Mastering Email Aliases – A Follow‑Up Primer
February 28, 2026•1,086 words
002 - Mastering Email Aliases – A Follow‑Up Primer
by: David Einslow (a.k.a. - That Private Dude)
Introduction
This is a follow‑up to my previous post, “Refining the Email Strategy of the GOAT.” While that piece dove straight into practical workflows, it did not clarify the terminology that underpins the whole discussion. If you’re new to privacy‑focused email practices, or even privacy in general, consider this a brief glossary and conceptual overview that will help you understand why aliasing matters before you start building your own system. One of the voices that shaped my thinking on privacy is Michael Bazzell.
Who is Michael Bazzell?
Michael Bazzell is a veteran cyber‑security investigator and author renowned for his extreme and thorough guides on privacy, digital forensics, and personal data protection; his books—most notably Extreme Privacy—distill complex security concepts into actionable steps. However, I will caveat that there is a learning curve if you are new. I referenced him because his work epitomizes the “privacy‑first” mindset that underlies the email‑alias strategies discussed in my original post, offering readers a trusted authority whose recommendations lend credibility to the advice while subtly reminding us that safeguarding our digital “front door” is a discipline worth mastering.
Before we dive into the nuts‑and‑bolts of aliasing, let’s clarify two foundational concepts that underpin every privacy decision.
Privacy vs. Anonymity
Privacy and anonymity are often mentioned together, yet they are not exactly the same.
Privacy is the practice of controlling who gets to peek through the windows of your house—deciding which personal details you reveal, to whom, and under what circumstances. It’s about setting curtains, locking doors, and choosing whether to let a neighbor see your garden.
Anonymity, on the other hand, is the art of hiding the very occupant behind those windows; it ensures that even if someone spots a silhouette, they cannot tie it back to your name, address, or any identifying marker. In short, privacy limits what is exposed, while anonymity obscures who is doing the exposing.
With the distinction in mind, let’s translate the terms you need to know when building an alias system.
Core Email Alias Terms
| Term | What It Means in Everyday Talk | Why It Helps Your Privacy |
|---|---|---|
| Email Alias | An extra address that automatically forwards any incoming mail to your main inbox. Think of it as a forwarding mailbox you hand out instead of your real one. | Lets you give away a “mask” instead of your true address, reducing the chance that strangers can link different services together. |
| Custom Domain | A personalized web address you own (e.g., myname(dot)dev) that can host email addresses. | Provides a professional‑looking email and gives you full control over the names you use for aliases. This can be a domain using your real name, and you can have a 2nd domain for aliases not connected to your identity (ex: ilikemangos(dot)com) |
| SimpleLogin | A third‑party service that creates and manages aliases for you, sending the mail to whichever mailbox you choose. | Offers a quick way to generate disposable addresses without purchasing a domain. 15 aliases for free or $30/year for unlimited. |
| ProtonMail | An email provider that encrypts messages from end to end and stores them in Switzerland under strong privacy laws. | Serves as a secure vault for all forwarded messages, keeping the content hidden from prying eyes. |
| Throwaway Account | A completely separate email account (often on a free provider) intended for low‑risk sign‑ups and eventual abandonment. | Acts as a last‑resort safety net when other aliases become unusable. |
| MX Record | A tiny piece of internet “address book” telling the world which server should receive mail for a given domain. | Without it, a custom domain cannot actually receive email—conceptually it’s just “where the mail goes.” |
| SPF / DKIM / DMARC | Technical checks that confirm an email really comes from the domain it claims to be from. | Prevents spammers and scammers from "Spoofing" - sending an email that appears to come legitimately from your custom domain. |
How the Pieces Fit Together
Armed with these definitions, you can now map them onto a practical workflow.
- Identify the level of anonymity you need.
- Full identity (e.g., job applications) → use a real‑name alias on a custom domain.
- Partial anonymity (e.g., forum participation) → employ a generic custom domain with a pseudonym.
- Pure disposability (e.g., one‑click sign‑ups) → generate a random alias via SimpleLogin.
- Choose a destination mailbox.
- For maximum confidentiality, forward all aliases to an encrypted service like ProtonMail or Tutanota.
- This is not a requirement.
- If convenience outweighs strict privacy, a standard Gmail, Yahoo, Outlook, etc. mailbox can serve as the endpoint. Just keep in mind that the companies who provide these email services en masse for free do have the ability to read the contents of everything in your inbox.
- For maximum confidentiality, forward all aliases to an encrypted service like ProtonMail or Tutanota.
- Treat each alias as a compartment.
- When a service starts sending unwanted mail or blocks the address, you simply turn off, via a toggle within your Simplelogin acount, that alias and replace it with a fresh one—your primary inbox remains untouched. You no longer need to go through those "Unsubscribe" links which do not always work.
- Maintain a lightweight inventory.
- A short note (perhaps in a password manager) mapping each alias to its purpose helps you stay organized without diving into technical configuration details.
Why This Matters
You might wonder why those steps matter—here’s the payoff.
- Compartmentalization: By separating identities across aliases, you prevent a single data breach from exposing all of your online activity.
- Control: Revoking an alias instantly cuts off a service’s ability to contact you, without having to change your main address.
- Professionalism: A custom domain can convey credibility while still routing everything through a secure, encrypted mailbox.
- Spam Reduction: Most unsolicited messages land at an address you never disclosed publicly, keeping your primary inbox cleaner.
Closing Thoughts
Understanding the vocabulary behind email aliasing is the first step toward greater privacy. With these concepts in hand, you can decide how much anonymity you require, choose the appropriate tools, and apply the “mask‑and‑forward” principle without getting tangled in DNS minutiae.
As always, privacy is a habit cultivated over time—start with a few well‑chosen aliases, observe how they behave, and adjust as needed. May your inbox stay as uncluttered as a freshly‑cleared desk, and may your online footprints be as faint as a whisper in a library.