CodaMail
Breaking The Chain Of Online Vulnerability

Break the connection between your email address and your online identity!


• Choose root level addresses as needed from over 30 different domains
• Use them as you would any other email address
• Give every site that requests an e-mail address a different address that delivers to you
• Create and delete them at will without affecting any of your other mail
• Worry no more about e-mail leaks connecting back to your e-mail account
• Know who leaked your e-mail address
• Shut it off without affecting any of your other e-mail
• Your e-mail address no longer needs to be a unique identifier for your online identity!

CodaMail is one e-mail account with an unlimited number of e-mail addresses.

Achieving True Zero Access Email Security

For Your Eyes Only!


• Auto-encrypt everything for Zero Access with one master public PGP key
• Auto-encrypt only specific addresses with their own public PGP key
• Auto-encrypt within a mail filter with your choice of public PGP key
• Or don't Zero Access encrypt anything
• Your mail, your keys, your choice

CodaMail offers you more control over your e-mail than anywhere else.

Also included: cPanel based Web Hosting, SSH, Socks, and VPN available.
(proxies operate under our cotse.net domain).

See the full list of features below.

Start Free Trial - No Card Required

CodaMail is Cotse.Net rebuilt and redesigned for 2025

Easy to use on any device
  • Our webmail works like an app, you don't need to install anything
  • Support for desktop, tablet, and phone
  • Protection from tracking pixels, remote images, and scripts
  • Built in XSS protection
  • Long press, right click, and drag and drop functions
Masked Aliases
  • Masked aliases are the real power of this service. They are email addresses which you select that you can use to send and receive email that can not be externally connected to your account.
  • We currently offer over 30 different domains to choose from for your masked aliases.
  • Create custom root level aliases in any domain we offer. ie. alias@domain.com (you choose what you want for alias) and you'll also get the catch-all of anything@alias.domain.com
  • Masked aliases do not show your account name in any way and you cannot log in as any of your masked aliases. This protects you from email address leaks.
  • Delete and create masked aliases at will.
  • Masked aliases work with all features.
Account Based Aliases
  • You'll be able to activate youraccount@any_domain_we_offer.
  • These do not count as masked aliases.
  • Activation includes catch all.
Unlimited Aliases
  • Give a custom email address to every place that requests you give them one. Shut it off at any time without affecting any other mail.
  • Disable or enable catch-all
  • Disable or enable individual alias(es)
  • Disabled aliases are rejected during the SMTP handshake as User unknown
Unlimited Hosted Domains
  • Host your own domain(s) with us, as many as you'd like
  • Unlimited aliases in your own domain(s)
  • Disable or enable catch-all
  • Disable or enable individual alias(es)
  • Disabled aliases are rejected during the SMTP handshake as User unknown
  • All of your own domain aliases work with all features
At-Rest Encryption
  • All mail is individually encrypted using elliptic-curve AES-GCM-256 prior to storage, all headers included. All mail sent Codamail to Codamail is fully encrypted, the same elliptic-curve AES-GCM-256, including all headers. Outside mail is encrypted upon receipt. Mail is only decrypted when you read it. This is all transparent to you, no matter what e-mail client you use.
  • Note: The server holds the key for this, so this type of encryption isn't zero access, even though some services claim it as such. See Zero Access Encryption below for true Zero Access.
Zero Access Encryption
  • Auto-encrypt all incoming mail with one master public PGP key or
  • Only Auto-encrypt specific aliases with their own public PGP keys or
  • Auto-encrypt with a filter action based on anything in the message with your choice of PGP key
    • An example could be a filter that auto-encrypts any mail where the subject line begins with the word Encrypt.
  • Automatic PGP encryption is not tied to your account or login password. You create the key, you own the key, you control the key. This means you can move your email anywhere still encrypted and read it elsewhere with your private key. Even your encrypted email is not tied to this service, as easily exportable as the rest.
  • You have full control. Your choice, your keys, your mail.
E2EE with PGP
  • Communicate with others using PGP for end-to-end encryption, which ensures that only you and who you are communicating with can read these messages.
