5 Ways to Hide Email for BEST Privacy (email aliases)

5 Ways to Hide Email for BEST Privacy (email aliases)

Understanding Email Aliases

Overview of Email Aliases

  • The discussion focuses on five main types of email aliases, which are commonly used for various purposes.
  • The five types identified include: separate email accounts, burner email addresses, sub addressing, custom email URLs, and alias forwarding services.

Separate Email Accounts

  • Multiple Gmail or Microsoft accounts can be created without violating terms of service; each account requires a unique login and password.
  • Pros include greater control over individual accounts and the ability to customize settings like profile pictures and passwords.
  • Cons involve time-consuming setup and management challenges due to multiple logins; tools like Go Login may help but often require payment.
  • Free Gmail accounts limit the number of aliases unless using sub addressing; business accounts allow for more flexibility in creating aliases.

Temporary Email Addresses (Burner Emails)

  • Temporary email addresses can be created for short-term use, such as signing up for promotions or receiving coupons.
  • These emails are disposable and typically last only a few minutes; they cannot send replies back to other users.
  • An example service is temp mail.org, which allows users to receive emails temporarily but poses security risks if used for sensitive information.
  • Users should avoid using temporary emails for important accounts since they may be recycled by the service provider.

Sub Addressing

  • Sub addressing is a method popularized by Gmail that allows users to create variations of their primary email address (e.g., myname+newsletter@gmail.com).

How to Manage Email Sub Addresses and Custom URLs

Understanding Email Filters and Sub Addresses

  • You can create filters in email clients like Gmail or Thunderbird to direct emails from specific addresses into designated folders, bypassing the inbox.
  • While easy to set up, sub-addresses can be decoded easily, revealing the original email address if someone knows how to interpret it.
  • Some services may not accept email addresses with a plus sign, limiting their usability for certain registrations.
  • Replies sent from sub-addresses will reveal the user's true email address since replies come from the main account.

Managing Multiple Sub Addresses

  • To manage multiple sub addresses effectively, create them on-the-fly when signing up for services by appending identifiers after your name using a plus sign.
  • After creating a sub address, set up filters in Gmail that skip the inbox and apply labels for better organization of incoming emails.
  • It's important to regularly check these labeled folders as emails will not appear in the main inbox but will be stored under their respective labels.
  • Not all platforms accept email aliases; GitHub is an example where this limitation exists.
  • The method of using sub addressing is well-known among users familiar with managing their emails efficiently.

Setting Up Custom Email URLs

  • A custom email URL involves purchasing a domain (e.g., allthingssecured.com), allowing you to set up MX records for receiving emails at that domain.
  • There are costs associated with maintaining your own URL, including initial purchase and annual renewal fees.

Understanding Email Security and Custom URLs

The Importance of Custom URLs for Email Management

  • The speaker emphasizes the benefits of using Proton Mail for secure communications, particularly due to ownership of a custom URL (allthingssecured.com), which provides flexibility in email management.
  • There is a discussion on the potential risks of being locked into specific email services, highlighting that while stories of negative consequences are rare, awareness is crucial for security and privacy.
  • Owning a custom URL allows users to create unlimited email aliases and catch-all addresses, enhancing control over their email communications.

Utilizing Catch-All Email Addresses

  • A catch-all address can receive emails sent to any variation or misspelling of the user's name, allowing for easy filtering and organization within the inbox.
  • This method enables users to provide an easily memorable email address without creating multiple aliases; however, it may not be the most efficient approach.

Privacy Considerations with Custom Emails

  • Using a custom URL ties all emails back to the user's identity, presenting privacy risks even when random or anonymized parts are used in addresses.
  • While having multiple URLs is possible, managing several inboxes can become cumbersome. Services like Proton allow up to 100 accounts with customizable backend URLs.

Setting Up DMARC for Enhanced Security

  • The speaker recommends setting up DMARC (Domain-based Message Authentication, Reporting & Conformance), which helps prevent impersonation by ensuring that only authorized senders can use your domain.
  • Implementing DMARC requires some technical knowledge but is essential for protecting against fraudulent emails sent from one's domain.

Exploring Alias and Forwarding Services

  • Various alias and forwarding services exist such as Addie.io and Simple Login; these help manage email communication while maintaining privacy.
  • Simple Login creates two aliases: one between the user and service provider, allowing seamless replies while keeping personal information private.

Conclusion on Email Aliases

Email Aliases and Privacy Solutions

Overview of Email Forwarding Services

  • Discusses the convenience of using email aliases for communication without needing multiple inboxes. Users can reply directly, simplifying the process.
  • Highlights that many forwarding services, like Cloak and Simple Login, do not store emails on their servers, enhancing privacy by reducing potential risks associated with data storage.

