From secure communication to full anonymity
Email protection
/ Privacy depends on your situationSecure email
Secure email protects against
-
Advertisers and data brokers
No scanning, profiling, or data selling. -
Our own company (p)
Zero-access design prevents us from reading message content. -
Hackers (content-level)
Encrypted storage and transport reduce exposure in case of breach.
- Protection scope
- Content: Strongly protected (end-to-end encryption)
- Metadata: Minimally protected (retained only as operationally required)
- Identity: Partially protected (account-linked, billing-linked)
- What it gives you
- Your emails are private by default
- No ads, no tracking, no data selling
- Even P can’t read your messages
- Works like a normal inbox
- Built-in protections
- End-to-end encryption
- Two-factor authentication
- Custom domains
- Zero-access storage
Secure email is not designed for
- Secure email does NOT fully protects against
-
Governments (metadata-level)
Legal requests may compel disclosure of limited metadata where required by law. -
ISPs (connection-level)
ISPs may see that a user connects to P, though not message content. -
Advanced traffic analysis
Timing and volume patterns may still exist.
- Explicit non-guarantees
- No promise of anonymity
- No promise of metadata invisibility
- Not designed for high-risk or adversarial environments
Disposable email
Sign-ups, one-off conversations, and avoiding spam or tracking.
Disposable email protects against
-
Advertisers & trackers
Disposable identities reduce long-term profiling. -
Our own company (identity-level)
No real-name requirement, minimal account data. -
Hackers (limited-scope)
Short-lived inboxes reduce breach impact.
- Protection scope
- Content: Encrypted in transit and storage
- Metadata: Reduced and short-lived
- Identity: Strongly minimized but not guaranteed anonymous
- What it gives you
- No real name required
- No long-term data retention
- Disposable or rotating addresses
- Emails auto-expire
- Designed for anonymity
- Anonymous inboxes
- Temporary addresses
- Minimal metadata
- Automatic deletion
- It’s ideal for
- Sign-ups
- One-time conversations
- Avoiding spam and trackingAvoiding spam and tracking
Disposable email is not designed for
- Anonymous email does NOT fully protects against
-
Governments
Not designed to resist targeted state-level investigation. -
ISPs
Network-level observers may still see connections. -
Sophisticated correlation attacks
Repeated misuse can reduce anonymity.
- Explicit non-guarantees
- Not suitable for high-risk activism or whistleblowing
- No protection against user operational mistakes
- No promise of long-term anonymity
Anonymous email
Advanced users who need to hide who is communicating — not just what they say.
Anonymous email relay protects against
-
Advertisers & data brokers
No usable identity or behavioral profile. -
Our own company (content & identity)
Systems designed to minimize trust in P. -
ISPs & network observers (partially)
Optional routing mechanisms reduce direct linkage. -
Passive surveillance
Metadata exposure is minimized by design.
- Protection scope
- Content: Strongly protected
- Metadata: Actively minimized and obfuscated
- Identity: Strongly protected, but never guaranteed
- What it gives you
- Strong protection against metadata tracking
- Obfuscated sender identity
- Designed for high-risk situations
- Advanced privacy features
- Message relays
- Metadata minimization
- Optional Tor/onion routing
- No permanent inbox
- Anonymous relay is built to reduce
- Identity exposure
- Metadata tracking
- Sender correlation
Anonymous email relay is not designed for
- Anonymous relay does NOT fully protects against
-
Global, active adversaries
A sufficiently resourced attacker may still correlate traffic. -
Endpoint compromise
If a user’s device is compromised, anonymity cannot be guaranteed. -
User error
Misuse can defeat anonymity protections.
- Explicit non-guarantees
- No claim of “perfect anonymity”
- No protection against compromised endpoints
- Not designed for illegal activity
- Requires user understanding and responsibility
Extended your privacy
/ Extra layers of protectionPrivate messaging
When you need a conversation, not a record
- What it’s good for / when to use it:
- Anonymous chats
- Quick, off-the-record conversations
- Temporary communication, coordination or planning
- Sensitive discussions that don’t need to live in an inbox
- How it protects you:
- End-to-end encrypted messages
- No phone number or email required
- No account details shared
- Conversations automatically expire
- No long-term message history
Say it, then let it go
Virtual private network
Extra protection, wherever you are
- What it’s good for / when to use it:
- Public or shared Wi-Fi networks
- Traveling or working remotely
- Reducing network-level tracking
- Adding an extra privacy layer to any P service
- How it protects you:
- Encrypted internet traffic
- IP address masking
- No activity logging
- Works independently of email usage
Protect your connection, not just your inbox
Privacy without activity logging
Your internet activity isn’t turned into records or profiles. The VPN is built around minimal data handling, focusing on protection rather than monitoring or retention.
Privacy health dashboard
See it. Manage it. Remove it.
