Just discovered this cool project, thought i’d share it here.

AliasVault is an end-to-end encrypted password and alias manager that protects your privacy by creating alternative identities, passwords and email addresses for every website you use. Keeping your personal information private.

Link to website: https://www.aliasvault.net/

Link to source code (MIT Lisense): https://github.com/lanedirt/AliasVault

For those wondering how the alias feature works:

AliasVault includes a built-in email server that allows you to create unique email addresses (aliases) for different services. When someone sends an email to your alias, it’s received directly in AliasVault, helping you maintain privacy and reduce spam.

  • NaibofTabr@infosec.pub
    link
    fedilink
    English
    arrow-up
    30
    arrow-down
    1
    ·
    edit-2
    1 day ago

    Ah, if all of your email aliases trace back to your personal, locally hosted server, of which you are the only user, on presumably your personally owned domain, it will not be private… well private in the sense that it’s just you I guess… but super duper identifiable - because it’s just you. At which point why bother with the aliases.

    • Dark Arc@social.packetloss.gg
      link
      fedilink
      English
      arrow-up
      19
      ·
      1 day ago

      As someone that uses a custom domain for the majority of his email, it’s not really a privacy thing, it’s a control thing.

      I have hundreds of unique unpredictable email addresses and I can disconnect them at will to stop spam.

      • starshipwinepineapple@programming.dev
        link
        fedilink
        English
        arrow-up
        6
        ·
        edit-2
        21 hours ago

        Agreed, though i do think it’s a privacy thing. Many people use privacy and anonymity interchangeably but they are different things.

        The options are:

        • use a single email. If it is leaked you need to update hundreds of accounts or risk falling for a malicious email
        • use a catch-all email and each service gets a separate email, but you can’t turn off receiving mail at a specific address unless you use a sieve filter. This doesn’t stop people from just guessing random addresses.
        • use specific aliases for each service. Idk about this specific project but usually you can turn off receiving mail at an alias. So if a company gets a data breach i just change my email (or close the acct), then i turn off the old alias.

        I did the catchall for a few years but have been doing aliases for 5+ now. In the end, the only people/ companies who have my email are the ones I want.

    • mbirth@lemmy.ml
      link
      fedilink
      English
      arrow-up
      29
      ·
      1 day ago

      why bother with the aliases

      Because once some service “loses” (or sells) your email and you start getting spam, it’s pretty easy to burn that specific email address and change it to something else with that specific service and the spam will stop.

    • Engywuck@lemm.ee
      link
      fedilink
      English
      arrow-up
      2
      arrow-down
      1
      ·
      1 day ago

      A catch-all domain address with whois privacy and hosted elsewhere helps a lot.

      • Tetsuo@jlai.lu
        link
        fedilink
        English
        arrow-up
        2
        arrow-down
        4
        ·
        1 day ago

        Does it?

        Do you think spammer will just stop at the first address and then call it a day?

        In my experience there is no such thing as a “catch all” domain address. The second your domain leaks then many spammer will just go into a frenzy and try hundreds or thousands of mail aliases.

        Especially since they can’t really spam Gmail as easily (since early 2024) they will even more aggressively spam any other domain.

        • Moonrise2473@feddit.it
          link
          fedilink
          English
          arrow-up
          6
          ·
          1 day ago

          spammers they just email info@domain and call it a day, they don’t try to see if you have some custom naming scheme. I bounce all emails sent to that, the rest is catchall, with occasional blacklist to some TLD like .monster .asia .xyz or .su

          • Tetsuo@jlai.lu
            link
            fedilink
            English
            arrow-up
            3
            arrow-down
            3
            ·
            1 day ago

            This is not at all my experience with custom mail domains.

            And I say that after spending a lot of time setting SPF, DKIM and DMARC filtering.

            I guess you got lucky.

            • ShortN0te@lemmy.ml
              link
              fedilink
              English
              arrow-up
              3
              arrow-down
              1
              ·
              23 hours ago

              Why should a scammer or spammer bother with a tech savy person. Scammers and spammers use E-Mail dumps from data leaks to spam and scam ppl. The first step is automated, way more profitable then to go spear fishing on a normal user.

              • Tetsuo@jlai.lu
                link
                fedilink
                English
                arrow-up
                2
                arrow-down
                1
                ·
                23 hours ago

                I’m not sure why people are trying convince me to change my mind on something.

                I have seen it in my logs with my own eyes. I wish I could be left alone without having to bother looking into it.

                Whatever the reason is. Someone is crawling through dictionaries of address. It is slow but steady. It started with abuse@ and other generic addresses and then started trying names. I blocked the sending SMTP server once I realized what was going-on.

                What am I suppose to do? Ignore it and just triage in inbox?

                • ShortN0te@lemmy.ml
                  link
                  fedilink
                  English
                  arrow-up
                  2
                  arrow-down
                  1
                  ·
                  21 hours ago

                  It is just not the way the usual scammer and spammers operate. Ofc there are other types of criminals that do operate differently but those do not get their Addresses from a data leak which E-Mail aliases pretect against

        • Engywuck@lemm.ee
          link
          fedilink
          English
          arrow-up
          4
          ·
          1 day ago

          More than 2 years with my personal domain and I can’t remember a single spam email… But you do you.

  • Tetsuo@jlai.lu
    link
    fedilink
    English
    arrow-up
    18
    arrow-down
    1
    ·
    1 day ago

    I’m a bit skeptical on the Email alias feature but this is a really cool project.

    I just don’t know how practical it is to use custom domains to receive those confirmation emails.

    Wouldn’t you receive a ton of spam once your email domain leaks (which will eventually happen)?

    Email is also useful for password reset.

    • ikidd@lemmy.world
      link
      fedilink
      English
      arrow-up
      4
      ·
      22 hours ago

      I’ve been using a wildcard accept rule on my main domain, and every once in a while one of the made up addresses gets out of hand, I just go in and blackhole it on my email server. I then send a nasty email to the admin of whoever got hacked or sold the address (sending from another bullshit address), as I use unique addresses per signup and keep track of them in my password manager. It seems to have kept my inbox fairly clean since anything to those addresses goes into a side folder.

      Been doing it for 20 years, seems like a good strategy so far.

    • lud@lemm.ee
      link
      fedilink
      English
      arrow-up
      4
      ·
      edit-2
      23 hours ago

      I use a wildcard domain (with simplelogin which makes it easier to use). All the emails are sent to my normal email and it works great.

      I have never heard of spammers spamming an entire domain like that. They are not human operated anyways.