How to Set Up An Email Alias – #SolutionsWatch

by | Aug 6, 2025 | Solutions Watch, Videos | 30 comments

What is an email alias, why might you want to use one, and how do you set one up? Find out in today’s important edition of Solutions Watch with special guest Hakeem Anwar of Above Agency.

Video player not working? Use these links to watch it somewhere else!

WATCH ON: ARCHIVE / BITCHUTE ODYSEE / RUMBLE SUBSTACK/  or DOWNLOAD THE MP4


SHOW NOTES

Data Leak at Corbett Report (and Many Other Sites)!

Pi-hole discloses data breach triggered by WordPress plugin flaw

GiveWP Privacy Incident: What Happened and What’s Next

Fairy Tales and Children’s Stories – #SolutionsWatch

Salting Your Data – #SolutionsWatch

Above Phone

Take Back Our Tech – #SolutionsWatch

Why Aren’t You Using XMPP? – #SolutionsWatch

AnonAddy

30 Comments

  1. I’ve been using Proton’s email alias function. I like that I can have endless aliases and a nice interface to manage them in; but I do not like that there is no way to export that information into a CSV file or other usable format in case I’d like to switch to a different alias provider.

    Proton, like all other tech companies, is getting pressured to open the door to government overreach and surveillance. My email functionality, for zero reason, has been flagged twice for ‘suspicious activity’ when I have done nothing. Their support in both instances said they were working on that piece and apologized that I lost all access to email for a whole day each time. VERY Annoying what has become of the Dark Internet. I HIGHLY recommend TruthStream Media’s Bitchute video from 2022 on Where did the rest of the internet go?: https://old.bitchute.com/video/6zyJB45ewvU/

    • Hi Hakeem here,

      Proton was funded by Charles Rivers Ventures, ontop of $300K they raised from their CrowdFund, where they said they would never accept external funding. Take a look at what other types of companies CRV funds, and the people involved.

      This is why we at Above never accept any funding that would give a third party influence over our company. Its a truly grassroots company.

      As to your email being flagged, that will tend to happen with smaller providers.

      • Hi Hakeem… It has gotten increasingly–actually-pretty-much–impossible to tell who the “good guys” are in this world, and most lately in the world of tech. Even the devil can quote scripture in entirely convincing ways, and that energy is far more pervasive than anything nowadays. We live within a system where every labor is basically sacrificed to the system as we struggle to keep our heads above water… earn money or die. I mean no disrespect, just saying…

  2. For those that don’t want to mess with key pass or other online services…..the chap at the end had the right idea.

    Create a new email with free email like protonmail or tutanota

    Sign up to one chosen site or list with the new email from Protonmail or Tutanota.

    Create a password for new email (using a mix of capitals, small letters and signs ( [#%^*+= ect) and write it on a note card….. as the chap says, a sentence is cool, like “I Love The Corbett Report 100* and a STAR of 27FlOWERS @my house” including caps and small and symbols and numbers…..write the password on a note card so you have it near your PC.
    (The NSA will probably not break into your house to find it. Burglars won’t care.)

    Use one email for one site account and nothing else…..be sure to delete (properly) any payment receipts so when it’s hacked they don’t find said receipt

    Use a DEDICATED BROWSER (there are lots of browsers ) for that one email / site signing so if someone gets your browser data (because your dumb and save your password to the browser ) they just get that one email that does not have your real name and delivery address in it…browser saved passwords are for dummies.

    • Head-up on Tutanota:
      They completely disable your account if you don’t login for 6 months.
      I lost a lot of accounts because of that bullsh*t.
      There was a way to pay to regain access to an account. I don’t know if they still have it though.

      Proton is following their lead.
      As of right now, I think they just delete your E-mails after a year of not logging in, but they have already reserved the right – in their policy – to disable the account after a year of not logging in, and it’s likely that’s what they’ll start doing (if they haven’t already).

    • Good strategies, which would be easier managed using a password manager like KeepassXC and email aliases rather than making dozens of email accounts.

      • Yes, they would be easier to manage but also much easier to comprise.

        If I have a web email that I use for one thing then if someone hacks the provider they can see what’s in each individual account, but there is no reason for them to know that “Leviburn@xxxx” is in any way related to “OMGyoukilledKenny@xxx” unless I send an email between them.

