About Desired Email
EXPERIENCE EMAIL THE WAY IT WAS ALWAYS MEANT TO BE
Welcome to Desired Email
A Private and Secure Email Service Built for You
Built to Bring Back Peace of Mind
Thank you for visiting.
Imagine a calmer inbox where only approved people can reach you. Your inbox should be meaningful and beneficial, not something you dread or fear. From your first moment here, your experience is designed to feel simple, safe, and inviting.
Encrypted end to end, HIPAA and PCI DSS compliant, and veteran owned.
Many inboxes feel cluttered with SPAM, scams, and threats. A quieter inbox can change your day. Desired Email gives you a private inbox that respects your time and protects your information. We block SPAM and malware before they reach your inbox. Approve people first keeps strangers out. Your day begins with ease and ends with confidence.
Freedom From Inbox Chaos
Email was meant to bring people together, yet today it can feel stressful and unsafe. Desired Email restores the calm and trust email once offered. Picture opening your inbox and seeing only messages from people you trust, with no distractions and no threats.
Protected by Strong Security
Every message is encrypted end to end, and the To and From lines are hidden for extra privacy. Your encryption keys are never stored on our servers. We are HIPAA and PCI DSS compliant. These protections let you focus on what matters without fear or distraction.
Control Returns to You
Your inbox belongs to you again. You decide who can contact you and what they can send. If something does not feel right, you can remove their access in a moment and your peace returns.
Join the Movement
Thank you for being here. We are honored to welcome you and grateful for your trust. Please keep reading to meet our Founders, learn our Company History, and see the Benefits that lead to the plan that fits you.
MEET THE TEAM REIMAGINING HOW THE WORLD CONNECTS
Our Founders
A Shared Mission
Your safety, privacy, and ease come first. Your inbox is designed to stay calm and simple. Our founders make this possible with steady planning, clear controls, and daily care. Desired Email is veteran owned and led by three seasoned and successful entrepreneurs. They have worked together before and deliver as one team. Thank you for trusting us.
Veteran owned. Decades across technology, finance, sales, and operations. Reliable service, quick help, clear updates.
How We Run the Business
Strong companies serve people well. That is why we match careful planning with daily execution. Costs are watched, growth is paced, and quality is reviewed. Security and support receive constant attention. Daily operations are reviewed and improved so work stays on time and on budget. Decisions are made with clear data and simple rules. This approach keeps the service reliable today and stronger tomorrow.
Meet Our Leaders
John Keller, Co Founder and Chief Technology Officer
John keeps your mailbox safe, fast, and stable every day. He designs and guides our private network and sets the rules our engineers follow to build and check the service. These rules help keep your data safe. He turns complex systems into simple tools that work smoothly on your computer, phone, and tablet. His focus is safety, steady performance, and smooth updates as the service grows. John earned a Bachelor of Science in Information Technology and is currently earning a Master of Business Administration.
Steven Moher, Co Founder, Chief Financial Officer, and Software Developer
Steven keeps the company strong and steady so your service stays dependable. He leads finance and helps shape the product. He plans budgets, reviews results, and keeps clear controls in place. His focus is simple, fair, and affordable pricing. He also ensures strong reporting and careful risk management. Steven brings more than 35 years of experience across finance and technology. He earned a Master of Business Administration, a Master of Computer Information Systems, and a Master of Accounting and Financial Management.
Alexander "Lex" Viera, Co Founder and Chief Sales Officer
Lex makes your experience calm and helpful from day one. He leads growth and customer care. He builds trusted brands and friendly teams that welcome you and support you well. He ensures a smooth start, clear guidance, and timely support. His focus is clear communication, quick answers, and lasting relationships. Lex earned a Bachelor of Applied Science in Business Administration.
What Comes Next
See how this vision took shape in Company History. Learn how we built the service and why each choice protects your day. Open Company History to continue your journey.
HOW YOUR NEEDS INSPIRED A NEW KIND OF EMAIL
Our Company History
Why We Built Desired Email
We started with a simple goal. We wanted to return peace of mind to everyday communication. We listened and researched, then rebuilt email with your needs guiding every decision.
What Sparked the Idea
Email was once exciting, but it became cluttered, risky, and overwhelming. People felt their inboxes were no longer in their control. In 2019, we started this journey to restore calm, privacy, and safety to email.
What We Learned From You
We listened to thousands of people across work, school, family life, and nonprofit service. You told us your inbox was full of spam, scams, and hidden threats like malware, ransomware, and viruses. You wanted simple control and trustworthy privacy. Your stories set the direction to protect time, protect information, and make the inbox feel calm again.
The Three Questions We Asked
We narrowed our research to three questions that mattered most to you.
- Why did email, which is essential to daily life, become so noisy and unsafe?
- What do people truly need from an inbox to feel calm, private, and in control?
- What foundation would keep threats out before they reach your inbox?
Those questions became the blueprint for everything that followed. They turned research into action and kept the work focused on what matters to you. They guided our choices from early prototypes to daily operations.
How We Researched the Problem
We studied how threats spread and why they persist. We examined years of patches, fixes, and filters to see why they did not solve root causes. We tracked why good messages were blocked, why bad messages slipped through, and why the cycle kept repeating.
Why Patches and Filters Were Not Enough
Most systems act after a message arrives, which keeps people exposed. Filters cannot be perfect, and every mistake costs time, trust, or money. We concluded that a different foundation was necessary.
Why Email Still Dominates Daily Life
Email is the most universal digital communication channel in the world. More than 4.5 billion people use email, and over 360 billion messages are sent each day. In the United States, nearly nine in ten people use email regularly across every age group. Because so many lives and records depend on email, solving its risks became essential to our mission.
No single messaging app reaches as many people. WhatsApp, the largest messaging app, has about three billion monthly users. That is still fewer than email. Email remains dominant because it is open, works with any provider and on any device, and lets people send and receive messages even when they are not online at the same time. It also provides permanent, searchable records that workplaces, schools, governments, and families rely on. However, it is also riddled with spam, scams, and threats, which is why people told us they needed a safer foundation for their inbox.
