From secure communication to full anonymity

Secure email
Disposable email
Anonymous email
Controlled private identity
Private messaging
Virtual private network
Privacy dashboard
Anonymous dropboxes

Email protection

/ Privacy depends on your situation
Protect messages, identities, or both—depending on what the situation actually requires.

Secure email

Anonymous email

Anonymous email relay

Not every email carries the same level of risk. Some conversations need strong protection, others require anonymity, and some are safer when contact flows in without revealing who parties are. p.email’s email solutions are built around these realities, giving you practical options to reduce exposure, limit data trails, and communicate with confidence—without overcomplicating everyday email communications.
Designed for everyday private communication

Secure email

Everyday private email for personal and professional use.
Who it’s for: People who want strong privacy without changing how they use email.
Secure email protects against
It works like normal email, but without surveillance.
Secure email is not designed for
Secure Email is not anonymous. Your account may still be linked to basic metadata (like login times or billing info), as required to run a reliable email service.
Designed to reduce identity exposure

Disposable email

Low-friction, low-identity email use for sign-ups, one-off communication, and spam avoidance.
Who it’s for:
Sign-ups, one-off conversations, and avoiding spam or tracking.
Anonymous email lets you use email without tying it to your real identity.
Disposable email protects against
Messages and inboxes are temporary by design.
Disposable email is not designed for
This level is not meant for high-risk or adversarial situations. Repeated or long-term use may reduce anonymity.
Designed for situations where anonymity matters most

Anonymous email

High-anonymity communication where metadata protection and identity obfuscation are critical.
Who it’s for:
Advanced users who need to hide who is communicating — not just what they say.
This level is designed for experienced users and specific use cases.
Anonymous email relay protects against
It’s intended for advanced users who understand that anonymity depends on both tools and behavior.
Anonymous email relay is not designed for
No system can protect against every attacker. Anonymous Relay cannot protect against compromised devices or guaranteed global surveillance.
p.email

Extended your privacy

/ Extra layers of protection
When email alone isn’t enough, add-ons let you close privacy gaps, reduce exposure, and stay in control—on your terms.
P’s add-ons are designed to extend your privacy beyond email. Each add-on works independently and can be used with any privacy level — or on its own.

Private messaging

Virtual private network

Privacy dashboard

Anonymous dropboxes

Add-ons are designed for moments when your privacy needs go beyond standard email protection. They let you add extra layers of control, visibility, and security without changing how you communicate or committing to tools you don’t always need. Whether you’re managing sensitive interactions, monitoring what data exists about you, or creating safer ways for others to reach out, these add-on solutions extend your setup in a way that stays flexible, intentional, and easy to manage.
Short conversations. No lasting traces.

Private messaging

Send encrypted messages without sharing contact details. Conversations are temporary by default, so nothing lingers longer than it should.
Private messaging lets you communicate without email addresses, phone numbers, or long-term history.
When you need a conversation, not a record
Private Messaging reduces exposure by design — once the conversation ends, it’s gone.
Say it, then let it go
Say what you need — without creating a record Some conversations don’t need to live forever. Private Messaging lets you communicate freely without worrying about long-term archives, inbox clutter, or messages resurfacing later. Once the conversation ends, it’s designed to disappear.
Nothing to clean up later There’s no message history to manage, export, or delete manually. Conversations are temporary by default, reducing the risk of forgotten threads, accidental exposure, or future second thoughts.
No personal details required You don’t need to share an email address, phone number, or profile to start a conversation. Private Messaging removes unnecessary identity exchange so you can focus on the discussion, not on protecting your contact details.
Designed for moments, not message hoarding This tool is built for short, intentional communication — not long-term storage. By limiting permanence, Private Messaging encourages clarity, relevance, and safer communication habits.
Privacy that works without perfect behavior Strong defaults mean you don’t have to think through every setting or scenario. Even if you’re not an expert in privacy, Private Messaging reduces exposure automatically by limiting what exists in the first place.
Protect your connection, anywhere you are

Virtual private network

Encrypt your internet traffic and hide your IP address to reduce tracking — whether you’re using P or browsing the web.
Your network connection can reveal where you are, what you’re accessing, and when you’re online.
The VPN encrypts your internet traffic and masks your IP address, helping protect you from network-level tracking — whether you’re using P or browsing the web.
Extra protection, wherever you are
The VPN is designed to reduce what others can see — not collect more about you.
Protect your connection, not just your inbox
Protect more than just your inbox Email privacy alone doesn’t hide where you’re connecting from. The P VPN extends protection beyond messages by encrypting your internet connection and reducing the visibility of your online activity.
Reduce what networks can see about you Internet providers, Wi-Fi hotspots, and network operators can often see more than you expect. The VPN masks your IP address, helping limit location-based tracking and network-level observation.
Extra protection in everyday situations From cafés and airports to hotels and shared networks, everyday connections carry real privacy risks. The VPN adds a protective layer in these common scenarios without changing how you browse or communicate.
A stronger privacy setup, without extra complexity The VPN is designed to complement P’s other services without requiring additional configuration or technical decisions. Turn it on when you need it, turn it off when you don’t — no learning curve required.

Privacy without activity logging
Your internet activity isn’t turned into records or profiles. The VPN is built around minimal data handling, focusing on protection rather than monitoring or retention.

See your privacy. Stay in control.

Privacy health dashboard

Get a clear view of what data exists, what’s temporary, and what’s scheduled for deletion — all in one place.
The privacy health dashboard shows what data is temporary, what’s stored, and what add-ons are active — so nothing is hidden or unclear.
This add-on is about awareness and control, not monitoring.
See it. Manage it. Remove it.
The dashboard reinforces a simple idea: If data exists, you should be able to see it — and remove it.
Know exactly what exists about you
Always know what exists about you Privacy shouldn’t be a guessing game. The Privacy Health Dashboard gives you a clear view of what data exists, where it comes from, and how long it’s kept — all in one place.
Understand what disappears automatically Not all data needs to stick around. The dashboard clearly shows which information is temporary, when it expires, and what’s designed to delete itself without any action from you.
Delete data on your terms When you want something gone, you shouldn’t have to ask. The dashboard puts deletion controls directly in your hands, so you can remove data without relying on requests or waiting periods.
Nothing hidden behind analytics There are no behavioral scores, engagement tracking, or hidden profiles. The dashboard exists to inform you — not to measure you.
Confidence through clarity Seeing how your privacy works builds trust. The dashboard replaces uncertainty with transparency, so you’re never left wondering what’s happening behind the scenes.
Receive messages without exposing identities

Anonymous dropboxes

Let anyone send you messages or files anonymously, without accounts or personal details, and with built-in expiration.
Sometimes people need to reach you without identifying themselves — and you shouldn’t have to reveal your identity to receive their message.
Anonymous forms & dropboxes let anyone send you messages or files securely, without creating an account or sharing personal information.
Make it easier for people to speak up
This add-on protects both sides of the conversation by minimizing identity exposure from the start.
Anonymity that encourages openness
Hear from people who wouldn’t otherwise reach out Anonymity lowers barriers. By removing identity requirements, Anonymous Forms and Dropboxes make it easier for people to share feedback, ideas, or concerns they might otherwise keep to themselves.
Useful beyond extreme or rare scenarios Anonymous communication isn’t only for exceptional cases. Everyday feedback, research input, and submissions are often better when people don’t feel exposed or pressured to identify themselves.
Protect senders without extra steps Senders don’t need to create accounts or provide personal details. The experience is simple by design, making anonymity effortless rather than something people have to navigate carefully.
Messages that don’t live forever Submissions don’t have to become permanent records. You can set expiration and deletion rules so messages and files exist only as long as they’re genuinely useful.
Anonymity with clear boundaries These tools are designed for responsible use. Clear limits and safeguards help protect both senders and recipients, ensuring anonymity supports trust rather than misuse.
p.email

Controlled identity

These services don’t add visibility—they reduce it. They exist to give you clearer boundaries between what’s public and what stays private.

