Using a single email address is like giving hackers, stalkers, and data brokers a universal key to your life. One public email allows strangers to track down your workplace, social media profiles, and hobbies. Without protection, every newsletter signup, contest entry, or gift purchase means that your privacy becomes a commodity and your inbox turns into a trash can full of spam and phishing traps that canβt be stopped.
The solution is Hetman Relay - your personal protective shield. Instead of taking risks, you generate unique, anonymous relays for every service, store, and app. If a store sells your data or hackers attempt an attack, you immediately identify the threat and permanently cut scammers off from your real inbox with a single click. This way, you regain a clean email, unlimited discount codes, and absolute security - you decide who can contact you and for how long.
One reused email can uncover everything. Unique relays reveal nothing.
See Julia's story and how a relay makes their digital life way better.
Secure registration
Phishing attack
Online selling and safety
Free cosmetic samples
Contest or data trap?
Gift shopping
Spam free newsletter
Discount codes
1
Risky Trust
Mark came across an interesting site but felt uneasy about sharing his data. Despite this, he provided his main, private email address just to move forward faster.
2
Open Door
Registration was successful, but from that moment on his private inbox became visible to tracking systems and potential bots.
3
The Shadow of a Data Leak
The trouble started later. A data leak from the service resulted in his main email falling into the hands of hackers, exposing him to phishing attempts.
4
A Trap with No Way Out
Mark realized that he could no longer withdraw his address from the web. His privacy was irreversibly compromised.
5
Constant Uncertainty
Now every registration is accompanied by stress, because he knows that without Hetman Relay, every click is a risk of losing control over his own security.
1
Digital Security
Mark found a new online service, but a red flag went up. Instead of providing his private email, he decided to use a Hetman Relay for full protection of his data.
2
Instant Cover
The process was incredibly simple. Mark created an Hetman Relay that hid his real inbox while maintaining full access to notifications from the service.
3
Anti-Spam Shield
Even in the event of a hacker attack, Mark's real address remains safe. Hackers only get a useless Hetman Relay.
4
Power Over Privacy
When Mark decides he's had enough of the ads or the service becomes suspicious, he can deactivate the Hetman Relay with a single click.
5
Internet Without Fear
Thanks to this solution, Mark freely tests new services without the risk of his identity being hijacked by unauthorized persons.
1
A Costly Mistake
In an alternate reality, Thomas used his main email for everything. When he got a message about "suspicious activity," he believed the bank was writing to him.
2
The Emotional Trap
Acting on impulse, he clicked a fake link and provided his login details, thinking he was saving his savings.
3
Loss of Control
The scammers immediately took over the account. Because they knew his real email and password, they started attacking other services where he was registered.
4
A Nightmare
Thomas lost access to his money and private accounts. One public email address became the key to his entire digital identity for the criminals.
5
Domino Effect
Due to the lack of account separation, a leak from one place ruined his entire security. The scammers knew everything about him.
6
Bitter Reflection
Thomas realized too late: by using Hetman Relay, he would have known immediately it was phishing and saved his savings from theft.
1
Detecting the Deception
Thomas received an email from a "bank" about a supposed failure. The message looked convincingly real, but Thomas noticed it was sent to an address created only for an online store.
2
Instant Verification
Thanks to Hetman Relay, he knew immediately it was a scam - the real bank could not have known this unique Relay. This was proof that data from the store had leaked to cybercriminals.
3
Immediate Block
Instead of panicking, Thomas disabled the Relay with one click, permanently cutting off the scammers from his inbox and preventing further attacks.
4
Peace of Mind
While others fell victim to phishing, Thomas maintained full financial security because the scammers never learned his real email address.
5
Intelligent Protection
Today Thomas knows that Hetman Relay is an early warning system that allows any threat to be identified before it becomes dangerous.
1
A Tragic Mistake
When posting the ad, Ann didn't think about the risks and provided her main email address, which she had been using for years.
2
The Start of Harassment
It started with innocent questions but quickly turned into harassment. Her private email became the stalker's key to her life.
3
Digital Footprint
Using only an email address, the stalker found her workplace, photos, and family profiles online within hours.
4
Fear in the Real World
Thanks to information from the web, the man started appearing where Ann goes daily, showing her that she had lost her anonymity.
5
Destruction of Peace
The aggressor began harassing her loved ones and employer. One email address was enough to destroy the sense of security for the entire family.
6
Bitter Lesson
A terrified Ann realized that without Hetman Relay, her entire life was exposed to the public for anyone who learned her email.
1
Digital Wall
Ann put a camera up for sale, but instead of private data, she used a Hetman Relay as her sole point of contact.
2
Privacy Boundary
When the buyer started acting pushy and asking for personal details, Ann was calm. She knew that the stalker saw only a Hetman Relay, not her real data.
