Each interaction you have with others online or in real life involves an exchange of information, and sometimes your personal information is required. Information about you, like your phone number, email, or full name, constitute your online identity, a reflection of how others see and interact with you.
When your information is shared widely online between many websites, it gets aggregated into a profile that companies called data brokers can sell to advertisers for a profit. Worse still, bad actors like hackers and scammers can find and use this information and use it to impersonate you.
With Cloaked, you’re in control of your information like never before. With the power of Cloaked identities, you control what others see and know about you. For each website or business you interact with, you can create new identity information that can’t be traced back to the real you.
One of the key features of Cloaked identities is creating unique logins to use online that are distinct from your personal information.
Using the extension, dashboard or mobile app, you can generate new credentials instantly when checking out online or signing up for new sites or services.
Each Cloaked identity with an email or phone number comes with its own inbox. Navigate easily between Cloaked inboxes or call logs to quickly find messages you need while keeping your personal inboxes free of junk.
Forwarding inbox messages & calls
In some cases, you may want to forward emails, calls, or texts from your Cloaked identities to your personal email or phone number. You can customize this setting for each phone number or email you generate with Cloaked.
For more information about how to enable forwarding, click here.
If an identity is sending you too many messages, it’s easy to ignore them. You can still access messages from ignored identities, but they won’t show up in your main Cloaked inbox.
Deleting identities
If you no longer need an identity, you can delete it at any time. Deleted identity information can be restored for up to 30 days.
For more information about how to managing identities, click here.