Imagine you had the power to write anything, yes, anything while protecting identity.

From telling the truth about how crap your boss is, sending secret information, and yet, you don’t want people to know it was from you.

Simply put, the power of invisibility and the power of anonymity!

It seems hard and impossible, right?

Well, it is not.

Get On The Moving Train

Well, news flash! You could not be more wrong. Technology is as advanced from the time when impossibility was a word. Now, possibilities are the main trends.

Your identity is so precious, and you cannot afford to let it be trampled on. The rate at which people get dissed for something they sent, or, wrote, online is alarming. Some people get laid off from work, simply because they sent a mail to their boss. Others just spoke the truth.

In spite of the freedom of speech and freedom of opinion, blah blah. The fact is, most times, people will throw stones at you for your opinions.

Communicating through emails is gradually phasing out phone calls and others. For instance, some countries enacted the whistle-blower policy. They are giving money to whoever reveals an illegal operation or corruption, in ‘high places.’ It will be quite dangerous to send this kind of information with your details and identity in the open.

An anonymous mail makes it possible to stay hidden, a cloaked hero.

What is an Anonymous Email?

In simpler terms, an anonymous email is a mail that hides the sender’s identity. An anonymous email employs all the technologies needed to make the mail you send, untraceable to you.

The approaches and methods of sending anonymous emails differ. For simplicity, we classify these methods and approaches into two. These methods are; the hard and long method.  And, the short and straightforward method.

The Hard and Long Method

This method is classified hard and long because it takes time and, it involves making a long way.

Firstly, this approach is about opening a fake mail with false details. As you will expect, it is anonymous, if done correctly. If not, your IP address can be traced back. It is also not as private or secure as you will think.

This step is cheap, but not a number one choice. The steps in creating an anonymous mail using this method are;

  • Get a new phone number, which you will use to authenticate the account.
  • Get a fake name and fake information. Try not to use the one everyone knows about.
  • Open a new email account. (G-mail, Hotmail, Yahoo, anyone works)
  • Use a different browser; the incognito mode is preferable.
  • Send your mail.

As said earlier, this approach does not confer true and complete anonymity. If the person you sent the mail to has the resources, the mail can be traced back. There goes your superpower, with just a little kryptonite! In these scenarios, your kryptonite is being too cheap.

The Simple and Short Method

Now, this is the real deal. When it comes to remaining truly anonymous, this approach is your best and safest bet.

This method involves the use of anonymous mail services. There a lot of them, some good, others great. The ideas behind these services include;

  • Encryption
  • Automatic deletion of mail from a server
  • Blocked IP address
  • Password Protection of your anonymous mail
  • Minimal Personal Information
  • Privacy! (Now, this is the main idea and logic)

Depending on the service provider, these apps come with different unique features, tools, and guides. All of which will be explained in detail, soon enough.

In addition to anonymous email service providers, you can also employ the use of a VPN. The virtual private network (VPN), was developed for this kind of stuff. The VPN keeps your IP address hidden, and your identity, safe.

How to use VPN will also be discussed in detail.

Why the Anonymity?

Who can be anonymous online?

Anybody can choose to hide/ protect their identity. Most people send anonymous emails for different reasons. For journalists and their sources, the need for anonymity is not far-fetched. A cyber-criminal can also use an anonymous mail to perpetuate his dubious acts.

In essence, different people, from various works of life, can use an anonymous mail.

Other uses are;

  • Reporting a crime, or, fraud
  • Reporting your boss to their bosses
  • Telling on a co-worker
  • Professing your feelings
  • Sending Secret and Private information
  • Telling the truth in a difficult situation
  • Any other thing you can think of

Note, sending anonymous emails are different than encrypted emails.

How to Disappear

There are many anonymous email service providers. Listed below are some very good ones.

ProtonMail

ProtonMail employs end-to-end encryption software. Making your emails entirely inaccessible for third parties.

They do not require your personal information to create a secure and anonymous mail for you. Also, they do not keep IP logs, so, no tracing the mail back to you.

The good thing about ProtonMail is that its code is open source and available to all. It is completely free.

How to use ProtonMail

  • Log on to ProtonMail
  • Choose the account type you want. While ProtonMail is free, they also have priced options.
  • Create your account
  • Complete your account setup
  • Upgrade your account, if you want.
  • Enjoy the great features.

Guerrilla Mail

This service is a disposable temporary email address provider. They provide a scramble address feature, which generates a random email address.

Guerrilla mail also employs encryption software, and they help to avoid spam. You don’t need to have an account to use Guerrilla mail. Just follow these steps.

How to use Guerrilla Mail

  • Log on to Guerrilla Mail
  • You will see an icon showing set and cancel.
  • Set the mail address you want. It can be anything.
  • You can also select the scramble address feature. Simply click the icon.
  • Click the compose icon, and enter the recipient mail.
  • You can attach a file, up to 150MB per email. The file is deleted after 24 hours.
  • Write your message in the subject field
  • Click the send icon.

It is that simple.

Mailfence

With Mailfence, you enjoy great security features. There is no spam, no tracking, plus it is free from the government’s watchful eyes. They also offer an OpenPGP keys feature. Allowing you to create, import, publish, and manage these keys.

How to use Mailfence

  • Log on to Mailfence
  • Select a plan. Each plan has a great feature.
  • Fill the application
  • Follow the instructions
  • Start using and enjoying their service.

Cyber Atlantis

This is a free anonymous mail service provider. You do not need to register on the site. Just the recipient mail address.  Also, the subject of the mail, the PGP public key, and your message.

However, the recipient can block fire emails from being sent to their mail address.

Cyber Atlantis allows you to send anonymous emails, as long as it is not abusive or illegal.

PrivateMail

PrivateMail free plan offers a monthly 100MB storage with VPN service. They also use encryption software to help keep your data private and secure.

They are providing beautiful features to satisfy any email power. Also, your information is not required to register with them.

So you are 100 percent anonymous.

Anonymous Email

Send emails without registration through Anonymous Email.

The free version include their brand name in the emails. However, you have an option to remove that by subscribing premium plan. The paid plan also lets you enter from the name, from email and email notification on delivery.

Alternate Solution – Use VPN

You can also make use of a VPN to protect your identity online. Also, it can be used to send anonymous emails. The trick behind using VPN is not to subscribe to a free VPN service. Most times, a free VPN service tends to sell user data to third parties.

With the ability to vanish your IP address, VPN gives you invisibility, not only when sending emails, but also when browsing online.

Below are some of the trusted VPN service providers:

Don’t Forget This

Sending anonymous emails allows you to keep your identity hidden. It is essential not to use this guide for any illegal activities.