ABOUT DESIRED EMAIL
About Desired Email
Desired Email is a consent-based email service designed to restore calm, control, and trust to everyday communication. It is a private email provider built for people who want a predictable, spam-free inbox without surveillance or pressure. Unlike traditional email systems that allow anyone to send messages and rely on automated filtering afterward, Desired Email requires permission before communication begins.
Once permission is granted, messages are handled automatically and organized within your inbox. Automation works quietly in the background without reading or analyzing message content. The result is a secure and predictable email experience where every message comes from a known sender.
How This Is Different at a Glance
Traditional email systems are open by default, which requires constant filtering and cleanup after messages arrive. Desired Email changes this model by requiring approval before communication begins. Automation is applied only after permission is established, creating a calmer and more predictable inbox experience.
How Permission Works
You decide who can contact you before messages are allowed to reach your inbox. Inside the Desired Email network, subscribers can communicate with other subscribers once permissions are set. You can email people outside the network, but they cannot reply unless they respond through a Portal Account.
Where to Go Next
If you want the simplest explanation of the model, read Why It Is Different next. If you want to understand risk and protection, read Threats and then How We Protect You. If you want to decide whether this fits your life, go to Who It Is For and then Subscriptions.
ENJOY EMAIL THE WAY IT WAS ALWAYS MEANT TO BE
Welcome to Desired Email
A Private, Secure, and Spam-Free Email Service Built for You
Desired Email is a live, United States-based private email service designed to give people control over who can contact them. It is built for individuals, businesses, and charities that want email to feel calm, clear, and secure again. This service is created to restore trust and simplicity to everyday communication.
Thank you for visiting Desired Email. We are glad you are here. From your first moment on this site, our goal is to make things easy to understand and comfortable to explore.
Built to Bring Back Peace of Mind
Email should help you communicate, not overwhelm you. Many people feel stressed when opening their inbox because it is filled with SPAM, scams, and messages that do not matter. That daily frustration is not how email is meant to feel.
Desired Email is designed to reduce noise and remove unwanted messages before they become a problem. By limiting who can contact you, your inbox becomes a place for meaningful communication again. This simple change can make a real difference in how your day begins and ends.
Freedom From Inbox Chaos
Over time, email has become crowded, distracting, and difficult to manage. Messages arrive from unknown senders, and important conversations get buried. This creates frustration and wastes valuable time.
Desired Email restores calm by allowing communication only from people you approve. You see messages only from trusted contacts, without distractions or unwanted interruptions. Your inbox becomes predictable, focused, and easier to use.
Peace of mind matters.
Protected by Strong Security and Privacy Controls
Your communications deserve protection. Messages in Desired Email are protected in transit and at rest using strong security methods. The To and From fields are encoded for added privacy, and encryption keys are never stored on Desired Email servers.
Desired Email supports HIPAA aligned communication and uses Stripe’s PCI DSS Level 1 secure systems for payments. We are proudly veteran owned and built with privacy and protection at the center. These protections are built into the system from the start, not added later.
This helps you communicate with confidence, clarity, and peace of mind.
Control Over Who Can Contact You
Your inbox belongs to you. You decide who can contact you and what they are allowed to send. Approving people first helps keep strangers and unwanted messages out.
If something does not feel right, access can be removed quickly. Control is always in your hands and can be adjusted at any time. This keeps your inbox safe, personal, and manageable.
What Happens After You Join
Getting started with Desired Email is simple and straightforward. After creating your account, you choose who is allowed to contact you. Only approved people can send you messages.
Your inbox starts clean from day one. New messages arrive only from people you trust, and permissions can be changed in seconds. You remain in control at all times.
Continue Exploring Desired Email
Thank you for taking the time to learn about Desired Email. We appreciate your trust and your interest. Our goal is to earn that trust every day.
Now that you know what Desired Email is and why it exists, the next step is understanding how your information and communications are protected. Please continue to How We Protect You to learn how security, privacy, and control are built into every part of Desired Email. This will help you evaluate the service with clarity.
A DIFFERENT FOUNDATION FOR EMAIL
Why Desired Email Is Different
Most Email Was Built for Access, Not Consent
Traditional email systems were designed to make communication open and easy to start. Anyone can send a message to anyone else, often without permission or a prior relationship. That design helped email spread, but it also created long-term problems.
