Frequently Asked Questions

Q - I already have an email address. Why do I need another?

A - Not everyone needs another email address. For some people using the email address provided by their cable company, phone company, or employer will be just fine. Other people, however, are uneasy with the fact that these email addresses are tied to them personally. Since email can sometimes contain personal, private, even damaging information, these people like the idea of having a private email address that is separate. In particular, people who use an employer supplied email address should be aware that your email can, and often times is, read and even archived by your employer. The basic corporate view is: their bandwidth + their computer = their data.

Q - What information do I need to supply to get an email account?

A - Our goal at Incognify is to provide Internet related services with the highest level of anonymity for our users as is possible for us to do. With the exception of credit card payments (see below) we will not ask for your name, address, telephone number, or even a current email address. We take the privacy of our users very seriously. Our goal is to have zero information that can be used to link any particular person to any particular email account in order to provide the ultimate protection should your email ever be hacked or become compromised.

Q - What payment options do you offer?

A - We currently offer payment by Bitcoin, mail, and credit card, with more options possible in the future. Let's take a moment to look at these three payment methods along with their advantages and disadvantages.

  • Bitcoin - Payment by Bitcoin is quite popular as many people believe it to be an anonymous form of payment. While it is true that Bitcoin is more difficult to link to you than say payment by credit card, it is not impossible. This makes Bitcoin a decent choice as a payment method for those who desire more security and privacy than can typically be achieved via payment by credit card.
    For those who require near absolute privacy and anonymity we offer one such payment method just for you:
  • Mail-in - Using the mail-in option allows you to pay via money order or, for the ultimate in anonymity, cash. The mail-in payment option is ideal for those who want the most anonymity. This method of payment offers the strongest degree of anonymity to keep your important email safe and sound.
  • Credit Card - In addition to the two previous payment methods, we offer credit card payment for convenience, since most people have either a credit card or a debit card. However please keep in mind that payment by credit card does result in a traceable payment trail. In addition, unlike the other two payment methods, during account creation you will be required to supply your name, address and zip code in order for us to process your payment by credit card. Also please be aware that your payment will show up on your credit card statement. For those who simply want a separate email address apart from their home or business address, payment by credit card is a safe and viable option. But for someone looking for an email address to use, say for example during divorce proceedings, we would not recommend this payment option for you.
  • Whichever you prefer, you will have the ability to choose your payment method on the final account setup page.

Q - Do you offer a free service?

A - While we do not currently offer a free level of service, our altruistic desire would be to offer our entire service line to everyone for free. However real life issues such as operating overhead and server expenses preclude us from doing so. If you know of a way to allow us to offer our service for a lower cost - or better yet, for free - drop us a line. We're always open and ready to listen to new ideas, especially those that can benefit the Internet community as a whole.

Q - Is my account truly anonymous?

A - We go through great strides to ensure that your account cannot be easily linked back to you. Without getting too technical, everything that transpires on the Internet contains identifiable information that can be used to trace it's origin. For example, if you send an email from your work account to a friend, that friend, if he wanted to, could open the email in software and view the "headers" of the email. The headers contain information that shows when the email was sent, the name of the account from which it was sent, and from what server or IP address it was sent. A simple Google search could potentially reveal the exact originating source location of the message.

Of course this is a very simplified example, but hopefully the point is clear. Every single email can be traced back to it's origin. It's just the nature of the Internet. And it doesn't take a world-class hacker or government spy agency to do it. With freely available software and a little effort just about anyone can do it.

The question therefore is, how do you combat that?

  Our approach is through isolation.
When you create an email account at Incognify, the email you send and receive through that account is no longer routed through your own home ISP or employer's ISP. It is routed through our servers. Should this email ever be compromised, hacked, or traced, the trail will lead back to our server. And this is where the trail will end, since nothing connects you to our servers. This isolation protects your identity in a way that would not be possible if you were using any service that required you to provide identifying information in order to establish an account. While there are plenty of free email providers - Gmail, Yahoo, AOL, and the like - every one requires you to submit information that can be used to link that email account back to you. Sometimes it's your current email address. Sometimes it's a telephone number. Sometimes it's both.
Why is this a problem?
Some of these companies are notorious for selling their user's personal data for profit. And how often have you heard of these providers being hacked or user data being exposed through various data breaches? Information gathered like this can contain not only your email address, but your full name, birthdate, home address, work address, telephone number, medical information, political affiliation, income, house value, frequently visited places, friends, relatives, etc., etc. All of this information is, in turn, accumulated and cross referenced by other companies in an ever expanding, never ending cycle of data augmentation. This can result in an inbox filled with SPAM and even reveal your identity to unknown and potentially nefarious third parties without your consent. The simple fact is, any type of information you provide is an unnecessary identifier pointing right at you. Incognify is different. Except in the case of payment by credit card, we ask for no identifying information. Not one thing. Nothing. None. Natta.

Q - I want to pay with Bitcoin but don't know how...

A - To be able to pay with Bitcoin you must first have Bitcoins! But how do you get Bitcoins? The easiest and most straightforward way is to buy Bitcoins. If you've never used Bitcoin before it would be wise to educate yourself on the usage of Bitcoin before you purchase some. A good place to start would likely be at Bitcoin.com. There are other sources with information for Bitcoin beginners as well, just do a quick Google search.
Some places, like Wall of Coins and CoinMama make buying Bitcoins relatively painless while allowing you to purchase them with anonymity.
Disclaimer - Incognify is not associated with or endorsed in any way by any of the above-linked sites, and, should you opt to use any service from these links, we will receive no commissions of any kind. We are not recommending any particular site or business; they are presented here for informational purposes only.

Q - What is "End-to-End Encryption"

A - End-to-end encryption is a way of making your email communications safer. Your email account at Incognify supports end-to-end encryption. Whereas the two most commonly known forms of encryption, SSL and TLS, protect the transport connection used to send and receive email, end-to-end encryption encrypts the email message itself.

This end-to-end encryption is necessary because there are weak points along the delivery pathways for email. For example, it has happened that the server used to send or receive an email had become compromised. Once compromised, all email arriving at the server can be intercepted. And because the email has reached it's final destination, the SSL transport encryption has been removed, making every email that arrives clear and visible as it is no longer protected by the transport encryption.

End-to-end encryption is an additional layer of security. It works by providing each party with two sets of "keys" - a long group of letters and numbers. One key, the Public Key, is exchanged between each communicating party. The second key, the Private Key, is held secret by each party and is never shared. All emails sent and received require both the Public and the Private keys in order to decode the message. Utilizing this method of end-to-end encryption ensures the content of the email message is safe, even if a server along the transport route is compromised.

End-to-end encryption is an indispensable security tool that we recommend our users employ whenever possible. Here's how to setup end-to-end encryption in your Incognify email account: