Your Temporary Email Address

Forget about spam, advertising mailings, hacking and attacking robots. Keep your real mailbox clean and secure. Temp Mail provides temporary, secure, anonymous, free, disposable email address.

Refresh Change

Reviews and comments of service Temp Mail

Temp Mail service is not just a one-off designed project. Temp Mail has ambitious plans to further improve its service.

We strive for the ideal in order to achieve as close as possible perfection. Your suggestions and comments are very useful. We take everything into account and implement useful suggestions into standard practice.

Do you like our anonymous e-mail service? You can suggest our service to other users in a reviews. If you can think of ways to assist us to achieve perfection, your comments will allow our joint efforts to make the service more convenient, user friendly, and meet the needs of other users requiring a temporary email address

We invite you to help us to improve our services. We offer you the most secure anonymous email and most comfortable user interface.


Popular Articles

  • How to register anonymously on The Pirate Bay using Temp Mail disposable email

    The Pirate Bay is the world's largest torrent site, visited by more than 4 million people every day. Although it has repeatedly been targeted by copyright holders, the site has managed to stay afloat. Moreover, the torrent tracker continues to develop successfully, and the number of torrentundefined

  • Anonymous file transfer using disposable mail

    Today, anonymous file transfer between users is the essential part of their personal data security system. Usually, users have to install additional complex software solutions to organize a virtual data channel for safe data transfer via emails. However, if you want to protect yourself fromundefined

  • Who and How Uses Disposable Email Addresses?

    Giving away your personal information, such as your email address, when using the Internet is not always the best strategy. Email is something that the majority of people use on a day to day basis, but there are also a number of situations when a disposable email address can be extremely heundefined

  • Torrents, security and Temp Mail Service

    Torrent trackers offer a plethora of software, films, series, games, music, to name but a few, and they are still operating despite extensive efforts to block them in many countries. Some torrent trackers flourish and bring generous income to their founders, from advertising and other sourcundefined

  • How to protect your online business

    Nowadays, it is rather difficult to conduct business without participating in the life of the Internet community. Any credible organization or entrepreneur has an Internet page for quick connection with customers and selling products in their own online stores. As a rule, payment is carriedundefined

  • What is ransomware. The differences between ransomware and viruses and how to protect yourself from ransomware

    As technology actively develops, intruders use ever more sophisticated methods of stealing our  money. We often get short messages to the mail or mobile device with links to some photos or programs that may "interest us", but, in fact, are viruses that get control over our mobile device or undefined