Over time, openness turned into noise, risk, and lost trust. Filters and scans were added to manage these problems, but the underlying model stayed the same. Messages still arrive first, and problems are handled afterward.
Permission Comes Before Delivery
Desired Email is built on a different foundation. Communication begins with permission instead of assumption. People must be approved before they can contact you.
This shift changes how the inbox behaves. Instead of reacting to unwanted messages, you prevent them from arriving in the first place. Control happens first, not after disruption.
No Guessing About Who Is Allowed
Most email systems rely on automated guesses to decide which messages matter after they arrive. Those guesses can fail, allowing harmful messages through while blocking important ones. This creates uncertainty and wasted time.
Desired Email removes guessing about who is allowed to contact you. Once permission is granted, messages are handled automatically within your inbox. Every message you receive comes from an approved sender.
Privacy Without Content Surveillance
Many platforms rely on scanning, tracking, or analyzing messages to power features and filtering. This can create uncertainty about how personal communication is handled. Privacy can start to feel like a tradeoff.
Desired Email does not depend on reading or analyzing your content. Organization and protection come from structure and permission, not surveillance. Your communication stays personal.
A Simpler Inbox With Less Cleanup
Traditional inboxes often require constant cleanup. People spend time deleting, reporting, filtering, and organizing messages just to stay on track. That work never fully ends.
Desired Email reduces the need for cleanup by preventing unwanted contact in the first place. When messages arrive only from approved people, the inbox stays simpler. The experience becomes more predictable day after day.
Built for Real People and Real Life
Desired Email is designed for individuals, families, and organizations who want predictable and respectful communication. It supports daily life without demanding constant attention. The system stays simple as needs change.
Being different is not about adding features. It is about changing the foundation so communication stays controlled. Email works better when expectations are clear and access is earned.
Thirty Days With a Consent-Based Inbox
After thirty days of using Desired Email, most people notice the difference without thinking about it. The inbox stays organized, predictable, and easy to trust. Messages arrive only from approved senders and are handled automatically.
There is less sorting, less second guessing, and fewer interruptions. Email becomes something you check intentionally instead of something that demands attention. Over time, this experience becomes the expected way email should work.
UNDERSTANDING THE RISKS AROUND EMAIL
Email Threats
Why Email Is Commonly Targeted
Email is one of the most widely used digital communication tools in the world. It connects people across work, family, education, and organizations. That reach also makes it a frequent target for abuse.
Messages can be sent instantly and at scale. This allows malicious actors to attempt scams, impersonation, and unwanted contact with minimal effort. As a result, email remains a common entry point for digital threats.
Open Email Versus Consent-Based Email
Traditional email systems are open by default. Anyone can send a message, and automated systems attempt to determine safety after delivery. This requires constant scanning, guessing, and cleanup.
Desired Email uses a consent-based model. People must be approved before they can contact you. Automation applies only after permission is established.
The difference is not whether automation exists. The difference is when it is allowed to operate. That timing shapes what reaches the inbox.
PROTECTION BUILT INTO THE FOUNDATION
How Desired Email Protects You
Designed to Keep Your Inbox Calm, Private, and Safe
Your inbox should feel calm, private, and predictable. Most people face constant email risks without realizing how often messages are misleading, harmful, or unsafe. Desired Email is designed to protect you by requiring permission before communication begins.
Once permission is granted, messages are handled automatically within your inbox. Automation supports organization and control without reading or analyzing message content. This approach keeps your inbox peaceful while removing common email dangers before they ever reach you.
How Consent-Based Protection Works
You can only connect with other subscribers inside our network. You can email people outside our network, but they cannot reply unless they respond through a Portal Account. This is by design to protect you from the risks of open, unsolicited email.
We do not analyze your content or track your behavior. Protection comes from limiting who can contact you and what they are allowed to send. This approach keeps your inbox calm while reducing risk.
Why Email Feels Risky Today
Over time, email has become crowded and difficult to trust. Spam, scams, and fake requests arrive without warning and make people hesitant to open messages or click anything. Important conversations often get buried under noise and distractions.
Many email systems try to filter danger after messages arrive. That approach still allows harmful content to reach your inbox. Desired Email prevents problems by blocking unwanted access entirely.
