Today's Deep-Dive: anonaddy
Ep. 296

Today's Deep-Dive: anonaddy

Episode description

This episode explores the concept of anonymous email forwarding, focusing on the features and documentation of Addy.io, as a tool to regain control over one’s digital identity. It addresses the common problem of personal email addresses being overwhelmed with spam or exposed through data breaches. The core of the solution lies in using email aliases, which act as forwarding addresses, shielding the user’s primary inbox. The process involves registering a unique, random username to create a personalized domain structure. Aliases can be created on-the-fly during sign-ups, automatically generating them within the user’s account. A key benefit is the ability to track data leaks by knowing which alias was used for which service. Users can then deactivate or delete specific aliases to stop unwanted emails, with deactivation silently discarding messages and deletion causing a bounce-back. Advanced features include using shared domains for greater anonymity and the option to add multiple usernames for organizational purposes. For enhanced security, the service supports GPG encryption, ensuring that only the user with their private key can read forwarded emails, protecting against inbox snooping. The document also highlights the availability of mobile apps and browser extensions for convenience, and the open-source nature of the service for transparency and auditability. A free tier offers basic functionality, with paid plans providing more bandwidth and features. Finally, it touches upon the terms of service, cautioning against abuse and prompting reflection on the line between privacy protection and service misuse.

Gain digital sovereignty now and save costs

Let’s have a look at your digital challenges together. What tools are you currently using? Are your processes optimal? How is the state of backups and security updates?

Digital Souvereignty is easily achived with Open Source software (which usually cost way less, too). Our division Safeserver offers hosting, operation and maintenance for countless Free and Open Source tools.

Try it now!

Download transcript (.srt)
0:00

You know, I think we all know that feeling. You sign up for something specific,

0:03

maybe a

0:04

local library newsletter or a beta test for some software, and then just a few

0:10

months down the line,

0:11

your main email address, the one you use for everything, starts getting absolutely

0:15

hammered

0:16

with junk. Pyramid schemes, weird offers, it's annoying, sure. But what's worse,

0:21

honestly,

0:22

is that sinking feeling when a big company you trusted, maybe even shopped with,

0:26

announces a data

0:27

breach, and suddenly your personal email is out there floating around on the dark

0:31

web, that's not

0:32

just spam anymore, is it? That's like a permanent dent in your identity's armor. It

0:36

really is. It's

0:37

that moment, the cost of all this digital convenience really hits you. You traded a

0:42

piece of your

0:42

permanent online identity just to log into some service. So our mission today is

0:46

basically to

0:47

give you, the listener, a really solid tool to take back control. We're doing a

0:50

deep dive into

0:51

anonymous email forwarding, and we're focusing specifically on the documentation

0:55

from a key

0:55

player in this space, Addy.io. Exactly. This isn't about constantly cycling through

1:01

new email

1:01

addresses, which is just exhausting. It's about building an impenetrable shield

1:05

around the one

1:06

you already have. We want to give you a really clear, step-by-step guide to how

1:11

these email

1:12

aliases work. Make this whole privacy thing feel accessible, so you understand not

1:17

just how to use

1:18

it, but why it's fundamentally better than just using those throwaway email sites.

1:23

Yeah, the goal

1:24

is for you to finish this deep dive feeling confident enough to actually set this

1:28

up, like

1:28

right away. Put that protective layer in place. Okay, but before we get into the

1:32

nuts and bolts,

1:32

we really want to thank the supporter of this deep dive, Safe Server. They handle

1:36

the hosting

1:37

for this kind of software and can support your digital transformation. You can find

1:41

more

1:41

information at www.safeserver.de. All right, let's start right at the beginning.

1:47

When we say email

1:48

alias here, what are we actually talking about? Because, you know, a lot of people

1:52

just think of

1:52

an alias as like an extra address tacked onto their Gmail or Outlook account. Right,

1:58

and that's the

1:58

key difference here. In this context, an alias isn't just another inbox. It's a

2:03

dedicated forwarding

2:05

address. It acts as a protective layer, a true middleman, really. It shields your

2:09

real email

2:10

address, the recipient from the websites you interact with. So when you sign up for

2:14

something,

2:15

you give them the alias if they get breached. Your actual email address is safe. It's

2:19

never exposed.