How We Built a Different Path
We designed around one principle. Your choices must come before delivery.
We focused on stopping unwanted messages before they reach your inbox instead of cleaning them up after the fact.
Every design decision traced back to what people told us they needed most. Peace of mind without extra work.
From Research to Reality
We moved carefully from prototypes to daily reliability. We tested, measured, and refined until operations were steady and predictable.
The aim never changed. Give people back ownership of their inbox.
Where We Stand Today
Desired Email reflects the lessons of that journey. It is patent pending and built with compliance and careful operations at its core. Our history is about listening first, learning deeply, and building differently.
Ready for the Next Step
We will keep learning from you, studying new threats, and strengthening our approach. We will test, measure, and improve so the experience stays steady and safe. Your needs will continue to guide what we build next, and we will share clear updates as we go.
Open Threats to see the specific risks we studied. You will learn how those risks work and why patches and filters often fall short. You will also see why a different foundation matters for your inbox, and how it protects your time and information.
SEE THE THREATS. GET THE PROTECTION.
How We Protect You
How This Helps You
This page shows common email threats like phishing, malware, account takeover, spam, false positives, false negatives, cyberbullying, and data breaches.
It pairs each threat with the matching protection you get with Desired Email.
Using simple examples, you will see how we block or reduce those risks right away.
Our Zero Access Promise
Your messages are locked with your own encryption key, and we cannot open them. Your encryption keys are never stored on our servers, and addressing details stay shielded inside our network. We keep you safe by controlling who may reach you and what may be sent, not by reading your message content.
Think of each message as a sealed letter. We do not open the letter, but we check the envelope, the return address, and the type of package before it reaches your door. That keeps you safe while your private words stay private.
This is how our protections work without decryption. Selective Messaging lets only approved people contact you and blocks unknown senders before delivery. Rules are enforced on your computer, phone, or tablet and then double-checked at our secure front door, without reading your message content.
Who Can Reach You
In the morning you open your inbox and see messages from people you do not know. A few look like invoices or invites, and they ask you to act fast. That is how strangers steal your time and attention before your day even starts.
How we protect you
Closed Network with Selective Messaging means you choose who can contact you. Unknown senders cannot deliver, and approved contacts arrive as expected. These rules are enforced on your computer, phone, or tablet using your approved contacts and sender policy, not by reading your message content.
What you will notice
Only trusted people can reach you and fake requests do not appear. You start the day with less noise and more focus. If something feels off, you remove their access and your peace returns.
Cyberbullying and Harassment
Cruel or pushy messages can target kids, teens, or older adults. These notes can come from new accounts that should not reach your family, and they often arrive at stressful times. The result is fear, distraction, and lost confidence.
How we protect you
Selective Messaging allows only approved contacts to reach you or your family. You can remove their access in a moment if someone starts to bully or threaten, and we log who sent, to whom, and when, not by reading your message content. Calm notifications keep interruptions gentle across your devices so pressure is lower.
What you will notice
Only trusted people can message your kids or older relatives. Bullying attempts stop quickly and the inbox feels safe again. If someone crosses a line, you remove their access and the messages stop.
Online Predatory Contact and Grooming Attempts
Unsafe adults sometimes try to contact children to build secret trust and ask for personal details. They may try to move the chat to another app or push for photos, gifts, or private meetings. These messages can look friendly at first, which makes them hard to spot during a busy day.
How we protect you
Selective Messaging allows only approved contacts to reach your child’s inbox, so unknown adults cannot deliver messages at all. Safer for Kids and Older Adults gives parents clear control over contact lists and lets you remove their access in a moment if anything feels off. Links and QR codes are not allowed, which removes common lures to move kids to unsafe sites or apps. These controls are enforced on your computer, phone, or tablet and then double-checked at our secure front door, without reading your message content.
What you will notice
Only trusted adults can reach your child. If someone starts acting wrong, you remove their access and the messages stop. Your family’s inbox feels calm and safe, and your child can focus on school, friends, and home.
Sign In Theft and Account Takeover
During a busy task, a message asks you to sign in again. The logo looks right and the tone feels kind and urgent. One quick click can give away your password and put other accounts at risk.
How we protect you
Links and QR codes are not allowed in Desired Email, so inbox traps never appear. This rule is enforced on your computer, phone, or tablet before a message is sent, and we do not decrypt or inspect the body to apply it. Selective Messaging blocks strangers, which removes most lures before they arrive.
What you will notice
You see no surprise sign in pages in your inbox. Your accounts stay in your hands and not in a thief’s hands. When you need a site, you type it or use a safe bookmark.
Business Email Compromise by the numbers
In 2024, the FBI recorded 21,442 Business Email Compromise complaints in the United States. Reported BEC losses totaled $2.77 billion for the year. These figures come from victim reports to the FBI’s Internet Crime Complaint Center.
Dangerous Files and Malware
A file arrives from a new contact and it looks routine. You are moving fast and it takes only a click to open it. That one click can lock files, leak data, and slow your day to a stop.
How we protect you
Malware Stopped Before It Starts blocks risky file types before delivery. File type rules are enforced on your computer, phone, or tablet before encryption, and then double-checked at our secure front door, without reading your message content. No executable code runs in our environment, which removes a common path for attacks.
What you will notice
You face fewer risky files and fewer scares when you open mail. Work flows without sudden pauses. Files you do receive come from people you trust.
Data Breaches and Exposure
Big breaches happen when attackers break into a company and try to copy stored data. Stolen lists can trigger waves of spam and impostor messages, and leaked mail can expose private details. Even if the breach is at another service, the stress and cleanup still land on you.
