Using one email address for all services makes it easier to piece together your online activity. In the event of a data leak from even one site, it makes it significantly easier to link your address to your other accounts. This allows hackers and corporations to track your behavior across different platforms more easily and create detailed profiles about you.
The solution is email relays. You generate a unique address for each site, which forwards messages to your primary inbox. When a data leak occurs or you start receiving spam, you simply disable that specific relay. This prevents your accounts from being linked and effectively blocks unwanted messages. This solution also offers many other practical benefits.
One reused email can uncover everything. Unique relays reveal nothing.
See Julia's story and how a relay makes their digital life way better.
Simple registration
Phishing attack on a bank account
Cyberstalking
Free cosmetic samples
Prize competition
Online shopping
Newsletter subscription
Discount codes
1
New registration
Mark wants to use a new online service. The website looks good, but giving his main email address makes him uneasy. He wishes he had used Hetman Relay.
2
Risk on the horizon
Mark registers using his real email address because he wants quick and uncomplicated access to the service, not realizing Hetman Relay would have been faster and safer.
3
Possible consequences
If there is a data leak or hacking attack, Mark may face a problem - his main address is known, along with the potential risk of privacy and security breaches that Hetman Relay could have prevented.
4
Lack of control
There's no simple way to withdraw his address or cut off potential threats. Mark remains at the mercy of possible problems that Hetman Relay would have solved.
5
Uncertain future
For future registrations, Mark keeps wondering whether to give his main email again, because the risk still exists. He considers trying Hetman Relay next time.
1
New registration
Mark wants to use a new online service. The website looks good, but he's not sure if giving his main email address is safe. He decides to use Hetman Relay for protection.
2
Quick solution
Instead of taking the risk, he uses Hetman Relay, a email address that forwards messages to his real inbox. He registers quickly and without problems.
3
Protection from data leaks
If there were a data leak or a hacking attack, Mark's real address would remain hidden and safe thanks to Hetman Relay.
4
Full control
In case of problems, Mark can easily deactivate the Hetman Relay address, protecting his privacy and security.
5
Safe internet use
For subsequent registrations, Mark again uses Hetman Relay. He knows this way he can use online services without unnecessary risk.
1
Alarming email
Tom received an email on his main address, supposedly from the bank, warning about "suspicious activity" on his account. The email looked professional and contained the bank's logo and his personal data.
2
False sense of urgency
Worried, Tom clicked the link in the email, which led to a site identical to the official banking portal. Under time pressure, he entered his login, password, and phone number, not noticing subtle differences in the URL.
3
The trap closes
Scammers immediately used the provided data. Within minutes, they tried to log into Tom's real account and initiate suspicious transfers. Tom's phone began receiving SMS codes for authorization.
4
Panic and chaos
Tom noticed unauthorized login attempts and transfers on his account. In a panic, he tried to contact the bank, but it was already nighttime. The scammers had all the necessary data - his email, password, and phone number - which Tom also used in other services.
5
The damage multiplies
Using the same email address and similar passwords, the scammers tried to take over Tom's other accounts. Since he used the same email everywhere, they could easily link his activity across different services.
6
Consequences of lacking protection
Tom spent the entire night blocking cards, changing passwords, and contacting the bank. He realized that if he had used Hetman Relay, the scammers wouldn't have known his real email address and couldn't have sent him such a convincing phishing email with his personal details.
1
Suspicious email
Tom received an email on one of his Hetman Relay addresses, supposedly from the bank, informing about "suspicious activity" on his account. The message looked authentic, but Tom noticed it came to an address he had never given to the bank.
2
Recognizing the scam
Tom checked in the Hetman Relay app what purpose that particular relay was assigned to. It turned out he had only used it for registering at an online store. He immediately realized it was a phishing attempt - the real bank could not have known that address.
3
Taking control of the situation
Tom disabled the Hetman Relay in the app to prevent further scam attempts on that address. He then reported the incident to the bank via an official channel, warning them about fake emails.
4
Security verification
Tom logged into his bank account through the official website. Everything was fine - no suspicious activity. He could sleep peacefully, knowing the scammers didn't have access to his real email address thanks to Hetman Relay.
5
Lesson for the future
Tom sat down with a coffee, pleased with his Hetman Relay protection system. By using different relays for different purposes, he could easily spot the scam and maintain full control over his financial privacy.
1
Online sale
Anna listed her old camera on a classifieds platform. In the listing, she provided her main email address for contact. One of the interested buyers began asking strange, personal questions.