3
Failed Surveillance
The aggressive man tried to track Ann down on social media, but the Relay was not linked to any of her profiles or accounts. It was a dead end for him.
4
Total Anonymity
Even using investigative tools yielded nothing. Hetman Relay effectively hid Ann's identity, location, and last name from the stranger.
5
Cutting Contact
When the situation became unpleasant, Ann turned off the Relay with one click, permanently disappearing from the stalker's radar.
1
A Mistake That Costs
In the second scenario, Meg made a mistake and provided her main email address on the application form.
2
Only One Chance
She received one sample, but her private email was forever saved in the company's database.
3
An Impenetrable Wall
On her next attempt, the system displayed a message: this address has already used the promotion - offer blocked.
4
Burned Privacy
Meg discovered that her email is now "burned" with all manufacturers, closing her path to further tests.
5
Costly Experiments
Instead of free samples, Meg had to buy expensive products blindly, losing money on unsuccessful purchases.
6
Bitter Lesson
Today she knows that without Hetman Relay, you lose access to unlimited opportunities and control over your own email.
1
Smart Choice
Meg found an ad for a luxury serum, but the offer was only available to new customers. Instead of giving up, she used a new Hetman Relay.
2
First Success
After receiving the samples, Meg simply turned off the Relay, cutting herself off from spam and maintaining full anonymity.
3
Repeat Performance
When the company released another new product, Meg created another identity via Hetman Relay to take advantage of the promotion again.
4
A System That Gives an Edge
Because each Relay is seen by the system as a new user, Meg could test products without limits.
5
Unlimited Testing
In this way, Hetman Relay provided her with free access to luxury products while protecting her private inbox.
1
Product Instead of Customer
In the second scenario, Olivia got carried away and provided her main, private email address in the contest form.
2
Full Surveillance
She provided her age, profession, and habits. Her detailed profile was immediately sold to hundreds of data brokers, linking her life to her email.
3
Lack of Privacy
The email address served as a key. Companies tracked down her LinkedIn and Instagram accounts, learning every detail of her daily life.
4
Digital Shadow
Olivia began to be followed at every turn. She received frighteningly accurate ads for loans and vacations she had only mentioned to friends.
5
Irretrievable Loss
She realized that companies knew everything about her. One form was enough to forever lose control over her data.
6
Bitter Lesson
Today Olivia knows: only Hetman Relay could have prevented this digital surveillance and protected her from becoming a commodity in the hands of data traders.
1
The Won Fight for Privacy
Olivia noticed a contest with an attractive prize. Instead of risking her data, she generated a unique Hetman Relay to participate anonymously.
2
Safe Participation
She filled out the form without concern. Using a Relay cut the company off from her real digital identity, protecting her private account.
3
The True Face of "Promotions"
The organizer turned out to be a data broker wanting to sell Olivia's profile to hundreds of companies. However, Hetman Relay made her data useless to them.
4
Dead End for Marketers
Attempts to link the email to her social media profiles failed. Brokers could not track her activity or interests.
5
Peace and Quiet
When ads started arriving, Olivia disabled the Relay with one click, permanently blocking the spam and maintaining full privacy.
1
An Unprotected Inbox
Adam was in a hurry to buy a gift and provided his main email address, which he uses for work and contacting family.
2
Loss of Control
After the store sold the database, his private address fell into the hands of hundreds of marketing firms with no way back.
3
Flooded Inbox
Important messages from clients began to get lost in a sea of jewelry offers. One purchase turned his main work tool into an advertising trash can.
4
The "Unsubscribe" Trap
Attempts to manually delete spam only made things worse - scammers confirmed his address was active and started sending even more offers.
5
The Need for Radical Steps
Adam faced the prospect of changing his email address, which would mean hours of work. Without Hetman Relay, he lost control over his own digital identity.
6
Bitter Lesson
Today he knows that he just had to use a Relay to silence the chaos with one click, which now dominates his daily work.
1
Shopping with a Security Filter
Adam was looking for a gift for his wife in a new store. Instead of risking his privacy, he generated a dedicated Hetman Relay specifically for this one purchase.
2
Data Isolation
He placed the order using the Hetman Relay. As a result, the store never learned his real email address, and he maintained full control over the correspondence.
3
Advertising Attack
When the store sold the database, an avalanche of ads hit Adam's Relay. However, all the spam went through the Relay, not directly to his main inbox.
4
Cutting at the Source
When the messages became tiresome, Adam disabled the Relay with one click, instantly silencing all the pushy advertisers.
5
Peace and Quiet
Thanks to Hetman Relay, his work email remained clean and professional, and he didn't waste a minute sorting through spam.
1
The Subscription Trap
Kate was delighted with the blog articles, so without thinking she provided her main, private email address in the signup form.
2
Loss of Privacy
When the subscriber database was sold, her private email ended up with dozens of marketing firms and data brokers.