How we protect you
Messages are end to end encrypted as stated above, and your encryption keys are never stored on our servers, so your private words are not exposed if our systems are attacked. Selective Messaging blocks strangers even after a contact list is leaked, so new spam waves and impersonation attempts do not reach your inbox. Organized Database and Audit Ready Controls and Logs help you review what was sent and when, which makes checks and follow up simpler, without reading your message content.
What you will notice
If there is a breach in the news, your conversations stay private and your inbox stays calm. You can change your password and continue working without digging through junk. You keep a clear view of your mail history while your private words remain private.
By the numbers (2025)
In 2025, the global average cost of a data breach is $4.44 million. In the United States, the average cost is $10.22 million per breach. These figures come from IBM’s 2025 Cost of a Data Breach materials.
Missed and Misfiled Mail
False negatives are bad messages that get into your inbox. False positives are good messages that are sent to Spam or held in quarantine. Both cause real harm because a missed attack can lead to loss, and a misfiled invoice or note can slow your day.
By the numbers
Worldwide each day, about 17 million bad emails slip into inboxes as false negatives, and about 19 million good emails are misfiled as false positives. In the United States each day, about 1 million bad emails get through and about 1.1 million good emails are sent to spam or quarantine. These are rough estimates based on a 0.01 percent error rate applied to typical global and United States email volumes.
What false positives do to a business
Good messages are hidden, so work stalls and trust suffers. Sales, invoices, and approvals can be delayed, and vendor ties can be strained. Teams waste time digging in junk to rescue real mail.
What false negatives do to you and your business
You read junk that looks real and a quick click can cause real loss. Teams spend hours on cleanup, resets, and checks after one bad message lands. Even careful people can be caught when a lure arrives during a busy moment.
By the numbers for a typical team
A team of 100 people gets about 80 emails per person per day. That is 8,000 messages per day, which adds up fast over a month. At a 0.01 percent false positive rate, about 24 good messages a month are misfiled and must be found.
Each rescue might take 10 minutes of searching and follow up. That is about 240 minutes a month of recovery time for the team, which is time not spent on real work. The direct dollar cost is small compared to the risk of a missed sale or a late payment.
How we protect you
Selective Messaging delivers approved senders and blocks unknown senders before delivery. No links and blocked dangerous files remove two major attack paths if a known contact is later compromised. You stop fishing in Spam to rescue good mail and you see fewer bad surprises in your inbox.
Privacy, Noise, and Storage
You search for an important message but spam and clutter hide what matters. Good mail gets buried and junk still takes space and attention. With common providers, spam that sits in Spam or Junk usually counts toward your mailbox storage.
How we protect you
Privacy by Design keeps conversations end to end encrypted as stated above. Proactive Model with No Filters removes guesswork after delivery, so there is no need to hunt for lost mail. Organized Database with Auto Sorting keeps search fast, attachments linked, and important items first.
What you will notice
Search is faster, clutter is lower, and you have more room in your mailbox. Real messages stand out and junk does not pile up. You end the day with less stress and more control.
A Faster and More Cost Effective Way
Desired Email eliminates spam and significantly reduces other threats, so you get your time back. Even five minutes a day adds up to about 30 hours a year. At $30 per hour, that is about $900 per person each year, and an annual Desired Email subscription is a fraction of that cost.
Ready to Begin
You deserve a calm, private inbox that works for you. Open the Subscriptions tab to choose your plan and start today. We are honored to welcome you and earn your trust every day.
BENEFITS YOU FEEL EVERY DAY
More Ways Your Inbox Works for You
Privacy and Control
No Ads. No Data Selling.
Your inbox is for your life, not for ads. We do not sell your data or follow you around the web. You read what matters and then get back to your day.
Roles, Permissions, and Audit Ready Logs
You decide who can manage billing, users, and messaging rules. Actions are recorded so reviews are clear and quick. This helps teams show good control without extra tools.
PCI DSS and HIPAA Compliant
Desired Email meets PCI DSS requirements for payment data and HIPAA requirements for protected health information. Controls, audits, and training keep your sensitive data safe. For plain language details, visit the Certifications and Compliance tab.
Simple Setup in a Closed Network
You start fresh with a clean inbox in a private network. Past junk does not follow you in, and unknown senders cannot get through. You invite only the people you trust.
Ease and Productivity
Guided Onboarding and Real Support
Short videos show each step in seconds. A friendly knowledge base gives clear answers, and chat helps with quick fixes. Humans step in for anything complex or sensitive and stay until it is solved.
Fast Search and Linked Attachments
Your mail lives in an organized database, not in loose files. Search is fast and precise, and attachments stay linked to the right message. You find what you need without digging.
Point in Time Recovery
Mistakes happen and that is okay. You can restore messages or folders to how they looked before a change. Recovery is simple and lets you breathe easy.
Consistent Across Devices with Calm Notifications
Your inbox looks and works the same on your phone, tablet, and computer. Changes stay in sync so you can start in one place and finish in another. Notifications are simple and respectful, so you stay in flow.
Accessibility Built In
Text is clear and easy to read. The experience is keyboard friendly and screen reader ready. More people on your team can feel comfortable and confident.
Works with What You Already Use
Keep your office suite for documents and meetings. Use Desired Email for calm, private messaging with the people who matter. For new outreach, you can still use an open mailbox and move real conversations into Desired Email when they are ready.
Growth, Brand, and Value
Scales as You Grow
Start with one Primary as your hub. Add Primary, Dependent, or Portal accounts for each team, location, or family member. Growth stays simple and your controls remain clear.
Private Labeling for Your Brand
Use your name, colors, and domain, so every message feels on brand. Clients and families see a trusted, professional presence. Your identity stays consistent across your messages.
Simple, Predictable Pricing
There are no ads and no hidden add ons. You get the protections you need in one clear plan. Choose monthly or annual and plan with confidence.
Lower Total Cost over Time
A quiet inbox saves minutes every day, and that time adds up. Blocking unknown senders and risky files before delivery reduces incidents and emergency fixes. Many teams can retire extra spam and phishing tools.
