Create an anonymous email account - how it works
Many Internet users today want an anonymous email account. Here we show you what you should pay attention to and how you can really protect your emails from unpleasant readers.
Creating an anonymous email account - not that easy
An anonymous email account is not only useful for illegal purposes: For example, many journalists want an anonymous communication channel with their informants.
- However, it is not so easy to create anonymous email accounts. Because the IP you use can almost always find out who you are.
- In the meantime it is no longer possible to use the "Tor Mail" service. The FBI also had access to this. The service was then closed.
- If you value anonymous communication, you should avoid apparently anonymous providers.
The really anonymous email communication
So far, the best way to communicate anonymously and securely via email is to encrypt the emails yourself on your own computer. You should use PGP encryption for this. We have created practical tips for you on how to use them under Thunderbird or Outlook.
- You created the email account used for this with incorrect data at a freemail provider such as GoogleMail or GMX. You can also surf the Tor network as you create it to hide your true identity. However, you then have to surf the Tor network every time you send and open the email program.
- Ultimately it is not that easy to write really anonymous emails. However, if you simply want to encrypt the content of the emails, you should use PGP encryption.
- Receive and send your emails completely anonymously with the paid Posteo service. No data is collected when registering. All mails and other data are encrypted and transferred to Posteo's servers, so that they cannot be handed over to the authorities. The mail service costs 1 euro per month. You can send the money to Berlin anonymously by letter.
Receive and send mails from other people's emails
You can solve the problem free of charge and much faster with a disposable email. These are email addresses that are created in a few seconds and can be used to receive and send messages relatively anonymously.
- Depending on the provider, you can determine the mail address yourself before the @ sign, with some providers it is generated randomly. You will then be given access to your mailbox.
- Here you can receive mails and send mails from some providers. The mailbox is often deleted after a few hours. In the following practical tip you will find the best providers of disposable emails.
- You do not leave any personal data behind, but the messages are not sent in encrypted form and traceability by IP address is not impossible either. Also note that some of the email addresses are accessible to everyone, since no password is required for the login.
Tip: Also read how to surf anonymously with the Chrome browser.