3
Unstoppable Avalanche
Kate's inbox filled with hundreds of ads. Clicking "unsubscribe" links only made things worse by confirming to scammers that her address was active.
4
Burned Inbox
Because of one decision, her most important email address became useless and buried in spam that could no longer be stopped.
1
Full Control
Kate found an interesting photography blog. She wanted to receive updates, so she generated a dedicated Hetman Relay just for this newsletter.
2
Secure Subscription
She signed up without worry, knowing that her main email remains hidden from the new owners of the service and potential data traders.
3
Quality Test
When the blog changed owners and started sending aggressive ads, Kate didn't have to get annoyed. Her real inbox can be completely isolated from the spam.
4
One Click and Peace
Instead of the tedious process of unsubscribing, Kate turned off the Relay in the app, instantly and permanently blocking all messages from that sender.
5
Clean Email
Thanks to Hetman Relay, her private inbox remained free of unwanted offers, and she kept her correspondence organized.
1
A One-Time Opportunity
Julia wanted to buy a cream quickly, so she provided her main email address to collect the first welcome discount.
2
End of Promotion
The discount worked only once. On the next attempt, the system was relentless: "This email address has already used the welcome code".
3
No Room to Maneuver
Unsubscribing and signing up again did nothing - her real email was forever marked in the database as a customer who had already "used up" the promotion.
4
Paying Full Price
While others took advantage of deals, Julia had to overpay for every subsequent product because her identity in the store was already burned.
5
Lost Potential
With every purchase, Julia lost money that could have stayed in her pocket. Without Hetman Relay, every "new customer deal" was unavailable to her.
6
A Lesson in Saving
Julia understood her mistake: by using Relays, she could save on every purchase instead of limiting herself to one discount for a lifetime.
1
Unlimited Discounts
Julia found a dream cosmetic set and a banner: "20% discount for new customers". Instead of wasting her only chance, she generated a Hetman Relay to receive the code as a new user.
2
Smart Shopping
After shopping, she turned off the Relay, avoiding spam but keeping the discount in her pocket. Her main email remained "clean" for the store's system.
3
Discount Encore
A month later, for her next purchase, Julia created another Relay, again gaining new customer status and another 20% discount.
4
Financial Freedom
Because the store saw each Relay as a completely new person, Julia could use welcome promotions with every order.
5
Hundreds of Dollars in the Wallet
Over a year, Hetman Relay allowed her to save hundreds of dollars, giving access to unlimited discounts that are one-time-only for others.
See how it works, interactively.
See for yourself how the Hetman Relay works. Click the "Your email address. (Click)" field to begin.
Fri, Feb 06 08:40:45 AM
Your mailbox
Received (3)
Sent (3)
Folders
Settings
Mailbox: thomas.taylor@example.com
Cinema
New in cinema
14:12
Boss
Quarterly report
11:15
Neighbor
Request to repark
09:06
Website for buying shoes
Create an account to purchase.
First and last name.
Email address.
1. Create a new relay
Instead of your real email, you enter a unique relay in the form. This prevents activity tracking and stops third parties from linking your accounts across various services to your true identity.
2. Receive messages
Messages go straight to your regular inbox, where you can safely reply. The system masks your data, so your real address remains hidden, even during long-term correspondence.
3. Maintain full control
If a service starts harassing you or suffers a data breach, simply disable the relay. This permanently blocks contact and prevents anyone from easily linking your profile to other accounts online.
Full comfort and simplicity.
Use our dashboard on your computer and smartphone, the extension with automatic relay detection, and the PWA app, which you can save to your smartphone's home screen.
We offer simple solutions for every platform. Click any button above to see the available solution!
List of features.
Secure, easy, and flexible relays management - built by someone who values your privacy.
Security
While you already gain a lot of security through relay concept, we also ensure that your data is safe and your emails are securely transmitted. We encrypt your data both in transit and at rest using AES-256. Your data is stored in the EU. Every email that passes through our servers is handled only in memory and is never read by anyone.
Configuration
You can personalize your relay by setting a name, managing where emails are forwarded, and scheduling tasks like auto-deletion. Control reply ability and even use your own domain.
Easy of use
While we offer many configuration options, we understand that not everyone wants to spend time on setup. That is why you can create a ready-to-go relay in just two clicks with settings pre-configured by us. If you do want to customize it, the configuration process is simple and user-friendly. We also have an intelligent generator that creates random, easy-to-pronounce relay email addresses.
Flexibilty
Quickly change the forward-to address, disable or enable your relay, or even decide the lifespan of your relay. Create new relays or forward-to addresses anytime.
Extension
We offer an extension to all our users that automatically detects whether you are using relay on a specific site. The extension also automatically detects all input fields where you can use an email address and suggests generating a new relay easily.