Protection From Spam, Scams, and Impersonation
Spam and scam emails overwhelm inboxes with fake offers, misleading messages, and unwanted promotions. Attackers often pretend to be coworkers, vendors, friends, or trusted organizations. This makes it difficult to know which messages are real.
Desired Email blocks all unapproved senders before delivery. Only people you choose can contact you. Once a sender is approved, messages are handled automatically according to the permissions you set.
Protection From Phishing and Fake Sign-In Pages
Phishing emails try to trick you into signing in again or clicking urgent links. These messages are one of the most common causes of email-based security incidents. Even experienced users can be fooled by realistic messages.
Desired Email blocks unapproved senders by default. Once a sender is approved, message content is handled automatically according to your permissions. This reduces the risk of harmful clicks and helps keep your information safe.
Protection From Dangerous Files and Malware
Many malware infections begin with an email attachment or hidden link. These files can harm devices, steal information, or disrupt work and personal life. Email remains one of the most common ways malware spreads.
Desired Email blocks the execution of unsafe file types within the system. These controls apply automatically once a sender is approved and do not require user action. This helps protect devices and information while supporting controlled attachment use.
Protection When Trusted Contacts Are Compromised
Sometimes a trusted person or organization becomes compromised without knowing it. Attackers can use that access to send harmful messages that appear legitimate. This can happen in families, businesses, and organizations.
Desired Email limits what even approved senders are allowed to send. Attachment permissions and file execution rules always apply inside the system. If a trusted contact ever loses your trust, you can remove their access immediately.
Protection From Harassment and Unwanted Contact
Unwanted or hurtful messages can affect children, teens, adults, and older adults. When strangers can reach an inbox, harassment and emotional pressure can become a real problem. No one should feel unsafe opening their email.
Desired Email blocks all unapproved senders by default. Access can be removed instantly if something does not feel right. This keeps every inbox supportive, respectful, and safe.
Protection From Tracking and Hidden Surveillance
Some emails contain hidden tracking elements that monitor when and how messages are opened. These tools can be used for surveillance or unwanted data collection. Most users never see them.
Desired Email limits tracking by restricting message features and limiting communication to approved individuals. Messages are handled automatically without monitoring inbox behavior. Your inbox activity stays private.
Protection From Inbox Overload
Unwanted newsletters, marketing emails, and promotional messages create clutter and hide what matters most. Over time, inbox overload causes stress and makes it harder to focus on important communication. A quiet inbox helps you stay organized, calm, and in control.
Desired Email prevents unapproved senders from delivering messages. Your inbox stays organized and quiet. Every message has a purpose.
Why False Positives Are Reduced
Traditional filters guess which messages are good or bad. This causes false positives that block real messages and false negatives that allow harmful ones through. These mistakes are common in both personal and business email systems.
Desired Email avoids misclassification at the access level by using a selective approval model. Only approved individuals can contact you. This restores confidence in every message you receive.
Before and After Desired Email
Before Desired Email, inboxes feel noisy and unpredictable. Spam appears without warning, fake messages cause hesitation, and important conversations get lost. Opening email often feels stressful.
After Desired Email, inboxes feel calm and controlled. Only approved individuals can reach you. Communication becomes clear and dependable.
What You Get as a Desired Email Subscriber
You receive a calm inbox without strangers or surprises. Your personal, family, and business communication gains strong protection. Your messages remain private because we never read or scan message content.
You end each day with fewer interruptions and less risk. Your inbox works for you again. Control stays with you at all times.
A Safer Inbox Starts With Control
Your inbox should protect your time, your privacy, and your peace of mind. Desired Email blocks major email threats before they reach you by requiring permission first, and it organizes messages automatically after approval. Control remains clear, adjustable, and always in your hands.
A calm inbox changes everything.
BUILT FOR PEOPLE WHO WANT CONTROL AND PEACE OF MIND
Who Desired Email Is For
For Individuals Who Want a Calm Inbox
Many people want email to feel simple again. They want to open their inbox without stress, distractions, or messages from strangers. They want to know that what they see is worth their time.
Desired Email is for individuals who value control and predictability. It is for people who want communication only from trusted contacts. It is for anyone who wants email to feel calm and manageable each day.