  • Sign or encrypt mail
  • Store your private keys on the server with a strong passphrase for ease or keep them on your local device for security
  • Mailvelope compatible or use your favorite email app
Fetch E-mail
  • Retrieve your email from any other service.
  • Reply as normal and our service will automatically select the proper from address.
  • Auto-encrypt it with your choice of public PGP key
  • Filter it into it's own folders
  • Leave or delete it after retrieval
  • All filters work on fetched mail
  • Automatically send via the retrieved services' smtp server for proper spf/dkim/dmarc
  • Your ip address is kept private from the service you retrieve and send through, and your receiver cannot tell you are using this service, to them it looks like you are directly using the remote account
  • Work with all of your mail accounts in one place.
Advanced Mail Filters
  • Anything you can think of that you might want to do with mail when it arrives, there is a way.
  • Forward mail by filter action
  • Filter to folders
  • Modify headers
  • Set or remove flags
  • Reject, discard, or delete
  • Set up auto-replies
  • Add PGP encryption with your choice of public PGP key to any filter
Antispam and Antivirus Tools
  • Easily block from addresses or domains (including just top level domains). Rejections occur during SMTP handshake.
  • Auto learning filters. Just by marking messages Junk you train your spam filters.
  • We give you full control of SpamAssassin, the number one open source antispam solution.
  • DNS based filters. Use popular DNS Block lists.
  • Custom filters. Create your own custom spam rules.
  • Antivirus by ClamAV, the number one open source antivirus package.
Other advanced features
  • Add, remove, or change headers on your outgoing e-mail to assist in obscuring whatever e-mail client you are using.
  • Easily forward all mail to your existing email account, effectively using our features with your e-mail.
  • Available Two Factor TOTP Authentication
  • Support for spf, dkim, and dmarc
  • Easily import and export your email and keys
  • Easy to configure Out of Office Autoreplies
  • Save responses for quick replies.
  • Archive your mail by year or month.
Control imap and pop
  • Enable pop or imap for use with your favorite email app.
  • Restrict pop and/or imap access to specific IP addresses or CIDR subnets for added security.
  • All services encrypted
  • All with Perfect Forward Secrecy
  • SMTP automatically removes identifying headers from your mail client
cPanel based Web Hosting
  • Professional web hosting with the industry-standard cPanel control panel, giving you an intuitive interface to manage your websites, databases, and web applications
  • Full suite of features including PHP support, MySQL databases, FTP access, SSL certificates, and website statistics
  • Easy one-click installers for popular platforms like WordPress, Drupal, and Joomla
  • Comprehensive file management, backup tools, and security features
  • Included in our most popular service plans at a fraction of typical web hosting costs
SSH Tunneling
  • Create encrypted connections through our secure servers, perfect for bypassing network restrictions while maintaining high security
  • Multiple tunneling options: direct tunneling for speed, pass-through proxy for additional routing, or privacy proxy for enhanced anonymity
  • Excellent alternative to VPNs in restrictive environments, as SSH traffic is often less scrutinized
  • All traffic is fully encrypted and can be configured to work with specific applications or your entire system
  • Proxies are offered here, but only accessible under our cotse.net domain.
Socks Proxy
  • High-speed SOCKS5 proxy service that supports both authentication and DNS resolution
  • Perfect for applications that don't support VPN connections or when you need protocol-specific privacy
  • Can be used as a VPN endpoint to mask VPN usage in restrictive environments
  • Compatible with most applications that support proxy connections, including web browsers, chat clients, and email applications
  • Proxies are offered here, but only accessible under our cotse.net domain.
VPN Services
  • Secure, high-speed VPN service with servers strategically located across multiple countries
  • Utilizes OpenVPN protocol for robust security and proven reliability
  • No logging policy to protect your privacy, with perfect forward secrecy and strong encryption
  • Compatible with all major operating systems and devices, including Windows, macOS, Linux, iOS, and Android
  • Available as a standalone service or as an add-on to any of our subscription plans
  • Proxies are offered here, but only accessible under our cotse.net domain.
Test us using trusted online tests