2:21

Okay, that's clear. And the guide we looked at, it lays out a pretty simple three-step

2:25

process to get

2:26

going, right? Even if this sounds kind of complex at first. Exactly. Step one is

2:30

just registering.

2:31

You pick a username, let's say John Doe for the example. Now what's crucial here is

2:35

that this

2:35

username creates a unique sub-domain structure for you. Something like at JohnDoe.Ananaddy.com.

2:43

See that asterisk? That's really important. It signifies a wild card. It means you

2:46

don't have

2:47

to go and manually create every single alias you might ever want to use beforehand.

2:51

Oh, okay. And

2:52

I guess this is where the first bit of discipline comes in for anonymity. You

2:56

absolutely must use a

2:57

username that has zero connection to your real name, your professional life, any

3:02

other online

3:02

handles you use. Precisely. If you use JohnDoe everywhere else, well, you've just

3:08

handed over

3:08

a perfect digital fingerprint linking all these new aliases. You really want

3:12

something random here.

3:14

A string of characters, baby. Got it. Totally random username. So we've got the

3:18

domain

3:19

structure set up. Step two is actually creating the aliases. How's this better than

3:24

a disposable

3:25

email? It's the on-the-fly creation. This is the magic bit. Let's say you're

3:29

signing up for that

3:30

view.js blog you mentioned. You don't need to log into your adi.io dashboard first.

3:35

Nope. You

3:35

just invent an alias right there in the signup form, like viewjs at johndoe.anitadi.com.

3:41

The

3:41

system is smart enough to see that new alias when the first email arrives, and it

3:45

automatically

3:46

creates it in your account instantly. Zero friction when you need it. Okay. That is

3:49

smooth,

3:50

removes all the hassle, and the huge benefit, the real payoff. Even though that

3:54

email lands in my

3:55

normal inbox, my Gmail or whatever, and I can hit reply, the sender never sees my

3:59

real address.

4:00

Never. It's completely masked by the forwarding service. Your reply goes back

4:04

through them using

4:05

the alias address. Which leads perfectly into step three, right? Management.

4:10

Control. This is where

4:11

the power to fight spam and track breaches comes in. Exactly. This is where you

4:15

leverage having all

4:16

those unique aliases. Okay, let's play it out. I signed up for that Vue.js

4:19

newsletter with Vue.js

4:21

at jondo.inonity.com. Suddenly, that specific alias starts getting bombarded with

4:28

crypto scams

4:28

from some totally random company. Right. That tells you immediately. Vue.js either

4:33

got hacked,

4:34

or they sold your address. Maybe both. Now in your dashboard, you have two main

4:38

ways to deal with it.

4:39

Tactically different. First, you can just deactivate the alias, flick a switch.

4:43

That

4:44

tells the system to silently intercept any more emails sent to Vue.js at jondo.inonity.com

4:49

and just discard them. Poof. Gone. The center gets no notification. Silent discard.

4:54

I can see the

4:55

appeal less noise, but why would I want the second option? The guide says you can

4:58

also delete the

4:59

alias. Deleting makes the system reject the email with an error, right? Like

5:03

address doesn't exist.

5:04

Why tell a spammer as anything? That's a great question. It really depends on your

5:08

strategy.

5:09

Deactivation, the silent discard, is good if you think maybe the sender will try

5:13

again. Or maybe

5:14

you want the original source, Vue.js, to think the address is still valid even

5:18

while you ignore them.

5:20

But deleting, that sends a clear bounce message. For automated spam systems, that

5:25

often triggers

5:26

them to remove the address from their lists entirely. It saves bandwidth,

5:29

processing power,

5:31

it's more aggressive, but it's definitive. Cleans up their lists, potentially.