For Families Who Want Safer Communication
Families often need email for school, accounts, schedules, and everyday coordination. Parents and guardians also want protection from unwanted contact, scams, and harmful messages. Children deserve communication that is respectful and age appropriate.
Desired Email is for families who want clear boundaries. It allows each inbox to receive messages only from approved people. This creates a safer, more supportive experience for everyone in the household.
For Businesses That Need Fewer Distractions
Businesses rely on email for clients, vendors, and internal coordination. When inboxes are flooded with spam and unknown messages, important communication gets buried. Time is wasted sorting email instead of doing meaningful work.
Desired Email is for businesses that want communication to stay intentional. It supports predictable contact rules and clear access. It helps teams reduce noise and focus on real conversations.
For Charities and Community Organizations
Charities and community groups often depend on email for coordination and outreach. They also face constant noise, scams, and impersonation attempts. These distractions can drain time and energy from the mission.
Desired Email is for organizations that want a calmer way to communicate. It helps keep contact controlled and respectful. It supports consistent communication without constant inbox cleanup.
For Anyone Who Values Privacy
Many people are uncomfortable with systems that track behavior or treat personal communication like data. They want privacy that feels clear and respectful. They want confidence that their inbox exists to serve them.
Desired Email is for people who want privacy without compromise. It is for those who want communication that stays personal. It is for anyone who believes trust should be built into the foundation.
BENEFITS YOU FEEL EVERY DAY
Other Benefits of Desired Email
Designed to Support Real Life
Email should support your life, not distract from it. Many inboxes were not built with security in mind and have become noisy, stressful, and hard to manage. Desired Email focuses on benefits that make communication calmer, clearer, and easier to trust.
Every benefit in Desired Email serves a purpose. Nothing is added unless it improves clarity, control, or peace of mind. This keeps your inbox simple and dependable every day.
Less Noise, More Focus
Unwanted newsletters, marketing emails, and promotional messages create clutter and hide what matters most. Over time, inbox overload causes stress and makes it harder to focus on important communication. A quiet inbox helps you stay organized, calm, and in control.
Desired Email removes noise by design. Only messages from approved people reach your inbox. Every message has a purpose, so you can focus without distraction.
Simple Control Without Complexity
Many email systems become confusing over time. Settings pile up, features overlap, and simple tasks feel harder than they should. This creates frustration instead of clarity.
Desired Email keeps control simple and easy to understand. You always know who can contact you and what to expect. Managing your inbox feels clear and confident, not overwhelming.
A Better Experience for Families
Families want communication that feels safe, predictable, and respectful. Parents and guardians want peace of mind, and children deserve protection from unwanted contact. Traditional email often fails to provide that balance.
Desired Email allows families to decide who can communicate with each inbox. Strangers are blocked by default, and access can be changed at any time. This creates a calmer, safer experience for everyone.
Clarity for Work and Organizations
Email plays a key role in work and organizational life. When inboxes are cluttered, important messages are missed and time is wasted. This reduces focus and productivity.
Desired Email helps communication stay clear and intentional. Messages arrive only from approved individuals. Teams and organizations spend less time sorting email and more time focusing on what matters.
Privacy That Respects You
Many platforms rely on ads, tracking, or scanning to generate revenue. This can leave people unsure about how their information is used. Privacy often feels like a compromise.
Desired Email respects your privacy by design. We do not read messages, sell data, or show ads. Your conversations stay personal and protected.
Consistency You Can Rely On
With traditional email, filters change and messages disappear without warning. This creates uncertainty and frustration. Over time, people lose confidence in their inbox.
Desired Email delivers the same predictable experience every day. The rules stay consistent, and your inbox behaves as expected. This reliability builds trust and confidence over time.
Benefits That Grow With You
Life changes, and communication needs change with it. An email system should grow without becoming complicated. Growth should not mean added stress.
Desired Email is designed to grow with you. Whether for personal use, family communication, or organizational needs, the experience stays simple and controlled. You never outgrow the benefits.
Why Desired Email Feels Different
Most email platforms add features that increase noise. Desired Email adds benefits that simplify communication and reduce disruption. This keeps the experience calm, clear, and easy to trust.
A Better Way to Use Email
Desired Email brings email back to what it should be. Clear communication, fewer interruptions, and greater peace of mind. Everything works together to support a calmer digital life.