        Compartmentalisation appears stronger to me, even at the cost of Ease of use. What you showed us looks very easy to use though TBH picking up a card and logging into a web mail every now and then doesn’t appear all THAT hard to me.

        I don’t know how hard it is to hijack keypass….but I do know it’s a lot harder to come to my house and look at my note cards with my logins and password.

        It’s a lot harder to lose my cards then it is to have a computer meltdown on me and lose online credentials.

  3. Hi, has anyone looked into purism? They even offer thin clients. Is anyone using Vivaldi browser? I like the implementation of rss feeds, however, I discarded the idea because the integration of proton mail needs a bridge.

    • “….integration of proton mail needs a bridge…..”

      If your focus is privacy then you DONT want stuff integrating wiyh other stuff…that’s why IMO it’s better to keep your passwords and login details on a set of note cards by your computer then a password manager…..unless your interesting enough for someone to break into your house to get them they should never be stored on a device.

      Hell, you could even “encrypt” then with a letter shift to throw off casual snoopers….say the third letter is always $ and you just don’t write it down.

      Nothing online is truly secure so I don’t want my stuff talking to my other stuff when one of them has spyware or whatever…..The same with having one browser to browse and one to do emails with….its a PITA but it’s also got less cross tracking if everything you do online.

      If you can’t afford more computers you can run them in Virtual Box and any cookies, ect, are only on that instance.

      I used Vivaldi but it was kinda rubbish back then. Maybe it’s better now? It came skinned ti look a bit like the Apple browser iirc. Does it work good for you?

      As to purism- their stuff looks nice but it’s just as easy (and much cheeper) to just install Linux on your own laptop or build a PC yourself for way less money….their phones look kinda pricey and if all I want to do is make a call or hotspot a bit on it I would probably just buy a Pine Phone for a couple of hundred bucks (when my current phone dies I probably will)

      I am sure purism has more powerful phones….but really phones are a POS platform for doing anything but consume media on so personally I don’t need a super fast one

  4. If the fundamental tools of deception are the encouragement of FEAR and a belief in SCARCITY as I repeat a lot out here, then any concern AT ALL about choices made in communication should be based out of functioning ability ’cause you KNOW the energy used to avoid the controllers is a waste. The controllers, DARPA, etc. are so damn far ahead of people technically it is like child’s play to them. Plus it is for sure some sort of psychological nonsense of thinking one is sooo important that “they” are coming after you. They are coming after EVERYONE!

    And of course the BIGGEST thing of all is get off the web as much as you can and do your communication and business face to face or don’t cry about how scary it is ’cause it IS your choice, everything is your choice. I use BitChute and Proton. Two excellent services with no indication of ANY intrusion and nanny state activity.

    When you spend a lot of time and effort trying to avoid what you think is avoidable, THAT is part of their game. To take you off track and get you to engage is fear nonsense. Get to know yourself, your loved ones. Inner exploration is far more important then pop culture tech knowledge.

    Here is a 2fer of Brain Food for ‘yal 🙂

    WHO ARE YOU (song)
    https://old.bitchute.com/video/4qQvl1sCbUhf/

    GET OFF THE PHONE (song)
    https://old.bitchute.com/video/2QbsxZOkIYjA/

    • EJ Doyle
      Well said . It’s pervasive. I had the displeasure of watching my neighbors house burn to the ground this last January . It’s too late for introductions at that point in time. Privacy is weighed in the balance of being too nosey around here. Common sense is lacking at times.

      • @gbw
        Thanks.
        I’ve lived here out in the country for 10 years now and still don’t have any contact with folks down the road. People here are intentionally reticent about contact with others by choice, that’s why they are off grid on acreage. I imagine the urban scene is even worse.

        From my perspective it is all about the agenda of the controllers to divide and conquer us. Bret Weinstein has an interesting perspective about what he calls the “mental multiverse.” The basic idea is one’s head get filled with all the yin/yang polarities from where you put your attention be it favorite sports teams, politics, etc. You start carrying a lot garbage loosing room for the good stuff.

        This of course is amplified through all the digital media choices folks make. I’ve said here before, I had no TV or movie experience for 50 years until 2016. Didn’t know who Trump or even Tom Brady were. Just made different choices in where I placed my energy and interest.