Benefits of Using Email Aliases

  • Emphasizes the ease of creating unlimited aliases through services like Simple Login. Users can generate custom aliases on-the-fly while browsing.
  • Explains that once an alias is created, it is linked to a specific sender or URL, making management straightforward without needing to log into service accounts.

Limitations and Costs

  • Notes that while some services offer free tiers, full functionality often requires payment for features like unlimited aliases.
  • Mentions the presence of various email alias solutions including separate accounts and burner addresses but does not delve deeply into each option.

Importance of Security Keys

  • Acknowledges sponsorship from Yubico as a trusted security solution. The speaker emphasizes personal use and setup for family members to enhance online security.
  • Describes a strategy involving primary and backup keys to prevent loss of access during travel or emergencies.

Enhancing Online Security Practices

  • Advocates for using security keys (like YubiKey) across different email platforms to secure accounts effectively.
  • Encourages viewers to consider investing in security keys as part of their online safety measures, providing a discount link for interested users.

Key Features of Security Keys

  • Discusses different models available at varying price points, highlighting affordability options for users seeking enhanced security.

Password Management and Email Alias Strategy

Password Management with YubiKey

  • The speaker describes their password management process, which involves a password manager that inputs usernames and passwords, followed by a YubiKey authentication step requiring a PIN code.
  • Acknowledgment of YubiKey 5 as an essential security tool, with gratitude expressed to the sponsor for supporting the live stream.

Email Alias Strategy Overview

  • Introduction to the email alias strategy, emphasizing its evolving nature and inviting audience participation for shared learning experiences.
  • The speaker outlines four types of email accounts: personal Gmail, business email (custom URL), secure secret email (limited sharing), and a pseudonym account used less frequently.

Detailed Breakdown of Email Accounts

  • Explanation of the personal Gmail account's sub-addressing feature, allowing for organization through variations like "name+service@gmail.com."
  • Discussion on the business email being hosted on Google with multiple aliases due to custom URL capabilities; plans to migrate legacy personal Gmail to a private service in the future.

Secure Secret Email Practices

  • Description of a private email account used exclusively for sensitive communications with trusted individuals such as lawyers and CPAs.
  • Emphasis on recognizing fraudulent emails based on unexpected messages received at this secure address.

Managing Business Emails Effectively

  • The speaker mentions using split accounts where most business emails are managed by an assistant who filters important messages.
  • Highlights how having multiple users/accounts helps maintain mental health by reducing overwhelming inbox clutter.

Utilizing Aliases for Privacy

  • Discussion about creating new aliases through ProtonMail without sub-addressing; preference for keeping secure emails separate from disposable ones.
  • Mention of using Simple Login as an alias service connected to both personal and business accounts while maintaining privacy during replies.

On-the-Fly Aliases Creation

Email Aliasing Strategies and Concerns

The Context of Email Aliasing

  • The speaker discusses the need for email aliases while shopping online, particularly when purchasing a wedding dress for their wife. They highlight the overwhelming marketing emails received post-purchase.

Creating and Managing Email Aliases

  • An on-the-fly alias was created to manage communications from the retailer, which redirected to their personal address. This strategy aimed to limit spam after the purchase.
  • After receiving numerous irrelevant marketing emails, the speaker plans to delete the alias now that the dress has been delivered.

Understanding Permanence of Email Aliases

  • The speaker emphasizes that email aliases from forwarding services are permanent, contrasting them with temporary emails that can be recycled.
  • Services like Simple Login provide permanent aliases even if you stop using them; they remain functional but cannot create new ones without a subscription.

Considerations When Using Email Aliases

  • Deleting an alias disassociates it from your account but does not make it available for reuse by others, ensuring privacy.
  • Users should consider whether they need ongoing access or control over these aliases when choosing an email service.

Evaluating Privacy and Security Risks

  • The speaker reflects on potential risks associated with relying on aliasing services and how this impacts their overall email strategy.
  • Questions arise about whether privacy is crucial in certain transactions or if it's merely about avoiding excessive marketing.

Community Interaction and Feedback

  • The speaker invites audience feedback regarding other useful services or strategies related to email aliasing that may differ from theirs.

Addressing Trust in Email Services

  • A community member raises concerns about trusting aliasing services with sensitive information.

Living 100% on Cryptocurrency: Insights and Strategies

Personal Experience with Cryptocurrency

  • The speaker shares their recent decision to exit most cryptocurrency positions due to negative experiences, indicating a cautious approach towards crypto investments.
  • Despite exiting, the speaker expresses an intention to re-enter the crypto market in the future, suggesting that their current actions are not a permanent stance against cryptocurrency.