- What it’s good for / what it shows you:
- Active services and add-ons
- What data is temporary vs persistent
- Understanding your privacy footprint
- Managing retention and deletion timelines
- Privacy-related settings in one place
- Staying in control
- Why it matters:
- No hidden retention
- No guessing what’s stored
- Clear, user-controlled deletion
Know exactly what exists about you
Anonymous dropboxes
Make it easier for people to speak up
- What it’s good for / when to use it:
- Feedback and submissions
- Tips, disclosures, or research input
- Anonymous contact and reporting
- How it protects everyone:
- No sender accounts required
- No personal details collected
- Messages delivered securely
- Encrypted messages and files
- Optional expiration and deletion
Anonymity that encourages openness
Controlled identity
Controlled email identity
When controlled email identity is useful
-
When you need an email address people can remember
Useful for conversations where you don’t want to repeat or spell out a long, random address. -
When you’re sharing your email verbally or publicly
Easier to say, type, and recall in meetings, forms, or introductions. -
When you want a reusable address for ongoing communication
Designed for long-term use across services, contacts, or professional contexts. -
When recognition helps trust or response rates
A clear, human-friendly address lowers friction for people reaching out to you. -
When anonymity isn’t required, but privacy still is
Ideal when you’re comfortable being identifiable, as long as your messages remain protected.
How controlled email identity further protects you
-
Separates identity from infrastructure
Even with a recognizable address, your real identity, metadata, and account details remain hidden behind Secure Email’s privacy layer. -
Reduces the need to reuse personal email accounts
You avoid exposing personal or legacy email addresses that are often tied to extensive data trails. -
Keeps visibility intentional, not automatic
You choose when to use a recognizable address instead of being identifiable by default. -
Preserves the same security guarantees
Encryption, data handling, and privacy protections remain identical to regular Secure Email. -
Limits long-term exposure risk
A dedicated, controlled email identity is safer than sharing personal inboxes that accumulate history across years of use.
When not to use controlled email identity
-
When you want maximum anonymity
If you don’t want your email address to be recognizable or reusable, a system-generated Secure Email address is the better choice. -
When you’re contacting unknown or high-risk recipients
For outreach where you prefer minimal exposure, randomized addresses reduce the chance of long-term association. -
When the address is meant to be disposable
Short-term signups, one-off interactions, or temporary use cases are better served by non-custom addresses. -
When you don’t want an address tied to repeated interactions
A memorable address is designed to be reused; if persistence isn’t desirable, avoid using it. -
When convenience isn’t necessary
If you rarely need to share your address or don’t mind using a randomized one, the add-on may not add meaningful value.
Controlled DNS identity
When to use controlled DNS identity
-
When you want to reduce network-level tracking
Useful if you don’t want DNS requests tied directly to your ISP or local network. -
When you’re using untrusted or public networks
Adds a consistent, privacy-protected DNS layer across different connections. -
When you want predictable, privacy-first resolution
Helpful for maintaining the same DNS behavior regardless of where you connect from. -
When DNS privacy matters but anonymity isn’t required
Designed to limit exposure without disrupting normal internet use.
How controlled DNS identity further protects you
-
Reduced DNS-based tracking
Prevents DNS queries from being easily linked across networks or sessions. -
Less reliance on ISP-managed infrastructure
Keeps domain resolution from being handled by default network providers that may log or monetize DNS data. -
More consistent privacy across locations
Maintains the same DNS privacy posture whether you’re at home, at work, or on public Wi-Fi. -
Lower metadata exposure
Limits the amount of behavioral information that can be inferred from domain lookups. -
Predictable resolution behavior
Avoids unexpected filtering, rewriting, or profiling that can occur with unmanaged DNS.
When not to use controlled DNS identity
-
Maximum anonymity required
If you need to fully obscure network activity or location, DNS-level protection alone may not provide sufficient anonymity. -
Short-lived or disposable browsing
For one-off sessions where persistence or consistency doesn’t matter, a dedicated DNS identity may add unnecessary structure. -
Restricted or locked-down networks
Some corporate or managed environments require the use of specific DNS resolvers and won’t allow overrides. -
No concern about DNS visibility
If you’re comfortable with your ISP or network handling DNS requests, this layer may not provide meaningful additional value.
Controlled domain name identity
When to use controlled domain name identity
-
When you need a public-facing name without public ownership
Ideal for websites, services, or contact points where recognition matters but personal details shouldn’t be exposed. -
When you want a stable domain for long-term use
Useful for ongoing projects, email, or services that benefit from a consistent domain name. -
When you’re separating brand or project identity from personal identity
Helps avoid tying domains directly to individuals or internal infrastructure. -
When trust and legitimacy matter
A recognizable domain can improve clarity and confidence for people reaching out to you. -
When anonymity isn’t required, but privacy still is
Ideal when you’re comfortable being identifiable, as long as your messages remain protected.
How controlled domain name identity further protects you
-
Separation of name and ownership
Keeps personal or organizational details from being directly tied to a public domain. -
Reduced exposure through public records
Limits the amount of identifying information available via domain registration data. -
Controlled public visibility
Lets you decide how a domain is used without exposing internal systems or private contact details. -
Safer long-term presenceSafer long-term presence
Avoids linking domains to personal email accounts or legacy infrastructure that accumulates risk over time. -
Lower correlation risk
Makes it harder to connect domain usage back to an individual across services or platforms.