2
Disturbing signals
The man wouldn't stop messaging, despite a clear refusal to sell. He began sending increasingly intrusive messages, trying to get information about Anna's home address and lifestyle.
3
Digital detective
The stalker entered Anna's email address into search engines and OSINT tools. Within hours, he found her social media profiles, photos, workplace, favorite spots, and even the names of her family members.
4
Real-world trail
Using the gathered information, the man began showing up in places Anna visited. He knew her routine, workplace, and favorite cafés. He started sending her photos to show he was watching her.
5
Escalation of fear
The stalker began contacting Anna's employer, her social media friends, and even her family, impersonating different people. He used all the information he had found through her email address.
6
Loss of safety
Anna sat terrified at home, realizing that one email address in the listing had revealed her entire life. She had to change her routine, consider changing jobs, and felt constantly watched. Her digital privacy was completely compromised - something Hetman Relay could have prevented.
1
Online sale
Anna listed her old camera on a classifieds platform. One of the potential buyers started asking strange, personal questions through messages on the platform, but Anna used only her Hetman Relay for contact.
2
Disturbing behavior
The buyer wouldn't stop messaging, even though Anna clearly refused the sale. He began sending emails to the Hetman Relay address from the listing, trying to extract more information about her and her location.
3
Escalation of harassment
The man became aggressive and started making threats. He tried to use the Hetman Relay email address from the listing to find Anna's other social media accounts, but the relay was not linked to any of her real online activity.
4
Identity protection
The stalker tried various search methods - entering the Hetman Relay email address into search engines, checking leak databases - but the relay revealed no information about Anna's true identity.
5
Quick resolution
Anna disabled the Hetman Relay with one click in the app. The stalker lost his only way to contact her, and Anna could feel safe knowing her real identity remained hidden.
1
Tempting offer
Maggie was browsing Instagram and saw an ad from a luxury cosmetics brand offering free samples of a new anti-aging serum "for new customers only." Without thinking, she gave her main email address.
2
Only samples
Maggie filled out the form and received the samples. After a week of testing, she knew the product wasn't for her, but she wanted to test other cosmetics from that brand.
3
System refusal
When Maggie tried to order samples of a new line from the same company, the system recognized her email address and displayed the message: "This address has already received free samples. Offer available only once per customer."
4
Restrictions everywhere
Maggie tried to order samples from other cosmetics companies, but everywhere she encountered the same limitations. Her email address was already "burned" - every company remembered that she had already used the promotion.
5
Expensive lesson
Maggie had to buy full-size cosmetics to test them. Most did not meet her expectations, and the money was wasted. She regretted not being able to use Hetman Relay for multiple free samples.
6
Lost opportunities
Maggie looked at free sample ads, knowing she could no longer take advantage of them. One email address had limited her to one-time promotions in each company. Her opportunities to test new products were permanently restricted - something Hetman Relay could have solved.
1
Tempting offer
Maggie was browsing Instagram and saw an ad from a luxury cosmetics brand offering free samples of a new anti-aging serum "for new customers only." She decided to try it, generating a new Hetman Relay.
2
First samples
Maggie filled out the form using her Hetman Relay. She received the samples, tested them for a week, and disabled the relay. The cosmetics were okay, but she wanted to compare with competitors.
3
Second round of tests
A month later, Maggie saw that the same company was offering samples of a new cosmetics line. She generated another Hetman Relay and again ordered free samples as a "new customer."
4
The system works
Maggie regularly used Hetman Relay - each time a new relay, new samples from various products. The company couldn't link her different "identities" and kept treating her as a new potential customer.
5
Unlimited testing
Maggie had already collected a whole assortment of tested cosmetics from various companies, all for free. She could consciously choose the best products without spending money on experiments. Each Hetman Relay gave her a new chance at free samples.
1
Tempting prize
Olivia was browsing Facebook and saw a contest by a well-known electronics brand – the latest smartphone to be won. She just had to fill out a form with details. Without hesitation, she gave her real email address.
2
Detailed form
Olivia filled out an extensive form, providing her age, occupation, interests, family status, and home address. The company convinced her this was needed to "better match prizes."
3
Profile sale
The company immediately sold Olivia's detailed profile to a data broker. Her information – age, occupation, address, interests linked to her real email – was shared with hundreds of companies across industries.
4
Digital investigation
Marketers used Olivia's email address to find her profiles on LinkedIn, Instagram, and Facebook. They learned her workplace, friends, hobbies, and shopping habits, creating a detailed consumer profile.