Temporary Email Solutions

  • The discussion highlights the utility of temporary email addresses for short-term needs, emphasizing their role in email aliasing.
  • Acknowledges limitations of temporary emails, such as inability to reply and potential issues with maintaining aliases beyond short timeframes.
  • The speaker prefers creating email aliases quickly without additional friction from services or browser extensions.

Email Services and Privacy Tools

  • Mention of Mozilla Relay (Firefox Relay) as a paid service for managing email aliases; also notes its integration with Proton Pass for password management.
  • Simple Login is highlighted as an open-source tool that allows users to create email aliases securely; it can be self-hosted but requires technical setup.

Data Removal Services Discussion

  • The effectiveness of data removal services like Delete Me and Incogni is discussed; using multiple email addresses may complicate data removal efforts.
  • Using aliases can reduce concerns about personal information being linked back to primary accounts, making them less critical for deletion purposes.

Proton Mail Features

  • Inquiry about using multiple custom domains within one Proton Mail account raises questions about safety and organization; the speaker suggests it might be feasible but emphasizes individual risk assessment.

Proton Mail vs. Gmail: A User's Journey

Understanding Proton Mail Tiers

  • Different tiers of Proton Mail offer varying features; the basic plan includes simple login, while higher tiers like Unlimited or Visionary provide additional benefits such as unlimited email addresses and enhanced privacy options.

The Legacy of Gmail Usage

  • The speaker reflects on their continued use of Gmail alongside Proton, indicating that their Gmail account serves mainly for legacy purposes and access to specific Google services.
  • Transitioning from Gmail to another service is acknowledged as a slow process due to long-term usage; the speaker has been using their Gmail for decades, making migration challenging.

Migration Challenges and Privacy Considerations

  • The speaker emphasizes that migrating to a more secure email service is not an overnight task but rather a gradual journey involving multiple steps.
  • They highlight the importance of recognizing personal weaknesses in privacy practices and express intentions to prioritize switching accounts in the near future.

Reflections on Privacy Practices

  • The speaker discusses past decisions regarding anonymity online, noting they did not initially consider using an alias for their Apple ID or YouTube channel focused on privacy.
  • They admit to having over a hundred email addresses, many being random aliases created over time, complicating management.

Managing Privacy Risks

  • Forwarding emails to Proton Mail is suggested as an easy way to transition; however, once certain actions are taken (like sharing data), reversing them can be difficult.
Video description

Everybody needs to be using email aliases for better privacy online...but HOW? In this livestream, join Josh as he explains his strategy for creating and managing aliases and answers your questions live. Be sure to grab a YubiKey to secure all your online accounts: https://www.allthingssecured.com/yubikey5off As you look to create email aliases, it's worth considering: ➡️ Do you have a secure email provider? Here are the best: https://www.youtube.com/watch?v=72eG84gGR0s ➡️ What kind of account security strategy do you have? Here's mine: https://www.youtube.com/watch?v=XOvapxmgPjc 🔸🔸Resources Mentioned in this Video🔸🔸 ➡️ 2FA Security Key from Yubico: https://www.allthingssecured.com/yubikey5off ➡️ Proton account (email @simplelogin1421): https://proton.me/allthingssecured ➡️ Try Cloaked: https://www.cloaked.com/ats ➡️ Try Addy (formerly AnnonAddy): https://addy.io/ 🔸🔸Watch These Videos Next🔸🔸 ⭕ What are "Passkeys"? https://www.youtube.com/watch?v=_tQbWop1P7o ⭕ 12 Privacy/Security Tools I Use Every day: https://www.youtube.com/watch?v=XNOAOQktG6U ⭕ 12 Privacy/Security Tools I Use Every day: https://www.youtube.com/watch?v=XNOAOQktG6U ⭕ How to Set up your own Email URL: https://www.youtube.com/watch?v=6-BuNCLa7yg ********************* Video Timestamps ********************* 0:00​ - 5 types of Email Aliases 0:57 - Multiple email accounts 3:00 - Temporary Email address 4:57 - Subaddressing Email (the "+" method) 9:54 - Custom Email URL Aliases 16:53 - Alias Forwarding Service 22:00 - Sponsored by Yubico 25:36 - My Email Alias Strategy 33:56 - Which Type of Email Alias to Use? 35:49 - Should you Trust an Email Alias Service 37:36 - Why not 10 Min Email 38:44 - Simplelogin for free by Proton 39:45 - Lavabit or Dark Internet email? 40:17 - Aliasing using StartMail 41:15 - Do Data Deletion Services find Alias? 42:20 - Separate aliases or pseudonyms? 44:38 - Using Gmail and Proton 46:37 - Alias for the Apple ID 47:35 - How many emails does Josh have 48:13 - Closing Remarks ********************* #emailsecurity #emailalias #privacymatters Sponsored by @Yubico