Thoughtful for the Planet
Less junk means fewer unwanted messages stored and processed. Lower message volume reduces energy use over time. Small changes at scale help the environment.
Giving Back Together
We support five nonprofits that help children, students, neighbors, service members, and families. We donate 10 percent of net profits to these programs. Your subscription helps your inbox and helps your community.
Learn More About Our Charities
Want to see who we support and why? Open the Charities page to meet the five nonprofits and see the impact your plan makes. Thank you for helping us give back.
Ready to See the Rest
Open the Subscriptions tab to choose the plan that fits you. For security details, visit the Certifications and Compliance tab. We are honored to welcome you and earn your trust every day.
PROVEN STANDARDS. YOUR DATA PROTECTED.
Certifications and Compliance
Below is a simple list of the rules we follow and how each one protects you. It also explains what each standard means in plain language. The focus stays on what you get, while remaining clear for reviewers and auditors.
HIPAA Compliance
What HIPAA Is
HIPAA (Health Insurance Portability and Accountability Act) is a United States law that protects personal health information. It sets rules for privacy, security, and what to do if a problem happens. These rules help keep your health details safe and in the right hands.
Why This Matters to You
Your health details stay private and under your control. You can share what you need with your doctor or school nurse and know it is protected. For example, if the school nurse emails a medication form, your details stay private and only approved people can see it.
How We Are Fully Compliant
We use strong encryption, role based access, and activity logs that show who sent what and when. We follow the minimum necessary rule and keep BAAs (Business Associate Agreements) where needed, including with our hosting provider. We do not access your message content or your encryption keys, and we follow the HIPAA Breach Notification Rule if an incident occurs.
HIPAA Requirements 1-12
Requirement 1. Ensure confidentiality, integrity, and availability of ePHI (45 CFR §164.306)
We encrypt ePHI (electronic Protected Health Information) while it is sent and while it is stored. We strengthen our systems and keep backups so information stays accurate and available. We review risks on a set schedule and improve controls over time.
Requirement 2. Implement access control (45 CFR §164.312(a)(1))
Only approved users can see PHI (Protected Health Information). Access is role based and limited to the minimum needed for the task. We remove their access the moment a role changes or someone leaves.
Requirement 3. Implement audit controls (45 CFR §164.312(b))
System actions are logged so we can see who did what and when. Logs are protected from change and reviewed on a schedule. Findings lead to fixes and training.
Requirement 4. Ensure data integrity (45 CFR §164.312(c)(1))
Encryption and integrity checks help prevent unwanted change. We use secure storage and verified workflows to keep records correct. Alerts tell us if something looks wrong.
Requirement 5. Person or entity authentication (45 CFR §164.312(d))
Every user has unique credentials. Strong authentication protects accounts. Session rules and timeouts reduce risk on shared or lost devices.
Requirement 6. Authorization for uses and disclosures (45 CFR §164.508)
We support provider policies that ask for patient authorization when required. Templates and logs help teams record who approved a disclosure. Workflows are designed to use only what is needed.
Requirement 7. Physical safeguards (45 CFR §164.310)
We host on AWS (Amazon Web Services) facilities that follow strict physical controls. Data centers use guards, cameras, and access checks. Devices with health information are tracked and protected.
Requirement 8. Transmission security (45 CFR §164.312(e)(1))
All traffic uses TLS (Transport Layer Security) to protect data in motion. Keys are managed with secure services that follow best practice. We test our security settings and keep them up to date.
Requirement 9. Breach notification (45 CFR §§164.400–414)
We maintain an incident plan that sets steps, owners, and timelines. If a breach of PHI occurs, we notify the right people and the right authorities. We document what happened and how we fixed it.
Requirement 10. Workforce training and awareness (45 CFR §164.530(b))
Team members complete HIPAA training and regular refreshers. We test with drills and teach from real cases. Everyone knows how to report a concern.
Requirement 11. Business Associate Agreements (45 CFR §164.504(e))
We keep BAAs (Business Associate Agreements) with vendors that touch PHI, including our hosting provider. We review these agreements and keep them current. Vendors are required to meet security and privacy terms.
Requirement 12. Minimum necessary standard (45 CFR §164.502(a))
Systems and policies limit access and sharing to what is necessary. Reports and exports hide or remove extra fields. This reduces risk while work gets done.
PCI DSS Compliance
What PCI DSS Is
PCI DSS (Payment Card Industry Data Security Standard) is a global security standard for payment cards. It was created by the major card brands through the PCI SSC (PCI Security Standards Council) to keep card data safe during payments. The standard sets clear rules for networks, access, logging, testing, and policies.
Why This Matters to You
Your payments are safe and simple. Your full card number never sits on our servers because we use Stripe Checkout to process payments. For example, when you pay for your plan, your card number goes to Stripe’s secure system and not to our servers.
How We Are Fully Compliant
We use Stripe Checkout for all card processing and encrypt payment traffic with TLS (Transport Layer Security). We keep systems patched, use firewalls, limit access by role, and monitor activity tied to payment workflows. We complete required PCI reviews each year and rely on trusted vendors like Stripe and Amazon Web Services to protect card data end to end.
PCI Requirements 1-12
Requirement 1. Install and maintain network security controls
We use firewalls and secure network segments for payment workflows. Rules are documented and reviewed. Only needed traffic is allowed.
Requirement 2. Apply secure configurations to all system components
Default passwords and settings are removed. Secure settings are applied and tracked in code. Changes go through review.
Requirement 3. Protect stored account data
We do not store card numbers on our servers. Stripe Checkout stores and protects card data in its secure systems. This reduces risk and scope for us and for you.
Requirement 4. Protect cardholder data with strong cryptography during transmission
All payment traffic uses TLS (Transport Layer Security) with strong ciphers. Certificates and settings are monitored for health and age. We test endpoints and keep them current.