When your inbox feels trustworthy, everything else feels easier. You spend less time managing email and more time focusing on what matters most. That extra time and clarity can carry into the rest of your day.
Take the Next Step
A better inbox starts with a better approach. Desired Email gives you benefits designed for real people and real life. You stay in control every step of the way.
CHOOSE THE PLAN THAT PUTS YOU IN CONTROL
Subscriptions
Simple Accounts Built Around Control
Desired Email offers three simple account types: Primary, Dependent, and Portal. Each plan is designed to keep strangers out, protect your privacy, and give you control over who may contact you. You can start simple and expand over time as your needs grow.
Every individual, family, or organization must start with at least one Primary Account. The Primary Account serves as the foundation for everything else in the system. From there, you may add Dependent Accounts, Portal Accounts, or even additional Primary Accounts as your needs grow.
Which Plan Is Right for You?
Desired Email is designed to grow with you, whether you are protecting your own inbox, caring for others, or communicating with a group. The system is structured to keep things calm, clear, and easy to manage. You can start small and add accounts over time as your needs change.
Primary Account
The Primary Account is for you and provides the highest level of control and storage. It allows you to approve who may contact you, manage account settings, and oversee any additional accounts you add. If you are setting up Desired Email for yourself, your family, or an organization, this is where you begin.
Most people start with one Primary Account. The Primary Account is $108 per year, or $13.50 per month with monthly billing. It includes 6 gigabytes of annual storage.
Dependent Account
A Dependent Account is for another individual who needs their own calm and private inbox. Just like a Primary Account, a Dependent Account allows the person using it to approve who may communicate with them. Additional permissions may be granted by the Primary Account if desired, while overall control remains clear and intentional.
Dependent Accounts are ideal for family members or individuals you support. The Dependent Account is $72 per year, or $9 per month with monthly billing. It includes 4 gigabytes of annual storage.
Portal Account
A Portal Account is designed for one-to-many communication. It allows up to 100 people to communicate safely with a Primary or Dependent Account holder. This makes it well suited for working with patients, students, clients, vendors, families, or community members in a controlled and private way.
Portal Accounts are best when many people need to reach you, but you want to stay in control. The Portal Account is $72 per year, or $9 per month with monthly billing. It includes 2 gigabytes of annual shared storage.
A Simple Way to Decide
If you are protecting your own inbox, start with a Primary Account. If you are adding protection for people you care for, add Dependent Accounts. If you need to communicate with a group, add one or more Portal Accounts.
You may add additional Primary Accounts if needed. You can start simple and expand with clarity. This keeps your setup controlled as your needs change.
Additional Storage
Each account includes annual storage. If you need more space, you may purchase additional storage in 1-gigabyte increments. Each additional gigabyte costs $18 per year or $2.25 per month.
Why Everything Starts With a Primary Account
The Primary Account exists to keep control simple and consistent. It acts as the central point that manages permissions, accounts, and subscriptions. This keeps your setup clear and prevents confusion as you grow.
In Desired Email, a customer is the person, family, or organization that owns the subscription. A customer may have one or many subscribers using accounts under that subscription. This structure makes it easy to manage individuals, families, and groups in one clear place.
Optional Business Services
Private Labeling and Custom Domain
Some organizations need email communication that reflects their own domain and brand. Desired Email offers optional private labeling for businesses and organizations that require this level of customization. This option is designed for structured, managed environments.
Private labeling allows communication to use a custom domain while keeping the same calm, private inbox experience. This is a one-time setup service priced at $3,600. It is optional and not required for individuals, families, or most organizations.
Most subscribers will never need private labeling.
Annual or monthly pricing, with full control from day one. Choose the plan that fits your life. Keep your inbox calm and predictable.
THE TEAM BEHIND A CALM, PRIVATE INBOX
Our Founders
Built With Care and Responsibility
Your safety, privacy, and ease always come first. Your inbox is designed to stay calm, simple, and under your control. Every choice is made to protect your time, reduce noise, and keep communication predictable.
Desired Email is veteran owned and led by three experienced entrepreneurs. They built this service together and continue to run it every day. The same people who designed the system are responsible for keeping it reliable and consistent.
