Create an anonymous email account - not that easy
An anonymous email account is not only useful for illegal purposes: For example, many journalists want an anonymous communication channel with their informants.
- However, anonymous email accounts are not that easy to create. Because the IP you use can almost always be found out who you are.
- Meanwhile, it is also no longer possible to use the "Tor Mail" service . The FBI had access to this as well. The service was then closed.
- If you value anonymous communication, you should therefore avoid seemingly anonymous providers.
The really anonymous email communication
The best way so far to communicate anonymously and securely via email is to encrypt the emails yourself on your own computer. You should use PGP encryption for this. We have created practical tips for you on how to use them with Thunderbird or Outlook .
- You create the email account used for this with incorrect data with a free mail provider such as Google Mail or GMX. Also, when creating them, they can browse through the Tor Network to hide their true identity. However, you then have to surf over the Tor network every time you send and open the email program.
- Ultimately, its not that easy to write emails really anonymously. However, if you simply want to encrypt the content of the emails, you should use PGP encryption.
- Receive and send your emails completely anonymously with the paid service Posteo . No data is collected during registration. All e-mails and other data are transmitted and stored in encrypted form on the Posteo servers, which means that they cannot be handed over to the authorities. The mail service costs 1 euro per month. You can send the money anonymously by letter to Berlin.
Receive and send emails via other peoples emails
You can solve the problem free of charge and much faster with a disposable email. These are e-mail addresses created in a few seconds, which you can use to send and receive messages relatively anonymously.
- Depending on the provider, you can determine the email address before the @ sign yourself, with some providers it is generated randomly. You will then have access to your mailbox.
- Here you can receive e-mails and also send e-mails with some providers. The mailbox is often deleted again after a few hours. In the following practical tip you will find the best providers for disposable mails .
- You dont leave any personal data yourself, but the messages are not sent in encrypted form and tracking by IP address is not impossible. Also note that some of the e-mail addresses are accessible to everyone, since no password is required to log in.
Tip: Also read how to surf anonymously with the Browser Chrome.