Requirement 5. Protect systems and networks from malware
Payment related systems use modern anti malware controls. Updates and scans run on a schedule. Alerts are watched and acted on.
Requirement 6. Develop and maintain secure systems and software
We patch systems quickly. We scan for known risks and fix them based on severity. Code changes use review, testing, and separation of duties.
Requirement 7. Restrict access to system components and cardholder data by need to know
Access is limited to people who need it to do their jobs. Roles define what each person can do. Reviews remove their access when it is no longer needed.
Requirement 8. Identify users and authenticate access
Every user has a unique account. Strong authentication is required for all access. Keys and secrets are managed in secure services.
Requirement 9. Restrict physical access to cardholder data
Card data is not stored in our offices or on our servers. Stripe and its validated facilities handle physical security for stored card data. We control physical access to our own equipment and admin workstations.
Requirement 10. Log and monitor all access to system components and cardholder data
We collect logs for systems in the payment path. Important events are sent to a central service for alerting and review. Logs are kept for the required time.
Requirement 11. Test security of systems and networks regularly
We run vulnerability scans and fix findings. We test changes before release and verify controls continue to work. Stripe maintains its own validated testing program for card data systems.
Requirement 12. Support information security with policies and programs
We keep written policies for payment security and review them each year. People are trained on what to do and how to report. Vendors like Stripe and AWS are reviewed to confirm they meet their security duties.
What This Means for You
You get privacy and payment safety built in. We meet HIPAA safeguards for your health details, and we meet PCI DSS rules for your card payments while using Stripe Checkout so your full card number never sits on our servers. You can focus on your day knowing your messages and your payments are protected by proven standards.
Compliance Summary
This page gives a high level summary for subscribers and reviewers. Compliance summary last reviewed: September 2025. If you have compliance questions, email support@desiredemail.com and we will provide details you can share with your auditor.
TRUSTED PARTNERS. STRONGER PROTECTION.
Strategic Partners
Partner | Description | Website |
---|---|---|
Amazon Web Services | A secure cloud services platform, offering computing power, storage, and content delivery. | https://aws.com |
Lois Whitestud | Creator of engaging doodle whiteboard animation explainer videos on fiverr.com | https://www.fiverr.com/s/Bkmdmy |
Stripe Payment Services | A secure online payment processing platform that enables businesses to accept payments online. | https://stripe.com |
Zamp | A sales tax compliance platform that helps businesses manage and automate sales tax calculations. | https://zamp.com |
CHOOSE THE PLAN THAT PUTS YOU IN CONTROL
Subscriptions
How Many People Use Paid Email?
It is estimated that over half a billion paid email accounts are in use worldwide, and in the United States more than 100 million people use paid email through work, school, or a personal plan. Because providers do not publish a single U.S. total, we estimate this using reported paid seats and subscriptions plus employment data, minus overlap. The takeaway is simple: paid email is now mainstream across jobs, schools, and personal plans. Join them and choose the plan that puts you in control.
Current Issues With Paid Email Providers
Many paid email services still run on the open internet, so they must accept messages from strangers and rely on filters after mail arrives. Filters can hide good messages or let bad ones through, which means you still check junk folders and lose time. Phishing and business email scams often start with surprise messages, and those can still reach the system even when filters try to help. Attachments are scanned, but new or disguised threats can slip in before tools catch up. Settings and allow lists can help, but they add work you must manage day after day. So what email benefits are you really getting for your money?
What Makes Desired Email Superior to Other Paid Email Services?
Simple, private by design
Desired Email does not show ads or run tracking pixels. Your inbox is built for communication, not for engagement tricks. You read what matters and nothing follows you around the web.
Clear data practices
We never sell your data. Your private keys stay with you and your approved contacts, not on our servers. The To and From details are encoded inside our network for extra privacy.
Fewer mistakes, less rework
Because mail from strangers never enters the system, there are no guesswork filters to tune. Good mail is not buried and bad mail is not “almost” blocked. You spend less time checking junk folders and rescuing lost messages.
Point in time recovery
Mistakes happen. With structured database storage, you can restore messages or folders to how they looked before a change. Search stays fast and recovery is simple.
Audit ready controls and logs
You set clear permissions for billing, user management, and messaging rules. Actions are recorded so reviews are straightforward. This helps teams in health care, finance, education, and other sensitive fields show how access is managed.
Safer for families, schools, and seniors
Only approved contacts can reach students and older adults. This helps prevent cyberbullying, fraud, and harassment from outsiders. Parents and staff gain peace of mind without adding extra tools.
Works with what you already use
Keep your office suite for documents and meetings. Use Desired Email for calm, private messaging with the people who matter. For outreach to brand new prospects, you can still use an open mailbox and move real conversations into Desired Email when they are ready.
Lower total cost over time
A quiet inbox saves minutes every day, which adds up across a team. Blocking unknown senders and executable files before delivery reduces incidents and emergency fixes. Many organizations can retire separate spam and phishing add ons.
Help when you need it
You get short videos, a searchable knowledge base, and helpful chatbots for quick answers. Friendly humans are there when something is complex or sensitive. Onboarding is guided so you start strong.
Branded experience when it matters
Private labeling lets you use your name, colors, and domain. Clients, parents, patients, and donors see a consistent, professional presence. Trust grows when every message looks and feels like you.
Scales as you grow
You must start with one Primary as your hub. After this, you can add additional Primary, Dependent, or Portal accounts for each team, location, or even family members as needed. This hub and spoke setup keeps management simple and permissions clear as your organization grows.
PLAN WORDS. CLEAR MEANING.
Desired Email's Glossary of Terminology
This glossary is designed to educate our subscribers about terms and their meanings. Understanding these terms provides insight into Desired Email's features and security measures. This is a living document that will be continuously updated with new terms, helping you stay informed and protected as our platform evolves.