5:36

How would that make sense? Different tactics for different situations. But either

5:39

way,

5:39

the main point is crystal clear. Because I used a unique alias just for Vue.js,

5:44

the second that alias gets unrelated junk, I know exactly who leaked or sold my

5:49

data instantly.

5:50

No guesswork.

5:50

That's the real power. It turns a data breach from this vague scary thing into

5:55

something

5:55

actionable. You have concrete information.

5:57

And making this even easier day to day, the notes mention some handy tools. Open

6:01

source ones.

6:02

Oh yeah. They've got native mobile apps, open source for iOS and Android. So you

6:06

can manage

6:07

things on the go. But maybe even more useful is the browser extension. Works on

6:10

pretty much

6:11

everything. Firefox, Chrome, Edge, Safari, Brave. And that lets you generate a new

6:17

unique alias with

6:18

just like a couple of clicks right when you're on a signup form. No need to think

6:22

of a name

6:22

or copy paste anything. Super convenient. Okay. So we've tackled controlling who

6:27

emails us and

6:28

figuring out where leaks happen, but there's still this potential issue of, well,

6:33

who I am.

6:34

If I have hundreds of aliases, but they're all under at jondo.anonaddy.com, aren't

6:39

I still linking

6:40

everything back to that one John Doe username? If that service got compromised,

6:43

wouldn't everything

6:43

be linked? How do I blend in more? That's definitely the next level of thinking

6:47

about privacy. And yeah, anonymity options are key. The service handles this mainly

6:51

in two ways.

6:52

First, they offer random unique aliases that use a shared domain. So instead of dot

6:57

at johndoe.anonaddy.com,

6:58

it might look like by 481904 at anonaddy.me. Total gibberish. Anonaddy.me. That's

7:05

the important part.

7:06

The domain. Exactly. Because that .me domain or similar shared ones they offer is

7:11

used by

7:12

everyone on the service who chooses that option. So an alias like by 481904 at anonaddy.me

7:18

cannot

7:19

be traced back specifically to your johndoe account. You just look like any other

7:23

user.

7:23

That's real anonymity from external observers. Okay. That covers external privacy.

7:28

But what if

7:28

I just want to organize things better for myself, keep work and personal stuff

7:31

separate? Right. And

7:32

that's the second option, usually on the paid plans. You can add additional usernames.

7:36

So johndoe

7:37

might be your personal one. But you could add, say, janeworkerb as another username

7:41

under your

7:42

account. Then all your work-related signups use aliases like client A at jane-worker-b.anonaddy.com.

7:49

It compartmentalizes everything logically. Only you know those usernames are linked

7:53

to the same

7:53

account. Nice. Okay, let's shift gears to maybe the most advanced feature mentioned.

7:58

Encryption.

7:59

GPG open PGP. That sounds complicated for a beginner. What does this actually do

8:03

beyond

8:03

just hiding my email address? Isn't that enough? It adds another very powerful

8:08

layer of security.

8:09

Think of it as your ultimate privacy blanket. Basically, you generate a GPG key

8:15

pair, a public

8:16

and a private key. You upload your public key to the alias service. From then on,

8:20

every single email

8:21

forwarded to you through the alias service gets instantly encrypted using that

8:25

public key before

8:26

it even hits your main inbox. But why? If it's going to my secure Gmail or Outlook

8:31

anyway,

8:32

it doesn't matter. Aren't they already protecting my emails? Well, this protects

8:35

you from inbox

8:35

snooping. If the email content arrives encrypted, only you with your private key

8:40

stored securely on

8:41

your own device can decrypt and read it. It means your email provider, Google,

8:45

Microsoft, whoever,

8:46

literally cannot read the content of those forwarded messages, even if their

8:50

policies

8:50

allow scanning or if they suffer an internal breach. You can even choose to encrypt

8:54

the subject

8:55

line too, which often leaks sensitive info. It's maximum obfuscation. Okay, I

9:00

understand the why.

9:01

But practically speaking, does this add a ton of friction? Like, do I have to

9:05

manually decrypt

9:06

every single email? This is only for the super paranoid, technically savvy user.