When not to use controlled domain name identity
-
Temporary or disposable projects
If the domain is only needed briefly, a persistent, recognizable name may create unnecessary long-term exposure. -
Situations requiring no public identifier
When maximum anonymity is the goal, any public domain—no matter how well protected—can be more visibility than you want. -
One-off or private communication
For interactions that don’t benefit from recognition or reuse, a public domain adds little practical value. -
Testing or internal-only use
Early experiments, drafts, or internal tools are often better served without assigning a stable, public-facing name.
Controlled browser identity
When to use browser identity protection
-
Everyday browsing across multiple sites
Useful when you want to reduce cross-site tracking during normal browsing sessions. -
When you want fewer persistent identifiers
Helps limit fingerprinting signals that quietly follow you between websites. -
When privacy matters without changing habits
Designed to work without requiring special browsers or manual configuration.
How browser identity protection further protects you
-
Limits fingerprint uniqueness
Reduces signals like fonts, device traits, and configuration details. -
Slows profile building
Makes it harder to link activity across sites and sessions. -
Reduces passive tracking
Protects against tracking that doesn’t rely on cookies or accounts.
When not to use browser identity protection
-
Testing or debugging web applications
Some development tools rely on stable browser identifiers. -
Sites requiring strict device identification
Certain enterprise or financial platforms may expect consistent fingerprints. -
Short, one-off sessions
If you’re browsing briefly without concern for long-term tracking, added protection may not be necessary.
Controlled login identity
When to use login identity protection
-
Managing many online accounts
Helps prevent different services from being linked together. -
When you want to avoid account correlation
Reduces shared identifiers across logins. -
Long-term account use
Useful for services you access regularly.
How login identity protection further protects you
-
Limits identifier reuse
Prevents the same login signals from appearing everywhere. -
Reduces cross-platform profiling
Makes it harder to associate accounts across services. -
Preserves normal access
You still log in and use accounts as expected.
When not to use login identity protection
-
Single-use or throwaway accounts
Correlation risk is already low. -
Enterprise SSO environments
Managed systems may require standard login flows. -
High-risk account recovery scenarios
Some services may need consistent identifiers for recovery.
Controlled payment identity
When to use payment identity protection
-
Online purchases across many merchants
Reduces how transaction data is reused. -
When you want to limit purchase-based profiling
Helps prevent transactions from becoming long-term identifiers. -
Recurring or repeat payments
Useful for subscriptions or frequent purchases.
How payment identity protection further protects you
-
Reduces identity leakage at checkout
Minimizes exposure of personal details. -
Limits reuse of transaction metadata
Helps prevent long-term profiling based on purchases. -
Separates payment activity from other identities
Keeps financial interactions from linking to email or login profiles.
When not to use payment identity protection
-
Offline or in-person payments
This protection applies primarily to digital transactions. -
Situations requiring direct personal billing
Some invoices or reimbursements require full identity details. -
One-time, low-exposure purchases
Added protection may not provide meaningful benefit.
Controlled profile identity
When to use data profile identity protection
-
When you want visibility into data accumulation
Useful for understanding how profiles form over time. -
Managing long-term digital presence
Helps reduce how identity fragments are combined. -
Privacy-conscious daily use
Designed for ongoing reduction of data reuse.
How data profile identity protection further protects you
-
Reduces data correlation
Makes it harder to merge information across services. -
Slows profile enrichment
Limits long-term accumulation of behavioral data. -
Improves awareness and control
Helps you understand what data exists and how it’s used.
When not to use data profile identity protection
-
Short-term or temporary online activity
Profile growth is minimal. -
When visibility isn’t a concern
If you don’t mind data aggregation, added protection may not add value. -
Fully anonymous workflows
Other tools may be more appropriate.
Based on voluntary, anonymous customer feedback.
faq
/ Clear answers. No fine print.Find quick answers
Most email services force a single privacy model: either fully public and tracked, or complex and hard to use. P is built around the idea that privacy depends on context, so different situations deserve different protections.
With P, you can use secure everyday email, switch to anonymous addresses, or use advanced anonymity tools — all within one ecosystem, without juggling multiple services.
Your message content is encrypted by default, which means it’s readable only by you and the people you communicate with. We don’t scan emails, analyze content, or sell data.
Even if we wanted to, our systems are built to prevent access to your private messages. Privacy isn’t enforced by policy alone — it’s enforced by design.
Most privacy tools fail because they expect users to understand complex settings or cryptography. P is designed to make strong privacy the default, without requiring technical knowledge.
Advanced options exist for users who want them, but you can use P safely and effectively without changing how you normally use email or communication tools.
P offers multiple privacy levels because anonymity is not one-size-fits-all. Secure Email focuses on content privacy, Anonymous Email reduces identity exposure, and Anonymous Relay is designed to minimize metadata.
We’re explicit about limits: no service can guarantee perfect anonymity in all situations. P’s goal is to give you clear choices — not false promises.
Add-ons like Private Messaging or VPN can be enabled independently of your email plan. You’re never forced into a bundle or locked into a single setup.
Your privacy needs can change over time, and P is designed to change with you — simply, transparently, and without friction.