intends for his service to be used by malicious/criminal actors, and deploys every means at its disposal to prevent as much (the very use of his service is agreement not to engage in such activities with devices procured through its service. Burner Man Co. is solely concerned with promoting completely-free thought and the means to sate that free thought's curiosities without hindrance. Science shows us that such hindrances are the antitheses to inovation and positive progressions that benefit the entire world.) ***
How it works

From order to recycle in six steps

The process is simple, but the design behind it is deliberate. Each step removes a link in the chain.

Step 1

Place your order

Order online via Square, by phone, or by email. You choose the channel that fits your risk profile.

Step 2

Device acquisition

Burner Man personally pre‑purchases a smartphone for you from point‑of‑sale distributors using his own payment methods — not yours.

Step 3

Privacy optimization

The device is stripped of bloatware and non‑communication software, configured for VoIP, and charged. No personal accounts are linked.

Step 4

Service & setup

Temporary accounts are created solely for your use, mobile data is applied, and all credentials are provided to you on a separate paper — never copied or retained.

Step 5

Use anywhere

Connect over Wi‑Fi or use the included global data. The phone exists for your speech, not your identity, for as long as you choose to keep it.

Step 6

Return & recycle

When you’re done, place the phone in the provided return path. It’s recycled in compliance with applicable laws — not resold, not repurposed.

Payment & ordering

Choose how you want to transact

Burner Man Co. supports both conventional and privacy‑preserving payment methods. You decide what fits your threat model.

Primary checkout

Credit / debit via Square

Use a standard card through Square’s secure checkout. Burner Man Co. does not see or store your card details.

Buy a Private Phone
Phone orders: (732) 633‑0200
Mail orders: Available on request via email if you prefer a paper trail you control.
Monero (XMR)

For users who require a fully privacy‑preserving payment rail, Burner Man Co. accepts Monero. Include your shipping details in an agreed secure channel.

Monero payment QR code
Monero address
895CuUoYogEUmBEyCeSUdiYbgbenJhSB7KryW6jfSqaP1ZFkxwzU55ag7k6ZWWJruDXsDN8GGe56wCDcJ2sCd9hF4YTFLPT

Monero offers low‑fee, privacy‑focused payments. Combined with Burner Man’s phone anonymizing process, it adds another layer of protection to your communications.

Recycling

How Burner Man’s recycling policy works

Phones are meant to be temporary tools, not permanent liabilities. The recycling policy closes the loop for both privacy and the environment.

  1. Every still‑functioning Burner Man phone is recyclable directly with Burner Man Co. Email your client number and a request to recycle, and you’ll receive a prepaid label for a small return package.
  2. If the returned phone is in good working condition, the email address you provide can receive a discount on a future purchase. The only record kept is the email and its corresponding discount, and only until it is redeemed.
  3. Working phones are reset, wiped with current software, and returned to the anonymizing pool so that no previous user’s data is accessible.
  4. Non‑functioning phones, or phones not originally purchased from Burner Man Co., can still be recycled on your behalf in accordance with applicable laws. Intact devices may still qualify you for a smaller discount.
Usage

Private‑communication usage recommendations

To keep your communications as private as the system is designed to allow, Burner Man Co. recommends treating each phone as a temporary, compartmentalized tool.

  1. Do not contact people who know you by voice or who are contacts on any device or account that can be associated with you. If you must, ensure they are also using a phone obtained through Burner Man Co.
  2. Do not use the phone at locations or over Wi‑Fi that can be directly or indirectly associated with you.
  3. Do not download content or sign into services that can be tied back to your identity now or later.
  4. Do not retain any particular phone for more than one month; two weeks is better. Even if the included data is exhausted, avoid using the same device indefinitely over Wi‑Fi. Return it and, if needed, obtain another.

Failing to follow these recommendations does not automatically make your communications non‑private, but it weakens the guarantees. Burner Man Co. provides a strong anonymizing layer, but all digital communications are recordable; the only way for them to remain truly private is for them not to be associable with you at all.