They believe communication should be private, respectful, and predictable. This belief guides how the service is built and reviewed each day. It also shapes how decisions are made as the service grows.
How We Run the Business
Steady by Design
Strong companies serve people well. That is why careful planning and daily execution matter. Each step is reviewed to make sure the service stays dependable and easy to use.
Costs are managed, growth is paced, and quality is reviewed often. Security and support are part of daily work, not afterthoughts. This helps keep the service stable as more people use it.
Clear data and simple rules guide every decision. Daily operations are checked and improved to stay on time and on budget. This approach keeps the service reliable today and trustworthy for the long term.
Meet Our Leaders
Experience You Can Trust
John Keller, Co-Founder, Chief Executive Officer, and Software Developer
John keeps the service safe, fast, and stable. He designs and guides the private network that supports every message. He also sets the technical rules used to build, review, and improve the system.
His focus is security, steady performance, and smooth updates as the service grows. He works to make complex systems feel simple and dependable. John earned a Bachelor of Science in Information Technology and is currently completing a Master of Business Administration.
His work supports long-term stability and consistent protection. This approach keeps the system predictable. It also helps ensure reliable delivery and steady improvement.
Steven Moher, Co-Founder, Chief Financial Officer, and Software Developer
Steven keeps the company strong so the service stays dependable. He leads finance and helps shape the product with clear controls and careful planning. His work supports stability and long-term reliability.
He manages budgets, reviews results, and focuses on fair and affordable pricing. He also ensures clear reporting and thoughtful risk management. Steven brings more than thirty-five years of experience across finance and technology.
Steven earned a Master of Business Administration. He also earned a Master of Computer Information Systems and a Master of Accounting and Financial Management. His experience helps keep the service steady as it grows.
Alexander “Lex” Viera, Co-Founder and Chief Sales Officer
Lex focuses on making the experience clear and welcoming from the start. He leads growth and customer care with simple communication and steady support. His goal is to make every interaction easy to understand.
He builds friendly teams that respond quickly and provide clear guidance. He works to create long-term relationships based on trust and respect. Lex earned a Bachelor of Applied Science in Business Administration.
His work supports responsible growth and clear expectations. This helps people choose the service with confidence. It also helps promoters communicate the value with accuracy.
What Comes Next
Learn the Story
See how this vision took shape in Company History. Learn why each decision was made and how the service was built step by step. Each choice was made to protect your day and keep communication calm.
HOW YOUR NEEDS INSPIRED A NEW KIND OF EMAIL
Our Company History
Why We Built Desired Email
We started with a simple goal. We wanted to return peace of mind to everyday communication. We listened, researched, and rebuilt email with your needs guiding every decision.
What Sparked the Idea
Email was built to be convenient and widely available. Security was not a primary consideration when it was first designed. Over time, spam, scams, and malware turned email into something stressful instead of helpful.
Why Patches Were Not Enough
Most email systems rely on patches, filters, and scans after messages arrive. These tools try to fix problems that are already inside the inbox. We learned that this approach cannot fully solve the issue because the foundation itself allows unwanted access.
What We Learned From Listening
We listened to people across work, school, family life, and nonprofit service. They told us their inboxes were full of spam, scams, and hidden threats like malware and ransomware. They wanted simple control and trustworthy privacy without extra work.
The Three Questions That Guided Us
Why did email, which is essential to daily life, become so noisy and unsafe?
What do people truly need from an inbox to feel calm, private, and in control?
What kind of foundation could stop threats before they reach the inbox?
Why Email Still Dominates Daily Life
Email remains the most universal digital communication system in the world. More than 4.5 billion people use email globally, and over 360 billion messages are sent each day. People rely on email because it works across devices, providers, and time zones.
Email Use in the United States
In the United States, nearly nine out of ten people use email regularly. Email is used by individuals, families, businesses, schools, nonprofits, and government organizations. It remains the primary way important records, schedules, and notices are shared.
How Children Use Email
Most children in the United States use email by the time they reach school age. Email is often required for school accounts, homework platforms, and parent communication. Many children also use email for gaming accounts, subscriptions, and online services.
How We Built a Different Foundation
We designed Desired Email around one core principle. Your choices must come before message delivery. Control happens before a message reaches your inbox, not after.
