@i3.net / Private Email

@i3.net / Private Email

Your Best Address on the Internet

Getting Started

Internet Privacy

Freedom, privacy and security. @i3.net your Email is uncensored coming or going and anywhere in between.Who has your email username and password: your husband or wife, brother or sister, father or mother, grand father or...

BLOG

Share this:TweetLike this:Like Loading...

Getting Started

<img class="size-full wp-image-1622" src="https://i3.net/wp-content/uploads/2019/03/small_i3_animated_globe5.gif" alt="@i3.net" width="40" height="40" title="Private Secure Anonymous Email 8">
i3.net

Getting started; you know you should take control of your privacy on the internet, the problem is it takes changing your habits. One thing we can all agree on is that no one wants to change their habits. I have a suggestion for an easy  way to get started, create a new you. This is how it works, the new you has no habits as a matter of fact the new you doesn’t have much. No name, no address, no phone, no social security number, no friends, no enemies, no politics, no history. The new you is anonymous. You can hang on to all your old habits and use the new you to explore and move to the private secure internet.

To become real you are going to have to give the new you a name. Your Email address is your name on the internet. What should the name be be? I don’t recommend “jane_doe@i3.net” if that’s your real name try “janed@i3.net” or “j1a2n3e4d5@i3.net” or “flowerpot@i3.net”. The rules for an email address are, all lowercase letters, numbers 0>9 and the only special character allowed is the ( _ ) underscore. This name will be your email address and your username on our system and you will want to use it when opening new accounts for secure services.

Why i3.net, because we meet the highest verifiable standards for privacy and security that there are, we have an A+ rating. Our systems were designed to provide privacy and security from the outset.

From Wikipedia, the free encyclopedia: “The World Wide Web had several differences from other hypertext systems available at the time. The Web required only unidirectional links rather than bidirectional ones, making it possible for someone to link to another resource without action by the owner of that resource.” and “the World Wide Web was non-proprietary, making it possible to develop servers and clients independently and to add extensions without licensing restrictions.”

What that means is that on the internet, anyone using any tool that they possess can enter your system look around take what they want unless you take steps to stop them.

I mentioned habits, we all have them, I am no exception. I have always had private, secure email and I have always known the methods used for data collection and believed that I was insulated from it. In helping to put our system together I learned a few things that I will pass along to you.

After our team developed and tested the @i3.net email system came implementing it. I decided to pretend I knew nothing about internet privacy and security and install it as part of a complete privacy security solution. This is what I did and how I suggest you proceed.

I created an email account @i3.net after I selected my “username”/”email Address” and logged into my account for the first time I read the welcome message sent an email to one of my other accounts back and forth, just testing. Next I installed the Brave Browser my reason being the @i3.net mail system uses a webmail client and rather than erase all the history, cookies, bookmarks and search results from one of the browsers I have been using I would start fresh with a browser that is set up for privacy out of the box.  I followed the  steps in setting up the browser choosing DuckDuckGo as my search engine and using the built in password manager. I also copied my history and bookmarks but not the cookies from my previous browsers. Looking at the results it was obvious I had a much higher opinion of my own practices than the facts would support. I’m going to clean up my act delete my history, bookmarks and cookies on my other browsers, delete some of my old emails and in the mean time use my new email and browser.

This is privacy step one.

Do I need a VPN?
Do I need a VPN? Maybe; A common misconception is that no one knows you are using a VPN. The sites you connect to know...
Read More "Do I need a VPN?"
Phone Apps Breach Privacy
Phone apps breach privacy, few devices know more personal details about people than the smartphones in their pockets: phone numbers, current location, often the owner's...
Read More "Phone Apps Breach Privacy"
Why Private Email
I am often asked: 'Who is the target client for private email?" Who would want public email? Do you need private secure email? Do you...
Read More "Why Private Email"
Privacy Getting Started
You know you should take control of your privacy on the internet, the problem is it takes changing your habits. One thing we can all...
Read More "Privacy Getting Started"

Internet Privacy

Freedom, privacy and security. @i3.net your Email is uncensored coming or going and anywhere in between.Who has your email username and password: your husband or wife, brother or sister, father or mother, grand father or grand mother? Probably not, you want that information away from prying  eyes, you would only give information that sensitive to people you trust, like, Apple, Google, Microsoft, Facebook,Instagram, Twitter, LinkedIn, Comcast, AT&T, Verizon, Sprint, T-Mobile, FIOS, Time-Warner,  people with privacy and data management policies and that you trust completely.

“Surveillance—whether by governments or corporations—chills free speech and free association, undermines a free media, and threatens the free exercise of religion.”

1984, George Orwell’s bleakly dystopian novel about the dangers of totalitarianism, warns against a world governed by propaganda, surveillance, and censorship.

“Companies track your behavior across websites to serve you highly relevant advertisements. Governments monitor every move you make to predict your behavior and control you better. And cyber-criminals leave no stone unturned to steal your data for their nefarious purposes!”

We have been so dazzled by innovations and conveniences available on our phones and computers that we have neglected to read the “Terms of Service”

Everyone is after our data their terms of service tell us to what extent the will go to get it and we always have the option to not use their service or buy their product, if we don’t like it. How can you beat “free”?

It is incumbent on each of us to take responsibility for learning and understanding how internet privacy works and then deciding what step we are going to implement to protect our own rights.

