I.AcquireService

Stealth Acquisition

Confidential, privacy first acquisitions for sensitive situations.

When the identity of the buyer must remain private, a standard acquisition will not do. Some negotiations would unravel the moment the seller realises who is on the other side. Others would attract competitors, journalists, or speculators in ways that destroy strategic value. A few would simply violate the discretion that serious investors and acquirers expect from their advisors.

Stealth acquisition is built for these situations. We act as the formal counterparty, with you as undisclosed beneficial owner. Outreach happens under our advisory identity. Negotiations are conducted by our team. Transfer and registration can be structured so that even WHOIS records do not reveal the ultimate buyer. The protection is real, the legal basis is sound, and the practice is well established in domain, real estate, and corporate transactions.

When and how to disclose, if ever, is your decision. Some clients prefer to take public ownership at a chosen moment, often coinciding with a launch or announcement. Others retain the trustee structure indefinitely. Either path is straightforward, and the structure is designed to preserve full optionality.

What it is

i.

A fully anonymised acquisition process where the buyer is never disclosed without explicit instruction.

ii.

Trustee structures, intermediary entities, and privacy compliant negotiation channels.

iii.

Communication, contracting, and transfer all handled under our advisory identity.

iv.

Optional ongoing nominee arrangements that keep ownership private after closing.

v.

Documentation that establishes beneficial ownership while preserving public anonymity.

Who it is for

i.

Brands preparing for confidential rebrands, product launches, or market entries.

ii.

Investors, family offices, and acquirers who need to avoid signalling.

iii.

Executives acquiring domains where seller awareness of the buyer would inflate price.

iv.

Public figures and high net worth individuals seeking privacy in personal acquisitions.

v.

Strategic buyers in adjacent markets where competitive intelligence value is high.

How we deliver

i.

We act as principal in the negotiation, with you as undisclosed counterparty.

ii.

Where appropriate, we use trustee structures so even WHOIS records do not reveal final ownership.

iii.

Communication channels are kept clean of identifying information, including domain history searches.

iv.

After closing, ownership can be transferred privately to you or held under continued nominee arrangement.

v.

Disclosure timing, if disclosure is desired at all, is entirely under your control.

Outcomes

i.

Acquisition without market signalling or premium pricing driven by buyer identity.

ii.

Continued strategic optionality, including the ability to delay public disclosure indefinitely.

iii.

Full legal title and control, on terms that protect your competitive position.

iv.

Documentation suitable for due diligence and audit, while preserving public anonymity.

v.

Protection against the cascade of inferences competitors can draw from a known acquirer.

When it mattersCommon scenarios

When this work pays off most.

i.

Confidential rebrand or relaunch

You are preparing a major rebrand and need the new domain in hand before any external party can connect the dots.

ii.

Strategic acquisition adjacent to a target

You are evaluating an acquisition or investment and want to secure related domains without alerting the target to your interest.

iii.

Pricing protection

You believe the seller would significantly raise the price if they knew your identity, your industry, or the strategic value to you.

iv.

High profile principals

The ultimate buyer is a public figure, executive, or high profile family office for whom anonymity is a default operating requirement.

v.

Competitor adjacency

You are a known competitor of likely sellers and any direct approach would face hostile pricing or refusal.

ProcessSix stages, end to end

How the engagement runs.

Step 01

Confidentiality framework

We establish the confidentiality framework before any substantive work, including mutual non disclosure, communication channels, and disclosure protocols. The framework is specific to your situation, not boilerplate.

Step 02

Structure design

We design the appropriate ownership structure, ranging from a simple trustee arrangement to a layered intermediary entity. The choice depends on your goals, jurisdiction, and post acquisition plans.

Step 03

Outreach

Approach to the seller happens entirely under our advisory identity. We never reference your business, sector, or identifying details unless and until you authorise disclosure.

Step 04

Negotiation

Counter offers, due diligence requests, and reference checks are handled by our team. Where the seller asks who is behind the offer, we respond consistently under our advisory framework.

Step 05

Closing

Funds flow through escrow under our identity. The domain transfers to a structure of your choosing. WHOIS, DNS, and registrar account records are configured to match your ongoing privacy requirements.

Step 06

Hold or disclose

You decide whether to retain the trustee structure indefinitely, transfer ownership privately to a known entity, or make a coordinated public announcement. We support whichever path you choose.

GlossaryKey terms

Terms used in this work.

i.
Trustee
A third party that holds legal title to the domain on behalf of a beneficial owner under a written trust agreement.
ii.
Beneficial owner
The party that economically owns the domain, regardless of whose name appears on the registration.
iii.
Nominee arrangement
An ongoing structure where a nominee holds the domain in their name on behalf of the true owner.
iv.
Disclosure
The act of revealing the beneficial owner publicly, in WHOIS records, or to specific counterparties.
FAQCommon questions

Common questions, answered.

Will the seller ever know who the real buyer is?

Not unless you choose to disclose. We act as the formal counterparty, and ownership can be held under trustee arrangements indefinitely. Many clients never disclose; others choose to disclose at a specific moment of their choosing.

Is stealth acquisition legal?

Yes. Acting through advisors, intermediaries, or trustees is a long established practice in domain, real estate, and corporate transactions. The structures we use are documented, transparent to relevant authorities where required, and fully compliant with applicable law.

Can the domain be transferred to my name later?

Yes, at any time. The transfer can also be timed to coincide with a public announcement or product launch, or done quietly without any public notice. This is a decision you control entirely.

What about WHOIS records?

WHOIS records can be configured to show the trustee, a privacy service, or an intermediary entity rather than your personal or corporate details. We coordinate this with the registrar at the point of transfer.

How is this different from a normal privacy service?

Privacy services hide WHOIS contact details but do not change ownership structure. Stealth acquisition uses ownership structuring so that even forensic investigation does not reveal the underlying buyer through registrar relationships or payment trails.

Does the seller suspect a stealth structure?

Sophisticated sellers know that advisory firms often act on behalf of undisclosed buyers. The fact of intermediation is not unusual. What is preserved is the specific identity of who is behind it, which is the part that affects pricing and strategy.

How are funds handled?

Funds typically flow from you to us, then from us to escrow, then from escrow to the seller. At no point does the seller see your identity, banking details, or any information that would enable identification.

What documentation do I receive?

You receive a written trust or nominee agreement establishing your beneficial ownership, a transaction file documenting the acquisition, and ongoing administration records. The documentation satisfies audit, tax, and due diligence requirements while preserving public anonymity.

Ready to start a conversation?

The first conversation is private, costs nothing, and commits to nothing. We respond within one business day.