5
Targeted attacks
Olivia started receiving personalized ads tailored to her exact profile – credit offers based on her income, clothing ads matching her style, vacation proposals to places she liked on Instagram.
6
Loss of privacy
Olivia realized she was constantly tracked online. Every ad was perfectly matched to her life, and companies knew things about her she had never consciously revealed. One contest led to a complete loss of digital privacy that Hetman Relay could have prevented.
1
Tempting prize
Olivia was browsing Facebook and saw a contest by a well-known electronics brand – the latest smartphone to be won. She just had to fill out a short form with contact details. She decided to try her luck by generating a new Hetman Relay.
2
Safe participation
Olivia filled out the contest form using her Hetman Relay and a real address for possible prize delivery. She participated without exposing her real digital identity.
3
The real purpose of the contest
The company organizing the contest was actually a data broker. They collected detailed demographic information of participants and sold it to dozens of companies across industries. The contest was just a pretext to build a database.
4
Profiling attempts
Data brokers tried to link Olivia's Hetman Relay email address with her social profiles and online activity, but the relay did not reveal any information about her real identity or interests.
5
Control over the situation
Olivia didn't win the main prize, but various marketing offers started arriving at the Hetman Relay. With one click, she turned off the relay, ending unwanted contacts and keeping her privacy.
1
Gift shopping
Adam searched online for a birthday gift for his wife. He found the perfect jewelry in a new online store. Without hesitation, he provided his main email address during registration.
2
Seemingly routine shopping
Adam filled out the order form with his real email address, which he used for work, family contact, and all important matters. He received the confirmation and waited for the gift.
3
Spam flood
The store sold the customer database to data brokers. Adam's real email address ended up with hundreds of companies. He began receiving tons of ads for jewelry, watches, gifts, discount coupons, and sales.
4
Communication chaos
Important emails got lost in a sea of spam. Adam had to scroll through ads to find real correspondence. His productivity at work dropped.
5
Loss of control
Adam tried unsubscribing from each mailing list separately, but the more "unsubscribe" links he clicked, the more spam he got. Some links were fake and only confirmed his inbox's activity.
6
Destroyed inbox
Adam sat frustrated, looking at his inbox filled to the brim with spam. His main email address, which he had used for 10 years, became useless. He considered changing the address and notifying all his contacts - a huge hassle caused by one purchase that Hetman Relay could have prevented.
1
Gift shopping
Adam searched online for a birthday gift for his wife. He found the perfect jewelry in a new online store. Before registering, he generated a new Hetman Relay in the app specifically for this purchase.
2
Secure registration
Adam filled out the order form using his Hetman Relay instead of his real email address. He received the order confirmation and waited for the gift for his wife.
3
Database sale
A month after the purchase, the store sold its customer database to marketing companies. Adam's Hetman Relay email address along with his jewelry purchase history ended up with dozens of jewelry companies, gift shops, and data brokers.
4
Controlled spam
Adam's Hetman Relay started receiving dozens of emails daily - jewelry ads, sales, discount coupons, newsletters. Companies bombarded him with offers.
5
One click to silence
When the spam became too annoying, Adam disabled the Hetman Relay with one click. The bombardment of his real inbox stopped immediately. He could peacefully return to normal correspondence without interruptions.
1
Interesting article
Kate was reading a photography blog and found a great article about night photography techniques. At the end, there was a subscription form for the newsletter promising weekly tips. Without hesitation, she gave her main email address.
2
Seemingly good decision
Kate subscribed to the newsletter using her real email address. The first few issues were truly valuable – full of practical photography tips.
3
Database sale
After a few weeks, the blog changed owners. The new publisher not only started sending aggressive ads but also sold the entire subscriber base to various marketing companies and data brokers.
4
Spam avalanche
Kate's real address ended up with dozens of advertising companies. She started receiving hundreds of emails weekly – ads for photographic equipment, online courses, sales, and even suspicious "quick money" offers.
5
Loss of control
Kate tried to unsubscribe from each list separately, but the more "unsubscribe" links she clicked, the more spam she received. Companies kept selling her address, and some links were fake, only confirming her inbox activity.
6
Digital chaos
Kate sat stressed in front of the computer, looking at her inbox filled to the brim with spam. Her real email address, which she used for work and important correspondence, had become useless. She had to consider changing the address and notifying all her contacts - a problem Hetman Relay would have prevented.
1
Interesting article
Kate was reading a photography blog and found a great article about night photography techniques. At the end, there was a subscription form for the newsletter promising weekly tips. She decided to subscribe using a new Hetman Relay.