    • Hi Hakeem here,

      Proton was funded by Charles Rivers Ventures, ontop of $300K they raised from their CrowdFund, where they said they would never accept external funding. Take a look at what other types of companies CRV funds, and the people involved.

      The privacy movement and companies have been infiltrated since the beginning. Snowden was a government contractor, Tor was created by the Navy … etc

      We need to move past just recommending the one alternative company we’ve heard about and dig deeper.

      • @Hakeem
        I stated about my experience. Wasn’t “selling” anything.
        As I said to generalbottlewasher above about Bret Weinstein’s “mental multiverse” theory, for decades I have made quite different decisions about what I put in my noggin.
        I really don’t care who funds what. From 60 years of authentic alternative living and activism I have come to understand I can only affect my immediate life experience. It is a waste of time hording lots of this and that facts which only overload one’s “Hard Drive.”
        In one of my songs I say about Internet folks…”Everyone’s an Einstein till they’re not.”

  5. high strangeness
    ‘How can I be the only one who’s noticing this or talking about this’
    I’ve been frequently encountering that situation in recent years.
    I think we’re catching glimpses of something profound that needs to be formally identified.

    leaks
    I’m increasingly wondering if they’re often not accidental leaks or hacks at all but rather a means of putting everything out in the open (end-of-privacy agenda), or transporting information to the intelligence community (or the WokeHackers headquarters) in a way that permits plausible deniability for the entity that held the data (“oops, I forgot to change the default router password, my bad”)

    addy.io
    Just keep in mind that it’s a crapshoot whether or not this service will be gone in a couple years, at which point you could end up permanently locked out of accounts that you used the addy.io addresses to sign up with (especially with how frequently websites are now demanding the reception & submission of identify confirmation codes sent to your E-mail address).
    Additionally, though the addy.io software is open source, their server isn’t. You don’t know for certain what they’re actually running on their server or whether or not it’s reading your mail before forwarding it. That’s not a big deal though – you take that same risk with all the E-mail services. I only mention it for those who might think the E-mails are magically relayed using a process that doesn’t permit reading.
    I’m not saying to not use addy.io – just giving some info.
    Lastly, as a general reminder (in case GiveWP didn’t make it clear), never let your guard down when you see the term “open source”. Just because it’s open source doesn’t mean trustworthy people are diligently checking the source for malicious code, nor does it mean that the people checking the source have the ability to identify cleverly constructed malicious code that appear harmless, or exploitable code that appears unexploitable.

    • more salting
      When paying for things online, you don’t have to give your real full name in your billing info. You can just give initials (or the first two letters of your first & last name in some cases).
      Nor do you have to give a real phone number. I’ve never in my life provided a real phone number in my billing info.
      For the street address – unless you’re buying physical goods that need to be shipped to you – you can just put your street number and the first letter of your street name. Not only is this good for privacy but also makes it harder for them to sell your data (it lowers the data’s value).
      You can also use deliberate distinct minor misspellings of your name or address to help you identify who sold your data (if they sell it). eg, instead of John Doe, put Jon D, then if you receive junkmail for Jon D you can determine who sold your info.
      I usually provide the real postal code but you can try swapping two of the numbers. If it doesn’t work, just swap them back and try again.
      Also check if your card provider has a virtual card number service, or maybe even sign up for a card that does. It works like this: You generate a virtual card number (tied to your real card account) on the providers website which can be set for things like one-time use, capped total balance, daily limit, expiration in 30 days, etc. That way thieves never get your real card info, and they can’t do much, if anything, with the virtual info.
      Have free catalogs & such sent to fake names at your address to throw off people-finding services & websites. You can also use your real last name but a fake first name to break family/association tracking algorithms. eg, have things sent to Mrs. Jenifer Doe, even though she doesn’t exist, in order to make the algorithm uncertain about which John Doe you actually are, and to make Googling snoopers (eg, creepy co-workers or old classmates) uncertain as well.

      passwords
      Use 16 characters or less for normie websites (eg, Yahoo).
      I’ve permanently lost access to a couple of accounts because the sites switched from a system that allowed 32+ characters to one that only allowed 16 character, so my passwords no longer worked (because their new login password field rejected all characters beyond the 16th).
      16 is the most common limit but I have seen a 12-character limit once.
      Another reason to use software for entering your passwords is that it prevents keyloggers from getting your passwords from your keystrokes (should you somehow end up with a keylogger on your system).
      If you’re copy-pasting your passwords (eg, from an encrypted text document) be warned that it is possible for a website to read clipboard data. The browser is supposed to prompt you but that may or may not be reliable. Also, you might accidentally click Allow instinctively since the prompt can resemble other harmless prompts. I guess this is just more of a general warning about what you leave on your clipboard.

