How It Works
The system creates alias email addresses and associates each one with a true email address and a validated source—a specific website, domain, individual address, group of addresses, or geographic location. When you sign up for a service or give out an email address, you use a unique alias tied to that specific source.
When an incoming message arrives at an alias, the system retrieves the recipient information, matches it to the alias, and checks whether the sender is from the validated source associated with that alias. If a message comes from an unexpected source—someone other than the website or service the alias was created for—the system knows the alias has been leaked, sold, or compromised.
The architecture includes an Account Holder Message System (your real email), an Alias Manager (which generates and tracks aliases and their target website associations), and Target Websites (the services each alias is associated with).
What Makes It Different
- Source validation: each alias is associated with a specific validated source (website, domain, address, or location), and incoming messages are checked against that association.
- Leak detection: if an alias receives mail from an unauthorized source, the system immediately identifies that the alias has been compromised or shared without permission.
- One alias per service: creating a unique alias for each website or service makes it clear exactly which source leaked or sold your address.
- Perimeter interface: the alias system acts as a perimeter between your true email address and the outside world.
Why It Matters
Every time you give a website your email address, you lose control over where that address ends up. This technology makes that problem solvable—by giving each service a unique alias and then validating that only the expected source sends to it. When an unauthorized sender reaches an alias, you know exactly which service leaked your information.