From Research to Reality
Desired Email has been in development since 2019 and is available today. The system is fully functional, and we continuously improve it through testing, measurement, and refinement. Feedback and real-world use guide ongoing enhancements.
Where We Stand Today
Desired Email reflects years of listening, research, and careful design. It is patent pending and built with compliance and responsible operations at its core. Our history is about building differently so your inbox stays calm and predictable.
Looking Ahead
We will continue improving the service and responding to new threats. We will keep asking for feedback and sharing clear updates as we grow. Your needs will continue to guide what we build next.
TRUSTED PARTNERS AND STRONGER PROTECTION
Strategic Partners
| Partner | Description | Website |
|---|---|---|
| Amazon Web Services | A secure cloud services platform, offering computing power, storage, and content delivery. | https://aws.com |
| Handshake (College Recruiting) | Handshake is a college-focused career platform that connects students and recent graduates directly with employers. | https://joinhandshake.com/ |
| Lois Whitestud | Creator of engaging doodle whiteboard animation explainer videos on fiverr.com | https://www.fiverr.com/s/Bkmdmy |
| Stripe Payment Services | A secure online payment processing platform that enables businesses to accept payments online. | https://stripe.com |
A COMMUNITY BUILT AROUND CALM, CONTROL, AND RESPECT
Our Community
Desired Email is a community of people who believe communication should feel calm, private, and intentional. These individuals value control, clarity, and respectful communication without noise or pressure. They join at their own pace because our mission (Making Email Great Again) makes sense to them.
Our community is already built and continuously growing. We are not pretending to be larger than we are or further along than reality. Growth is active and based on real people choosing to be here.
Desired Email keeps getting better, and all users enjoy every improvement that follows. This community grows through trust and alignment. Every person who joins supports that direction.
Awareness and Reach
As of January 1, 2026, Desired Email currently has more than 750 followers on LinkedIn and over 7,000 followers on TikTok, with new supporters joining regularly. These numbers are not framed as subscribers or usage but represent growing awareness and interest. Each follower is an individual choosing to pay attention to what we are building.
Our platforms allow people to watch progress, learn about updates, and stay connected as Desired Email continues to improve. Some people act immediately, while others watch until they are ready. Both choices are respected.
Promoters Across the United States
Promoters are beginning to come onboard and share Desired Email with individuals, families, businesses, and charities. They may promote anywhere in the United States. Each promoter chooses how they participate, whether that is focusing on subscribers or also referring new promoters.
Direction and pace are self-chosen. Support is available when needed, and participation is not forced. The goal is to build growth through clarity, trust, and alignment.
Being early matters. Early promoters are the first to build relationships, and the people they introduce now can define their long-term earning path. Starting early also gives you time to learn the system and build with confidence.
Colleges and Universities Where We Recruit
Desired Email is approved to recruit through colleges and universities across the United States on Handshake. This access does not imply endorsement. It means students and alumni at these schools are allowed to learn about the opportunity and apply if they choose.
Some of the colleges and universities where recruiting access is approved include:
- University of Texas at Arlington (Texas)
- Duke University (North Carolina)
- Stanford University (California)
- University of California – Los Angeles (California)
- University of Miami (Florida)
- Carnegie Mellon University (Pennsylvania)
- Arizona State University (Arizona)
- Vanderbilt University (Tennessee)
Recruiting access does not imply endorsement. This list is provided for transparency. It is intended to clarify access, not imply affiliation.
Why This Community Exists
Desired Email is for people who want communication that supports their life instead of interrupting it. It is for families who want safer communication, individuals who want privacy, and organizations that value control. It is also for early adopters who recognize that email needs a calmer, more intentional direction.
We are not focused on being the largest platform quickly. We are focused on being a platform that earns trust, grows responsibly, and stays aligned with its purpose. Strength now determines sustainability later.
Choose Your Next Step
Thank you for taking the time to learn about Desired Email and the community around it. We respect that every person moves at their own pace. Multiple options are available.
You may subscribe now if you want access to a calmer inbox and private communication. You may apply as a Promoter if you want to help others discover Desired Email and possibly earn from your activity. You may also follow our progress on social platforms and stay connected as we grow.
Wherever you begin is the right place.