Term | Meaning |
---|---|
Accepted | You are open to receiving messages from this user. |
Algorithm | A set of step-by-step instructions or rules designed to perform a specific task or solve a problem. In computing and security, algorithms are used to process data, such as encoding and encryption, by following precise methods to transform information securely or efficiently. |
Amazon Web Services (AWS): | This is a comprehensive cloud computing platform provided by Amazon. AWS offers a wide range of cloud services, including storage, computing power, networking, databases, and security, enabling businesses to scale and manage their operations efficiently in the cloud. Many organizations use AWS for secure data storage, application hosting, and cloud infrastructure management. |
Application: | A software program designed to perform specific tasks for a user. Applications can range from email platforms like Desired Email to word processors, mobile apps, and more. Applications are typically installed on devices or accessed via the web. |
Application Hosting: | This is the process of running and managing software applications on remote servers instead of local computers. It allows users to access the application over the internet, providing scalability, security, and performance without needing to manage the underlying hardware. Services like AWS are commonly used for application hosting. |
ART (Authorization Request Token): | An ART is a unique 64-character message that acts as a secure link between two users as part of the Selective Messaging feature. It contains all the necessary details to connect accounts safely. The recipient can review information from the sender, and then decide whether to accept or deny the connection.
|
Attachment: | A file or document that is included with an email message, allowing the recipient to download or view additional content beyond the email's text. Attachments can be various file types such as documents, images, audio, videos, or other digital media. |
Audio: | Sound files, such as voice recordings or music, which can be sent as attachments to convey auditory information. |
Auto Sorting: | A feature that automatically organizes incoming messages into categories or folders based on predefined criteria, such as sender, subject, or message content, helping users manage their inbox efficiently. |
Binary Code: | A system of representing digital data using two symbols, typically 0 and 1. Each 0 or 1 is called a bit, and combinations of these bits form the foundation of all digital systems, including computers, smartphones, and email communication. Binary code is the most basic form of data representation used to process and store information electronically. |
Binary Media: | Binary media refers to file types that include non-text content such as images, videos, audio, and interactive content. These are typically used for rich media content that can be attached or embedded within emails. |
Bit: | The smallest unit of digital data in computing represented as either a 0 or a 1 in binary code. Bits are the building blocks of all digital communication and processing. |
Blocked: | You permanently block all messages and prevent future connection attempts from this user. |
Byte: | A unit of digital data typically made up of eight bits. Bytes are used to measure file sizes and storage capacity, with larger files being measured in:
|
Blacklist: | This is a list of email addresses or domains that are blocked from sending messages. These addresses are identified as SPAM or potentially harmful, and emails from them will not reach your inbox. |
Closed Messaging System: | This is a feature that restricts email communication to only those within the network, significantly reducing the likelihood of receiving SPAM, phishing, or other external threats. |
Closed Network: | This is a private network where only authorized users within the system can send and receive messages. This setup enhances security by limiting external access and reducing the chances of unauthorized communications. |
Cloud Infrastructure Management: | This is the process of overseeing and controlling cloud-based resources, such as servers, storage, and networking. This includes monitoring performance, optimizing usage, ensuring security, and managing costs. Cloud infrastructure management enables businesses to efficiently scale their operations and maintain the reliability of their cloud services. |
Cloud Services: | On-demand computing services, such as storage, databases, networking, and software, delivered over the internet. Cloud services allow users and businesses to access technology resources remotely without having to own or maintain physical hardware. |
Data: | Information that is stored, processed, or transmitted electronically. Data can include text, numbers, images, audio, videos, and other digital content. In the context of Desired Email, data refers to the information contained in emails, attachments, metadata, and other forms of communication that are securely stored and transferred within the platform. |
Data at Rest: | Information that is stored on a device, server, or cloud system and not being actively transmitted. Desired Email ensures that data at rest is securely encrypted and encoded to protect against unauthorized access. |
Data Encryption & Encoding: | These security measures transform your messages into formats that only the intended recipient can access. This protects your information from being viewed by unauthorized individuals. |
Data in Transit: | This is the information that is being transferred over a network. Desired Email encrypts and encodes data in transit to safeguard it while moving between servers or devices. |
Data Retention: | These policies and practices govern how long email data is stored and available. Desired Email offers secure storage with policies that respect user privacy and compliance with data retention regulations. |
Database: | A structured collection of data stored electronically. Databases allow for the efficient storage, retrieval, and management of large amounts of information, often used for secure data storage, processing, and organization. |
Database Storage: | A structured method of storing data that allows for efficient organization, retrieval, and management. In Desired Email, database storage is used to securely store emails, attachments, and user data in a way that allows for quick access and improved performance. Unlike raw storage, database storage provides enhanced security, scalability, and the ability to manage large amounts of information more effectively. |
Decode: | This is the process of converting encoded or compressed data back into its original, readable form. In the context of emails, decoding allows the recipient to view the message or attachment in its intended format. |
Decryption: | The process of converting encrypted data back into its original, readable form. Decryption requires the correct encryption key to access the data, ensuring that only authorized users can view sensitive information. |
Denied: | You completely stop all messages and remove this user from your connections. |
Dependent Account: | Linked to a Premium Account, the Dependent Account comes with 4 GB of database storage. It has permissions set by the Premium Account holder, allowing for tailored control. This is a lower-priced but effective subscription account ideal for minors and most mid to lower-tier employees. |
Digital Data: | Information that is stored, transmitted, or processed in a digital format using binary code (comprising 0s and 1s). Digital data includes text, images, videos, audio, and other multimedia elements that are stored on electronic devices or transmitted across networks. It forms the basis for all electronic communications, including email. |
Domain: | This is a unique name that identifies a website or service on the internet. In email, the domain is the part of an email address that comes after the "@" symbol, representing the email provider (e.g., desiredemail.com). |
Email: | This is a method of exchanging digital messages over the internet. An email consists of a message body, which may include text, images, or links, along with sender and recipient information, and can include attachments. |
Embedded: | This refers to hardware or software that is integrated into a system or device for a specific function. In technology, embedded systems are often designed to perform specialized tasks within larger systems. |
Encoded: | This is the process of converting information or data into a different format using a specific algorithm, often for transmission or storage. Desired Email secures sensitive metadata, such as "To" and "From" fields, by encoding it. This ensures that even if intercepted, the information is not easily readable, adding an extra layer of privacy alongside encryption for data in transit and at rest. |
Encryption: | A security process that transforms information into an unreadable format using complex algorithms, ensuring that only authorized individuals with the correct decryption key can access the data. Encryption is used to protect sensitive information from unauthorized access, both while in transit and at rest. |
Encryption Keys: | The cryptographic keys used to encode and decode messages, ensuring only authorized recipients can access the information. Desired Email does not store encryption keys on its servers. |
Executable File: | This is a type of file that contains a program or script that can be run directly by a computer's operating system. When opened, an executable file conducts specific tasks or instructions encoded within it.