9:10

That's a fair point.

9:11

There's definitely an initial setup step, generating the keys, configuring your

9:15

email client.

9:16

But modern email clients, like Thunderbird or dedicated GPG tools, can handle the

9:22

decryption

9:22

pretty seamlessly. Once it's set up, it's mostly automatic. You unlock your key

9:27

maybe once per

9:27

session. For people really serious about privacy, that initial setup is a small

9:32

price to pay for

9:33

knowing nobody but them can read their mail. That helps put it in perspective. And

9:37

there was this

9:37

tiny detail in the docs about replying when using GPG. Something about stripping

9:42

the public key. Why

9:42

is that important? Oh yes, that's crucial. It's about preventing accidental self-docsing.

9:48

Your

9:49

public GPG key often contains metadata embedded within it, typically your real name

9:54

and your real

9:54

email address. If the alias service didn't automatically remove your public key

9:58

when you

9:58

replied from alias, you'd be broadcasting your hidden real email address with every

10:03

reply.

10:04

It completely undermines the alias. Stripping the key is a vital little detail that

10:09

shows they

10:09

understand operational security. That kind of attention to detail is definitely

10:13

reassuring.

10:13

Okay, before we wrap up, let's quickly touch on the practical side. They offer a

10:18

free plan,

10:19

right? Seems pretty generous. It really is, especially for a privacy-focused tool.

10:23

The free tier gives you unlimited standard aliases, the ETA, at your username, dot

10:28

whatever kind,

10:29

and lets you forward to one main recipient address. The main limits are bandwidth

10:34

10

10:34

millibies a month, which they figure is about 140 average emails. And you get 10 of

10:39

those shared

10:40

domain aliases, the anonymous dot at anonymity.me type. If you need more bandwidth

10:45

or want to

10:45

forward to multiple real addresses or use custom domains, then you look at the paid

10:49

plans.

10:49

And for people who are naturally wary of trusting any third party, especially with

10:53

privacy,

10:54

the whole thing is open source. Correct. Full transparency, you can audit the code

10:58

yourself.

10:59

And if you're technically inclined, you can even self-host the entire application

11:02

on your

11:02

own server. Take complete control. They also mentioned their infrastructure primary

11:07

server

11:07

in the Netherlands running on wind power back up in Poland. That level of

11:10

transparency is good to

11:12

see. So putting it all together, this knowledge really is quite powerful. You can

11:17

basically build

11:17

this flexible digital shield, pinpoint data leaks the moment they happen, kill spam

11:22

with surgical

11:23

precision, and even use strong encryption. So literally only you can read your

11:27

emails. That's

11:28

a huge step up in control. It absolutely is. It moves you from being just a passive

11:32

target

11:32

online to someone actively managing and protecting your digital identity. It's very

11:37

empowering.

11:37

Now, one interesting thing we noticed reviewing the source material. While it's all

11:42

about privacy

11:42

protection, they do have terms and conditions designed to prevent abuse. For

11:47

instance, they

11:47

explicitly say, don't create multiple free accounts. And interestingly, they warn

11:52

against

11:52

using aliases to create large numbers of accounts on other websites. That sounds

11:56

like an anti-botting

11:57

rule. That does raise an interesting point for you, the listener, to think about.

12:02

We've spent

12:02

this whole deep dive talking about the technical ways to boost your privacy and

12:05

security using

12:06

these tools. But where's the line? Where does legitimate, necessary privacy

12:11

protection end,

12:12

and potentially abusing the service according to their rules begin? Something to

12:16

definitely

12:17

mull over as you start using aliases yourself. A very interesting thought to end on.

12:21

We really

12:22

hope this deep dive has brought clarity to anonymous email forwarding and shown you

12:26

how

12:26

to take back control of your inbox. And thanks once more to our supporter, Safe

12:30

dedicated to hosting and digital transformation. Find out more at www.safeserver.de.

12:30

dedicated to hosting and digital transformation. Find out more at www.safeserver.de.