Controlled email identity

Controlled DNS identity

Controlled domain identity

Controlled browser identity

Controlled login identity

These services are designed for clarity and long-term use. When anonymity, disposability, or invisibility matter more, simpler or temporary options are often the better choice.
An email address people remember—without giving up privacy

Controlled email identity

Get a reusable, easy-to-communicate address for situations where convenience matters as much as privacy.
Identity as a service lets you add a memorable, easy-to-share email address to your Secure Email setup. You get the same privacy and security underneath, with an address that’s simple to remember and comfortable to give out when anonymity isn’t the goal.
When controlled email identity is useful
Email identity-as-a-service exists for moments when a recognizable, reusable address makes communication easier—not as a replacement for anonymous or short-term email use.
Same security. Same encryption. Just an email identity designed to be easier to share—without giving up control.
How controlled email identity further protects you
Email identity as a service doesn’t replace anonymous or system-generated addresses. It exists for situations where ease of sharing and long-term use matter.
When not to use controlled email identity
Email identity as a service isn’t meant for every situation. If you need maximum anonymity, are contacting unknown or high-risk recipients, or want an address that’s disposable or used only once, a system-generated secure email address is the better fit.
Browse without the network watching

Controlled DNS identity

A privacy-protected DNS identity that reduces tracking and network-level exposure without changing how you connect to the internet.
Secure DNS Identity gives you a consistent, privacy-protected way to resolve domains without relying on identities assigned by your network or ISP. It adds a trusted DNS layer on top of your existing setup, helping reduce tracking and unwanted visibility while keeping everyday browsing and connections simple and reliable.
When to use controlled DNS identity
Secure DNS Identity is useful when you want more control over how domain requests are handled without changing how you access the internet. It’s designed for situations where reducing network-level visibility and maintaining consistent, privacy-first resolution improves everyday safety and reliability.
How controlled DNS identity further protects you
Secure DNS Identity adds a dedicated privacy layer to how domains are resolved, reducing unnecessary exposure at the network level. It doesn’t change how you browse or connect, but it limits how much your DNS activity can be observed, correlated, or reused by external parties.
Additional protections include:
When not to use controlled DNS identity
Secure DNS Identity isn’t necessary if you’re already comfortable relying on your network’s DNS or don’t mind DNS activity being handled by your ISP. It’s also not designed for situations where full anonymity or traffic obfuscation is required—in those cases, other privacy tools may be more appropriate.
Be recognizable without being exposed

Controlled domain name identity

A human-readable domain name designed to be shared publicly, without making your personal or operational identity public.
Secure Domain Name Identity lets you use a recognizable domain name without exposing the person or infrastructure behind it. It separates public-facing names from private ownership, giving you a stable, easy-to-share domain that can be used for email, services, or public contact—while keeping your identity protected underneath.
When to use controlled domain name identity
Secure Domain Name Identity is useful when you want a recognizable, long-term domain without exposing personal or operational details. It’s designed for situations where clarity, trust, and reuse matter—while keeping ownership and underlying infrastructure private.
How controlled domain name identity further protects you
Secure domain name identity protects you by separating public-facing domain names from the people or infrastructure behind them. It lets you maintain a recognizable presence while minimizing the personal, operational, or technical information that’s typically exposed through domain ownership and usage.
Additional protections include:
When not to use controlled domain name identity
Secure domain name identity isn’t meant for disposable or short-lived projects, or for situations where you don’t want any persistent public identifier at all. If maximum anonymity is required and public naming would create unnecessary exposure, using non-identifying or temporary contact methods is a better choice.
Less fingerprinting. More privacy.

Controlled browser identity

Controlled or standardized browser identities that reduce cross-site tracking without changing how you browse.
Browser identity protection helps limit how websites track and recognize you by reducing fingerprinting signals—so you can browse normally without quietly building a unique profile everywhere you go.
Every website sees more than just the pages you visit. Browser identity protection reduces the signals that are commonly used to identify and track you across sessions and sites. It helps you blend into the crowd instead of standing out, lowering long-term tracking and profiling—without requiring special browsing habits or technical setup.
When to use browser identity protection
How browser identity protection further protects you
Browser identity protection reduces how uniquely your browser appears across the web, making it harder to profile you over time.
When not to use browser identity protection
Sign in without being linked everywhere