FAQ

Common questions, clear answers

If you’re thinking carefully about operational privacy, you should be. These are the questions Burner Man Co. expects.

Who is Burner Man?

Burner Man is your personal shopper and privacy engineer for smartphones. He pre‑purchases a device on your behalf, optimizes it for private communications, sets up temporary accounts and service, fully charges it, and ensures it can be recycled — all while retaining no personal information beyond transaction amounts and anonymous client numbers.

What does Burner Man actually do, and why?

Burner Man Co. exists to stand between you and the records that would normally tie a phone to your identity. By handling acquisition, optimization, account setup, service application, and recycling, Burner Man removes the usual financial, surveillance, and account‑based links that make phones traceable. The goal is to restore a practical right to private communications and anonymous research.

Is this legal?

Yes. Burner Man Co. purchases and configures devices; you use them. There is nothing inherently illegal about acquiring or using a phone that is not tied to your identity. How you use it is your responsibility, and the service is not intended for malicious or criminal activity.

Why can't I just buy my own "burner phone"? at a store or conventional online retailer-- like Amazon or Walmart or Target or eBay?

Technically, yes, you could...if you want a third-party entity to be able to trace its purchase and everything you do on it back to yourself. When you go to ANY retailer of any kind, brick-and-morter or online, laws and regulations REQUIRE the retailer to maintain a record of that sale, whether they be the paper receipt and payment information accompanied by video surveillances, or, the digital footprint you left on their site (I.P. address, meta data, etc.) along with your payment information and its digital footprint. Burner Man is a patent-pending SERVICE that breaks that chain, dissolving those laws and regulations, whilst remaining completely within the confines of the law itself.

Do you store any of my information?

Burner Man Co. does not maintain a CRM, analytics profile, or customer database. Only the monetary amount of a transaction is logged for tax compliance. Shipping information and other order details are deleted and purged once they are no longer operationally necessary.

What kind of phones do you use?

Modern, reliable smartphones capable of running VoIP applications and global data. Exact models may vary based on availability, and some devices may show cosmetic wear, but all are tested and configured for privacy‑focused use and proper recycling at end of life.

How long does delivery take?

Typical turnaround is 1–3 business days depending on inventory and shipping distance. If timing is critical, mention it when you order and Burner Man Co. will confirm what is feasible.

Can I reuse the phone for multiple operations?

You can, but the design philosophy assumes each phone is temporary. The faster you use a particular phone and recycle it, the more private your communications remain. Returning devices for recycling reduces your risk surface and closes the loop.

What if I lose the phone?

Operationally, that is preferable to losing a phone tied to your identity. There is no account or profile for Burner Man Co. to reset; the device simply ceases to be part of your workflow. The design assumes devices may be lost or destroyed without compromising your identity.

How does the client number system work?

Each order is assigned a random client number. That number is used to coordinate logistics and recycling, not to build a profile. No personal information is attached to it beyond what is strictly necessary to complete the transaction and shipping, and that information is purged once it is no longer needed.

What service plans are available?

Phones are typically provisioned with 30 days of U.S. service with unlimited calls and texts and a data allotment, or 30 days of U.S. plus international service to many countries with a different data allotment. If you need more time or data, you can email for current options and pricing.

Do you offer automatic renewals?

The system is designed to support recurring use with new devices at intervals such as 1, 2, or 4 weeks. This keeps each phone’s lifespan short and its attribution risk low. Contact Burner Man Co. to discuss renewal intervals that match your operational needs.

Contact

Reach Burner Man Co.

Use the channel that makes the most sense for you. Expect concise, operationally focused communication.

Phone: (732) 633‑0200
Primary checkout: Square Buy Now link
Monero: See payment section above for address and QR code.
Recycling & compliance
Each device can be returned for recycling in accordance with applicable laws. This reduces environmental impact and ensures devices are not resold or repurposed in ways that could reintroduce attribution risk.
Burner Man Co. does not operate as a carrier, MVNO, or app provider. It is a physical service focused on acquisition, preparation, and disposal of devices for private communications.