Email, without identity.
A decentralized email network designed for anonymous communication.
Zero-trust by design, fast by architecture, and open by protocol.
Privacy by design,
not by policy.
Most services promise not to collect data, but our protocol is designed so that collecting user data is technically impossible. No IP logs, no account databases, no centralized metadata storage — privacy is ensured by architecture, not policy.
No accounts or profiles
Your email aliases aren't tied to your identity. Your messages aren't tied to your aliases. No account signup required.
Minimal metadata exposure
Sender and recipient information is encrypted, and messages are routed through multiple nodes to prevent IP correlation. The network can't see who is talking to whom.
Decentralization
There is no single server controlling your messages. They travel through a distributed network for reliability, availability, and privacy.
Encrypted by default
Messages are encrypted on your device before they are sent.
Easy-to-use
All cryptography runs under the hood while the interface stays simple and familiar. Use it like regular email.
Open & Verifiable
The protocol and code are public, so anyone can verify how the system works.
How It Works
Create alias
You generate email aliases locally (offline) from your private seed.
No one can see that an alias was created or link it back to you.
Features
Anonymous email
Send and receive emails without revealing your identity.
No personal data. No account required.
Unlimited aliases
Create as many email addresses as you want — instantly.
Aliases can't be linked back to you or to each other.
Works with regular email
Send and receive emails to and from traditional email providers.
No one else needs to install anything.
Block email tracking
Automatically block common tracking techniques used in emails.
No tracking pixels. No hidden requests.
Secure access
Access your inbox using local authentication — without usernames or passwords.
Your identity never leaves your device.
PGP support
Use PGP if you want full compatibility with existing encrypted email workflows.
Optional and fully interoperable.
Join the Waitlist
Get early access when it's ready.
Is this really anonymous?
Yes. The system is designed so your identity is never collected or stored.
There are no accounts, no personal data, and no way to link your aliases together.
Do I need to create an account?
No.
There is no signup, no username, and no password.
Everything works without creating an account.
Can you see my emails?
No.
Messages are encrypted on your device before they are sent.
Only the recipient can read them.
Is it free?
Yes.
Core features will always be free.
We may introduce optional paid features later to support development.
How long are my emails stored?
Messages are stored temporarily in the network for up to one week.
This is not for privacy reasons — it helps prevent the network from being overloaded by millions of temporary emails, newsletters, and verification codes.
You can still optionally save emails locally on your device for as long as you like.
This way, you control your archive while the network stays fast and efficient.
Is it legal?
Yes.
This is a privacy-focused email system designed to protect users from
tracking and data collection.
It does not enable or encourage illegal activity.
Is this related to cryptocurrencies?
No.
While the network is decentralized — similar to many cryptocurrencies — it has completely different goals and infrastructure.
There are no tokens, no wallets, and no financial transactions.
Is it as simple as regular email?
Yes.
It's even simpler — there are no accounts, usernames, or passwords to remember.
Can I email Gmail / Outlook?
Yes.
You can send and receive emails from traditional email services.
Can I switch from Gmail to your network?
Yes.
Email import and migration are planned, but may not be available in the first release.
Can I use multiple devices?
Yes.
You can access your aliases across devices and stay in sync with created or deleted aliases — without creating an account.
What if I lose all my devices?
You can recover your aliases using a recovery file that contains your
private seed.
Please note:
- This is the only way to recover access.
- Store it securely and offline.
- Anyone with this file has full control over your aliases.
You are the only one responsible for your inbox.
Does it work with Tor?
Yes.
The system works over Tor.
Is it open source?
Yes.
The protocol and code are public, so anyone can verify how the system works.
When will it be available?
The project is under active development.
You can join the waitlist to get early access.
View on GitHub
Read the protocol and source code.