Controlled login identity

Alias-based or proxy logins that prevent accounts and services from being quietly linked together.
Login Identity Protection helps prevent different accounts and services from being quietly linked together through shared login details or identifiers.
Most online accounts are easier to link than people realize. Login Identity Protection reduces the reuse of identifying signals across services, making it harder for platforms to connect accounts back to a single profile. You still sign in as usual—but with fewer invisible connections forming behind the scenes.
When to use login identity protection
How login identity protection further protects you
Login Identity Protection reduces how easily services can connect multiple accounts to a single identity.
When not to use login identity protection
Privacy where it’s usually missing

Controlled payment identity

Proxy transactions that separate payment actions from personal identity and protect your identity at checkout.
Payment identity protection helps reduce how much personal information is exposed during transactions, keeping purchases from becoming long-term identity markers.
Payments often reveal more than just what you bought. Payment Identity Protection is designed to limit how transaction data can be tied back to you over time, reducing identity leakage at checkout. It helps keep financial interactions functional while minimizing how much personal information is shared or reused beyond what’s necessary.
When to use payment identity protection
How payment identity protection further protects you
Payment Identity Protection limits how transaction data can be linked back to your broader identity.
When not to use payment identity protection
Reduce the profile built around your data

Controlled profile identity

Visibility into your digital footprint and control over identity fragments that exist across platforms.
Data profile identity protection helps reduce how fragmented data points are collected, combined, and reused to build long-term profiles about you.
Over time, small pieces of data can form surprisingly detailed profiles. Data Profile Identity Protection focuses on limiting how identity fragments are accumulated and connected across services. By reducing unnecessary data reuse and increasing visibility, it helps slow profile growth and gives you more control over how you’re represented digitally.
When to use data profile identity protection
How data profile identity protection further protects you
Data Profile Identity Protection focuses on limiting how scattered data points become unified profiles.
When not to use data profile identity protection
p.email
1 %
Trusted
1 %
Satisfied
1 %
Recommend
1 %
Confident

Based on voluntary, anonymous customer feedback.

faq

/ Clear answers. No fine print.

Find quick answers

How is P different from other email services?

Can P read or access my emails and messages?

Do I need to be technical to use P securely?

What level of anonymity does P actually provide?

Can I add or remove privacy features anytime?

Most email services force a single privacy model: either fully public and tracked, or complex and hard to use. P is built around the idea that privacy depends on context, so different situations deserve different protections.

With P, you can use secure everyday email, switch to anonymous addresses, or use advanced anonymity tools — all within one ecosystem, without juggling multiple services.

Your message content is encrypted by default, which means it’s readable only by you and the people you communicate with. We don’t scan emails, analyze content, or sell data.

Even if we wanted to, our systems are built to prevent access to your private messages. Privacy isn’t enforced by policy alone — it’s enforced by design.

Most privacy tools fail because they expect users to understand complex settings or cryptography. P is designed to make strong privacy the default, without requiring technical knowledge.

Advanced options exist for users who want them, but you can use P safely and effectively without changing how you normally use email or communication tools.

P offers multiple privacy levels because anonymity is not one-size-fits-all. Secure Email focuses on content privacy, Anonymous Email reduces identity exposure, and Anonymous Relay is designed to minimize metadata.

We’re explicit about limits: no service can guarantee perfect anonymity in all situations. P’s goal is to give you clear choices — not false promises.

Add-ons like Private Messaging or VPN can be enabled independently of your email plan. You’re never forced into a bundle or locked into a single setup.

Your privacy needs can change over time, and P is designed to change with you — simply, transparently, and without friction.

Still have any questions?
Get answers now!


    Private by default.
    Anonymous when you need it.
    © 2026
    email protection

    Secure email

    Disposable email

    Anonymous email

    extended protection

    Private messaging

    Virtual private network

    Privacy dashboard

    Anonymous dropboxes

    controlled email

    controlled dns

    controlled domain

    browser profile

    login correelation

    payment identity

    data profile

    p.email

    about

    Sign-up

    Sign-in

    Support

    Privacy

    call p

    calls are not private

    message p

    start

    visit p

    8005 Zurich

    Email that respects your privacy — on your terms
    contact us
    info@p.email
    info@p.email
    Email that respects your privacy — on your terms
    Email that respects your privacy — on your terms
    contact us
    info@p.email
    info@p.email
    Email that respects your privacy — on your terms