|
False Negative: | An incorrect assessment where a malicious or unwanted email is mistakenly classified as safe, allowing it to pass through the filters undetected. |
False Positive: | This is an incorrect identification of a harmless email as SPAM or a security threat, causing it to be mistakenly blocked or flagged. |
Gigabyte (GB): | This is a unit of digital information storage equivalent to 1,024 megabytes (MB). In the context of email and data storage, GB refers to the amount of space available for saving emails, attachments, and other data. More GBs provide greater storage capacity for users. |
Hardware: | This is the physical components of a computer system, such as the processor, memory, storage devices, and networking equipment. Hardware forms the foundation on which software and digital processes operate. |
HIPAA (Health Insurance Portability and Accountability Act): | A United States law designed to protect sensitive health information from being disclosed without the patient's consent or knowledge. It ensures that organizations handling personal health data follow strict privacy and security standards. |
Hypertext Markup Language, Version 4 (HTML4): | A standard language used to create and structure content on the web, such as text, images, links, and forms. HTML4 was introduced in 1997 and became widely used for building websites. It defines how elements like headings, paragraphs, tables, and multimedia content are displayed in a web browser. Although newer versions like HTML5 have since been developed with more advanced features, HTML4 remains a foundational web technology. It supports the basic structure of web pages but lacks some of the multimedia and interactive capabilities present in HTML5. |
Images: | The visual representations such as photographs, illustrations, or digital graphics that can be included as attachments or embedded within emails. |
Interactive Content: | Media that allows users to engage or interact with the content, such as clickable buttons, forms, or multimedia presentations, enhancing user experience within an email. |
JavaScript ES6 (ECMAScript 6 or ECMAScript 2015): | A major version of JavaScript, the programming language used to create interactive and dynamic content on websites. ES6 introduced significant new features to JavaScript, improving its functionality and usability for developers. Some of the key features include:
|
Kilobyte (KB): | This is a unit of digital information storage equivalent to 1,024 bytes. Kilobytes are typically used to measure the size of very small files or portions of data, such as text documents or small images. |
Local Area Network (LAN): | This is a network that connects computers and devices within a limited geographic area, such as a home, office, or building. LANs allow devices to share resources, such as printers, files, and internet connections. LANs are typically faster and more secure than wide-area networks (WANs) due to their localized nature. They can be wired (using Ethernet cables) or wireless (using Wi-Fi). |
Living Document: | A document that is continuously updated and revised to include the most current information. As Desired Email evolves, the glossary will be regularly updated with new terms and features to reflect ongoing changes. |
Malware: | Malicious software designed to harm your device or steal data. Common types include:
|
Malware Protection: | This explains the measures taken to prevent malicious software. Desired Email blocks executable files from running on our system, protecting you from ransomware and other threats. |
Megabyte (MB): | This is a unit of digital information storage equivalent to 1,024 kilobytes (KB) or about one million bytes. MB is commonly used to measure the size of smaller files, such as documents or images, and email attachments. |
Metadata: | This is the data that provides information about other data. It summarizes basic details about data, such as the author, creation date, file size, or "To" and "From" fields in emails. Metadata helps organize, find, and understand data, but it does not include the content of the data itself. In Desired Email, metadata is often encoded to protect sensitive information such as sender (From) and recipient (To) details. |
Multimedia Presentation: | This is a type of presentation that combines different forms of content such as text, images, audio, video, and interactive elements to convey information in an engaging and dynamic way. Multimedia presentations can be used in emails to enhance communication and the user experience. |
Network: | This is a system of interconnected computers, servers, and devices that exchange data and share resources. Networks can be local (LAN) or global (internet), allowing users to communicate and access information over connected systems. |
Operating System (OS): | This is the fundamental software that manages a computer's hardware and software resources, enabling other programs and applications to run. The operating system controls tasks such as memory allocation, file management, and user interaction. Common operating systems include Windows, macOS, Linux, and mobile platforms like Android and iOS. In the context of Desired Email, the platform is compatible with certain operating systems that support specific web browsers and features. |
Permissions: | The level of access or control granted to a user over certain features or information within Desired Email. Permissions determine what actions a user can take, such as sending messages, viewing data, or managing account settings. |
Phishing: | Fraudulent attempts to steal sensitive information, such as passwords or bank details, by pretending to be a trustworthy source. |
Portal Account: | Connected to a Premium or Dependent Account, the Portal Account offers 2 GB of database storage and enables secure communication with up to one hundred clients, contractors, patients, or vendors. While Portal clients can communicate with their Premium or Dependent Account holder, they cannot connect with other Portal clients. Though it lacks Selective Messaging, this account is a very inexpensive and secure solution for professionals managing several contacts. |
Premium Account: | As the highest-level subscriber account, the Premium Account offers 6 GB of database storage, enhanced security features, and priority support. It is perfect for parents or business executives, providing the ability to set permissions for Dependent Accounts and manage multiple users with ease. Premium users enjoy greater control over messaging and advanced management tools. |
Private Label: | A feature that allows businesses to customize their Desired Email platform with their own branding, offering a personalized, professional touch. |
Protocols: | Protocols are standardized rules and procedures that govern how data is transmitted, received, and interpreted across networks. They ensure that devices, software, and systems can communicate effectively and securely, regardless of differences in hardware or platforms. Networking protocols are essential for maintaining the integrity, speed, and security of data transmission. |
Ransomware: | This is Malware that locks or encrypts your data and demands payment for its release. |
Ransomware Protection: | These are measures taken to prevent malicious software that encrypts a user's data and demands payment for its release. Desired Email prevents attachments from executing when clicked to prevent such threats from entering the system. |
Raw Storage: | This is a basic form of data storage where information is saved without any organization or structure. Unlike database storage, raw storage lacks indexing and management capabilities, making it more difficult to retrieve and organize data efficiently. It is typically less secure and less scalable compared to structured methods like database storage, which is why Desired Email uses database storage to offer better performance, security, and data management for its users. |
Reported: | You notify Desired Email of any suspicious activity from the Sender, such as SPAM or phishing attempts. |
Rich Media Files: | These are files that contain multimedia elements such as images, videos, audio, and interactive content. These files provide a more engaging experience than text-only files and are commonly used in email attachments to enhance communication.