Here are some interesting articles on internet privacy or click here to

Private Secure Anonymous Email 6Federal Trade Commission – Privacy, Identity, Online Security

EUGDPR.ORG
The EU General Data Protection Regulation

 

EU GDPR Compiance

Private Secure Anonymous Email 7Firefox Privacy Notice

Private Secure Anonymous Email 8Internet privacy From Wikipedia, the free encyclopedia

Do I need a VPN?
Do I need a VPN? Maybe; A common misconception is that no...
Read More "Do I need a VPN?"
Phone Apps Breach Privacy
Phone apps breach privacy, few devices know more personal details about people...
Read More "Phone Apps Breach Privacy"
Why Private Email
I am often asked: 'Who is the target client for private email?"...
Read More "Why Private Email"
Privacy Getting Started
You know you should take control of your privacy on the internet,...
Read More "Privacy Getting Started"
Anonymity
Anonymity Anonymity, adjective "anonymous", is derived from the Greek word ἀνωνυμία, anonymia,...
Read More "Anonymity"
What is Email
We have always provided private email in part because we started our...
Read More "What is Email"
Better Safe Than Sorry
Who has your email username and password: your husband or wife, brother...
Read More "Better Safe Than Sorry"
How Secure Is It?
    @i3.net, encrypted end to end and in the middle, we’ve...
Read More "How Secure Is It?"

BLOG

Do I need a VPN?
Do I need a VPN? Maybe; A common misconception is that no one knows you are using a VPN. The sites you connect to know...
Read More "Do I need a VPN?"
Phone Apps Breach Privacy
Phone apps breach privacy, few devices know more personal details about people than the smartphones in their pockets: phone numbers, current location, often the owner's...
Read More "Phone Apps Breach Privacy"
Why Private Email
I am often asked: 'Who is the target client for private email?" Who would want public email? Do you need private secure email? Do you...
Read More "Why Private Email"
Privacy Getting Started
You know you should take control of your privacy on the internet, the problem is it takes changing your habits. One thing we can all...
Read More "Privacy Getting Started"

Private Secure Anonymous Email

Private Secure Anonymous Email. Isn’t it time that you take control of your privacy and reputation on the internet?  Eliminate tracking, surveillance and censorship  Not sure where to start? Start here @i3.net we are now offering private, secure, anonymous email service, email designed for individuals. We’ve been quietly and continuously providing internet services since 1995 as an email service provider and network security consultants.Private Secure Anonymous Email 11

Private, Secure, Anonymous E-Mail at a reasonable cost. With the address you want. @i3.net you’re in control. We don’t collect any personal data, not even at signup, we don’t scan or read your mail, we don’t have your password so we can’t.  Our servers utilize end-to-end encryption, we cannot decrypt and read your emails. All messages incoming, outgoing even messages between fellow users are checked for malicious content, viruses, spyware, spam and known vulnerabilities including whitelists and blacklists, to protect the user and the system. A 40 Gbps network hosting over 400,000 businesses and fast processing combined with multiple firewalls, server backups. Your information lives on our system in your private directory as long as you let it. Only you have  access to it and only you can delete it.

Private Secure Anonymous Email 12
@i3.net mobil

Your connection to our servers is always secure, whether you are connecting from your computer, phone or other device using our native email web client that automatically adjusts for the best view on desktop or mobile devices. Our mail client includes an address book and calendar that share the same privacy and security as the email you don”t have to save your information to the cloud or use an added service to have all of it available on all your devices, it is that way by design, nothing is stored on your devices or in a cloud. Your data is stored on our secure servers in a directory that only you can access.

Private Secure Anonymous Email 13
@i3.net Desktop

Start now by getting your own private, secure anonymous email account @i3.net when you click on the “Create Account” button below or the “Open an Email Account”  link in the left hand column of the desktop site, fill in the email address you want as “name”@i3.net when finalized this will be your email address and your username, then type in and confirm your password, don’t forget your password, we don’t know it we can’t get it, The “Secret Question” and “Secret Answer” fields are used for verification that you are the account holder.  We don’t know who you are. Click on submit and you will be taken to PayPal to complete the transaction. if you get an error correct it and click submit again. A username that is already in use will give an error they are checked in real time, enter your next choice and click submit. You will be charged $30.00 for one year of email service, this service will automatically renew each year until you unsubscribe through PayPal.

After completing payment you will get a message to return to merchant click on it or you will go directly to the login page at mail.i3.net, enter your (username / email address) and password click on LOGIN, if you are asked to save the login save it, and you have completed your email setup. To check your email from any device go to mail.i3.net in your web browser ad enter your email address as your username and password to login. Do not save this login if you are logging in from a device you do not own.

        Private Secure Anonymous Email 14

@i3.net 24 years of continuous operation.

 

©Copyright 2017- 2018 – 2019 ati3.net, LLC., all rights reserved.

 

Getting Started

i3.net Getting started; you know you should take control of your privacy on the internet, the problem is it takes changing your habits. One thing we can all agree on is that no one wants...

Internet Privacy

Freedom, privacy and security. @i3.net your Email is uncensored coming or going and anywhere in between.Who has your email username and password: your husband or wife, brother or sister, father or mother, grand father or...

BLOG

Share this:TweetLike this:Like Loading...

New Accounts

Register

Enter the email address you want as "username@i3.net" this will be your username and email address. Use all lowercase letters, numbers 0-9, Special characters allowed _ (underscore)

  • Strength Indicator
  • OPtional

  • Private Secure Anonymous Email 20

    Paypal (Standard) payment method applied.

Anonymity

Anonymity Anonymity, adjective “anonymous”, is derived from the Greek word ἀνωνυμία, anonymia, meaning “without a name” or “namelessness”. In colloquial use, “anonymous” is used to …