      • Animals
        “….Have free catalogs & such sent to fake names at your address to throw off people-finding services & website….”

        Yes, but watch out with that in case someone else tries to use your address…..I once had a package with MY address and someone else’s name in it come to my door. I didn’t want his name at my address on file.

        The owner got very upset when I would not let him have the package and sent it back because I didn’t want him establishing residency for a credit card or something like that at my address…..the package (which I opened with out looking at the name) held a VERY embarrassing item- which IMO is a good way to make the recipient want to fix the matter as fast as possible and just give it to him.

        • wtf? This was a complete stranger? Did they claim they accidentally sent it to your address?

          • He lived close by but his address was not similar to mine…..he was a very large black guy who shouted a great deal and waved his arms, lol. He never explained what happened and just saying “they” delivered it to the wrong house (even though it said my address on the label)

            Since I am a rude ass in real life as well as online I told him not to send stuff to my address and he wasn’t getting his package ,and we sent it back with “NOT at at this address”.

            I suspect he was planning to porch pirate the package, which ment he had not done his homework on us.

            He appeared to be used to getting his own way in such things, trying to play on embarrassment at what he’d ordered (lololol, I’ve seen worse) or chimping out and making threats (I’m not a particularly big chap but he wasn’t looking for irl violence )

            I checked him out and didnt find a (serious) criminal record, but did find pics of the inside of his rental place.

            This was a few years back, but it did drive home how much data people leak.

            • I think that was probably the smartest course of action.

              The only thing I would have done differently is claim that I had already shipped it back, rather than risk covert retaliation. Absent that option, I would have said something like “This is just too weird for me to get involved in. I have no choice but to send it back. Don’t take it personally – I’d do the same thing if you were anybody else.”

              I like your rudeness/courage in this situation though.

              I would’ve liked to have had you as a neighbor during the scamdemic.

    • addy.io is a large service and I don’t see any reason why it wouldn’t be around in the future.

      Also – the server software is open-source, that’s why you can run it for yourself at home. It needs to be ran alongside your own email server.

      No, you can’t 100% verify it just like any other software provider, but letting it be self-hosted goes a logn way.

  6. I’ve had a start mail account since they launch start mail. I first heard about them in a 2013 Corbett report interview about start page privacy search engine. I have only just recently even looked at their options and they offer the use of alias emails. I would have thought this would be something more on my radar but I never thought about it until this solutions watch. I’ve usually just made burner emails to sign up for spam nonsense if I think that’s what’s going to happen.

  7. This sounds important. I sure wish I could understand and follow exactly what/how to proceed. It’s too techno for me.

    • Danny

      If it’s too technical just

      1) create a bunch of accounts off free email providers….never out your IRL name on one.
      2) write your login and password down (since you will have a few and if you loose them your SOL)
      3) only use one email per website when you sign up to them…so all you get in that email box is from one site- spam is easy to spot since you shouldn’t get anything else.

      This chaps demo was pretty good in that you don’t need to sign in to lots of accounts. It’s not vital to do though.

  8. I like Hakeem Anwar. He is funny! Very witty. Anyways, this is a very helpful solution that I didn’t know about before.

  9. Multiple hits as a result from a leak in Citrix software in the Netherlands, Public Prosecution Service affected a few weeks ago!

  10. Data leak at Dutch research laboratory, in this case for cervical cancer. Research results of five hundred thousand women! Starting point of a pattern?

  11. The best and most fun solution is to buy a domain and host your own website with email. You can even host it on a computer at home. It’s really not that hard.

  12. Thanks James! This is one of the best Solutions Watch yet. Keep up the good work. Kindest regards; be of good cheer!

Submit a Comment


BOOK

Buy REPORTAGE, the new book by James Corbett

RECENT POSTS


RECENT COMMENTS


ARCHIVES