|
Scalability: | The ability of Desired Email to grow with you, adapting to the increasing needs of businesses. |
Secure Sockets Layer (SSL): | A standard security protocol used to establish an encrypted link between a web server and a browser. SSL ensures that all data transmitted between the server and the browser remains private and protected from unauthorized access. SSL is commonly used to secure online transactions, emails, and sensitive communications. |
Selective File Control: | A feature that allows users to choose the types of files (e.g., text-only or multimedia) they are willing to receive from specific contacts, enhancing security and reducing the risk of malicious attachments. |
Selective Messaging: | This is a unique feature of Desired Email that allows users to control and restrict who can send them messages and what types of files they can receive. With this feature, you can accept communications from approved senders and decide whether to allow text-only messages or include attachments. This ensures greater privacy and protection from SPAM, unwanted messages, and/or malware, effectively eliminating them from your inbox. (ART is a part of this feature.) |
Sender: | This is the individual initiating the connection, using the 64-character ART message to request communication with the recipient. |
Server: | This is a computer or system that provides data, resources, or services to other computers (clients) on a network. Servers can host applications, store data, or manage network traffic. |
Software: | This is a collection of instructions and data that tell a computer how to perform specific tasks. Software includes operating systems, applications, and programs used to run processes on hardware. Desired Email is a software service that manages secure communication. |
SPAM: | These are unwanted emails that clutter your inbox with irrelevant or potentially harmful content. |
SPAM Filter: | A system designed to detect and block unwanted or potentially harmful emails, such as SPAM, before they reach your inbox. The SPAM filter analyzes incoming messages based on certain criteria to determine whether they should be allowed through or flagged as SPAM. |
Storage: | This is the method by which data is saved and managed for retrieval. |
Subscriber: | An individual or entity who has signed up for a Desired Email subscription account and actively uses the platform's services. |
Subscription Account: | An account that provides access to Desired Email's services based on a recurring monthly or annual payment. Subscription accounts are available in three tiers:
|
Suspended: | You temporarily stop receiving messages from this user. |
Terabyte (TB): | This represents 1,024 GB or about one trillion bytes which is used to measure very large data storage, such as cloud or server storage for businesses. |
Text: | Digital data consisting of letters, numbers, and symbols used to create documents or messages. |
Third Party: | This is an individual or organization that is not directly involved in a transaction, process, or interaction between two primary parties. |
Two-Factor Authentication (2FA): | This is a security process where users provide two different authentication factors to verify their identity, adding an extra layer of protection. Common methods include a password plus a code sent to a phone or email. |
Unauthorized Communication: | This refers to any communication that occurs without the permission or consent of the intended recipient or within a system. |
User Privacy Controls: | Features that allow users to manage and customize the visibility of their information, decide who can contact them, and choose the types of messages and files they can receive, ensuring a higher level of privacy. |
Videos: | This refers to multimedia files that display moving images, often accompanied by sound, providing dynamic visual content in emails or attachments. |
Viruses: | These are programs that can replicate and spread to other devices, often causing damage. |
WAN (Wide Area Network): | This is a telecommunications network that extends over a large geographic area, often connecting multiple local area networks (LANs) across cities, countries, or even globally. WANs enable devices in different locations to communicate and share resources, typically using public infrastructure like the internet or leased lines. Unlike LANs, WANs cover broader areas and often rely on routers and other advanced networking technologies to maintain secure, reliable connections between distant networks. |
Whitelist: | This is a list of approved email addresses or domains that are allowed to send messages to your inbox. Selective Messaging can function as a form of whitelisting, ensuring you only receive messages from trusted sources. |
Worms: | Malicious programs that spread across networks by exploiting vulnerabilities. |
Zero Data Selling: | Desired Email never sells your personal data to third parties, ensuring complete privacy for all users. |
WE ARE HERE TO HELP
Contact Us
Thank you for being here. We are excited to hear from you. Your questions and ideas help us serve you better. Whether you want more information, need help, or are ready to get started, we will support you. We keep our guidance simple and clear. You will never be rushed.
Please reach out at support@desiredemail.com
A friendly person will read your message and reply with care. We will never ask for your password or your encryption keys (your secret keys). If you ever get an email that claims to be us and asks for a password or key, do not click any links. Please forward it to support@desiredemail.com so we can help.
If your note is time sensitive, add URGENT to your subject line. Share only what you are comfortable sharing. We respect your privacy and keep your words private. We are honored to welcome you and earn your trust every day.