2
Controlled subscription
Kate generated a Hetman Relay in the app specifically for this photography blog. She subscribed to the newsletter knowing she could control the flow of messages anytime without affecting her main inbox.
3
Change of quality
After a few weeks, the blog changed owners. The new publisher started sending aggressive ads for photographic equipment instead of valuable content. Additionally, they sold the subscriber base to third-party companies.
4
Quick reaction
Kate noticed the decline in quality and the influx of unwanted ads on her Hetman Relay. With one click in the app, she turned off the relay, immediately stopping the flow of unwanted messages.
5
Clean inbox
Kate checked her main email inbox – it was clean and organized. No marketing company could reach her, and her real address remained safe and unknown to advertisers thanks to Hetman Relay.
1
Discount discovery
Julia was browsing an online cosmetics store and found a care set she wanted to buy. On the page, she saw a banner "Subscribe to the newsletter and get 20% off for new customers." She decided to take advantage of the offer.
2
The only chance
Julia subscribed to the newsletter using her main email address. She received a discount code and bought the cosmetics set with 20% off. She was happy with the savings.
3
Attempt for repeated discount
A month later, Julia needed a new face cream from the same store. She tried to subscribe again to the newsletter, but the system recognized her email address and displayed the message "This address is already in our database."
4
No possibility
Julia tried different ways – she unsubscribed and resubscribed, but the store remembered she already used the discount. She had to pay full price for all further purchases.
5
Lost savings
Julia made further purchases at this store, always paying full price. She looked with regret at banners with discounts for new customers, knowing she would never be able to use them again without Hetman Relay.
6
Regret over lost opportunity
Julia sat counting how much she could have saved if she could use new customer discounts multiple times with Hetman Relay. She realized that by using one email address, she limited her ability to save to only once.
1
Discount discovery
Julia was browsing an online cosmetics store and found a care set she wanted to buy. On the page, she saw a banner "Subscribe to the newsletter and get 20% off for new customers." She decided to take advantage of the offer using Hetman Relay.
2
First relay
Julia generated a new Hetman Relay in the app and subscribed to the newsletter. She received a discount code and bought the cosmetics set with 20% off. After the purchase, she turned off the relay to avoid marketing spam.
3
Next purchases
A month later, Julia needed a new face cream from the same store. She generated another Hetman Relay, subscribed to the newsletter again as a "new customer," and again received a 20% discount.
4
System that works
Julia regularly used Hetman Relay – each time generating a new relay, receiving a new subscriber discount, making a purchase, and turning off the relay. The store couldn't link her different "identities."
5
Savings without consequences
Julia sat counting her savings – by systematically using new Hetman Relays, she saved hundreds of zlotys on cosmetics. Her real email stayed clean, and she could enjoy discounts without limits.
See how it works, interactively.
See for yourself how the Hetman Relay works. Click the "Your email address. (Click)" field to begin.
Fri, Dec 19 10:09:44 AM
Your mailbox
Received (3)
Sent (3)
Folders
Settings
Mailbox: thomas.taylor@example.com
Cinema
New in cinema
14:12
Boss
Quarterly report
11:15
Neighbor
Request to repark
09:06
Website for buying shoes
Create an account to purchase.
First and last name.
Email address.
Full comfort and simplicity.
Use our dashboard on your computer and smartphone, the extension with automatic relay detection, and the PWA app, which you can save to your smartphone's home screen.
We offer simple solutions for every platform. Click any button above to see the available solution!
List of features.
Secure, easy, and flexible relays management - built by someone who values your privacy.
Security
While you already gain a lot of security through relay concept, we also ensure that your data is safe and your emails are securely transmitted. We encrypt your data both in transit and at rest using AES-256. Your data is stored in the EU. Every email that passes through our servers is handled only in memory and is never read by anyone.
Configuration
You can personalize your relay by setting a name, managing where emails are forwarded, and scheduling tasks like auto-deletion. Control reply ability and even use your own domain.
Easy of use
While we offer many configuration options, we understand that not everyone wants to spend time on setup. That is why you can create a ready-to-go relay in just two clicks with settings pre-configured by us. If you do want to customize it, the configuration process is simple and user-friendly. We also have an intelligent generator that creates random, easy-to-pronounce relay email addresses.
Flexibilty
Quickly change the forward-to address, disable or enable your relay, or even decide the lifespan of your relay. Create new relays or forward-to addresses anytime.
Extension
We offer an extension to all our users that automatically detects whether you are using relay on a specific site. The extension also automatically detects all input fields where you can use an email address and suggests generating a new relay easily.