Today, anonymous file transfer between users is the essential part of their personal data security system. Usually, users have to install additional complex software solutions to organize a virtual data channel for safe data transfer via emails. However, if you want to protect yourself from intruders, it’s enough for you to hide your IP address and use disposable mail instead of your real mailbox. Disposable mail helps you to hide your real personal data because you needn’t perform any registration process and submit your personal data.

Disposable mail service is available for any user and doesn’t require any special configuration. Just open  and you’ll get an access to disposable mail’s admin panel without any registration.

get a disposable mailbox immediately without any registration

Disposable mailbox is easy to use. Your temp mail address is displayed at the top of the page ) in our example - Disposable mailbox is valid until user deletes or changes it using special control buttons on the admin panel. If you close your browser or restart your computer disposable mailbox remains valid – just open again and you can use your last mailbox.

The list of the incoming messages hasn’t automatically update function, so use button “Refresh” to read new incoming mails. Incoming messages are available only for 60 minutes, then it’ll be deleted.

Here are some examples of using temporary mailboxes for anonymous file transfer between users.

Example 1.
User 1 sends file directly to user’s 2 disposable mailbox. As incoming messages are available only for 60 minutes, it is necessary for uses to use some messenger to control file transfer process. In that case, intruders can identify user 2 as file recipient.

Example 2.
User 1 uploads file to sharing server and sends corresponding link to user 2. At any convenient time, user 2 can use special web service to send this file from server to his disposable mailbox and then download it from this mailbox.
In that case, users needn’t to communicate to each other while transferring file and user 2 doesn’t disclose his real IP-address and email, so intruders can’t identify user 2 as file recipient.

Example 3.
User wants to download some file from web anonymously. He can use any web service to send this file to disposable mailbox instead of organizing complex safe communication channel. In that case, intruders can’t identify user as file recipient.

It should be noted that messages with attached files downloaded from disposable mailbox are in *.eml format, so you have to use some email client software to extract files from it, such as Outlook or Thunderbird. Just download message to your device and open it in Outlook, then save attached file to your hard drive.

There are a lot of other examples of using disposable mail for anonymous file transfer. Ultimately, disposable mail can help you to maintain an adequate level of anonymity and can be an effective tool to  protect your personal data from intruders.
Scroll to Top