You do not have to decide everything today, but you can take one step forward when you are ready. Starting early can help you learn the system and build momentum at a steady pace. If you choose to begin now, you can grow alongside the platform instead of trying to catch up later.
PLAIN WORDS AND CLEAR MEANING
Desired Email's Glossary of Terminology
This glossary explains common terms used in Desired Email. Understanding these terms helps you better understand our features and security approach. The definitions are written in plain language so you do not need a technical background. This is a living document that will be updated over time as the platform evolves.
| Term | Meaning |
|---|---|
| Authorization Request Token (ART) | A short, secure request used to ask to connect. You can send ARTs to others and receive ARTs from people who want to reach you. You see who is asking and why before anything begins. This keeps surprises out and gives you full control. It replaces open inboxes with consent before contact. |
| ART Statuses | Settings that help you stay in control of who can reach you. Each Authorization Request Token has a clear status so you always know what is happening. You can change a status at any time, whether you sent the request or received it.
|
| Approved Attachment | A file type that may be sent and received safely in Desired Email. Files that contain code are allowed to be sent but do not run inside the system. |
| Approved Contact | A person or organization you have allowed to message you after an Authorization Request Token is accepted. |
| Business Email Compromise (BEC) | A scam where someone pretends to be a boss, coworker, or vendor to trick you into sending money or data. Desired Email helps stop this by blocking strangers, requiring approval before messages start, and never running code from attachments. |
| Closed Messaging System | Only approved people can contact you. This greatly reduces spam and scams. Your inbox stays calm and clear. |
| Codes We Do Not Run | To protect you, files with code can be sent, but they do not run in Desired Email. If you need to use one, download it and open it on your device with a trusted app. See the FAQ: Codes we do not run (for your safety). |
| Contact Request | A request to connect with someone using an Authorization Request Token. Messages cannot begin until the request is approved. |
| Consent-Based Messaging | A messaging model where communication starts only after both sides agree. Messages do not arrive by default. This approach removes spam, reduces scams, and keeps control with the person receiving messages. |
| COPPA (Children’s Online Privacy Protection Act) | A United States law that protects the online privacy of children under the age of thirteen. It sets rules for how personal information from children may be collected, used, and shared by online services. |
| Cyberbullying | Mean or harmful messages sent to scare or shame someone, often kids or students. Desired Email helps reduce this risk because only approved contacts can message you, and parents or schools can pause or block senders. |
| Database Storage (used by Desired Email) | A structured way to keep messages and files organized. Search is fast, records stay tidy, and you can restore to an earlier time. |
| Desired Email (DE) | A private email network that protects your time and privacy. Only people you approve can reach you. Your encryption keys stay with you and your contact, never on our servers. |
| Desired Email Account Types | Pick what fits your life and grow as needed.
|
| Desired Email World | Everyone using Desired Email across all families, schools, teams, and businesses. Primary and Dependent accounts can connect with people in the DE World after you approve an ART. Portal accounts do not message the DE World. They message only the Primary or Dependent who manages the Portal. |
| Encryption | A strong lock for your data. It scrambles messages so only you and your approved contact can read them. Desired Email uses encryption in transit and at rest. |
| Encryption Keys | Codes that lock and unlock messages. The keys stay with you and your contact, not on our servers. |
| FERPA (Family Educational Rights and Privacy Act) | A United States law that protects the privacy of student education records. It gives parents and eligible students rights over how education records are accessed and shared by schools and education providers. |
| Interactive Media Files | Files that can play, collect input, or run code. They can be sent, but they do not run in DE for safety. Download to use them on your device. See the FAQ: Interactive media files (examples and how they work). |
| Malware | Harmful software that tries to damage devices or steal data. Desired Email helps block it by never running code and allowing only approved people to message you. See F.A.Q.:Malware types we block. |
| One-Way Messaging (outside Desired Email) | Reach anyone outside your Desired Email inbox. Replies do not return to your inbox. Use this for first contact. For ongoing two-way messaging, add them to your Portal, which uses one slot. |
| Phishing | Fake messages that try to steal passwords or money. Because strangers cannot reach you, phishing is far less likely. |
| Point-in-Time Recovery | Undo mistakes by restoring messages or folders to how they looked before a change. |
| Selective Messaging | You choose who may contact you and what they may send. This removes spam and keeps your day focused. |
| Spam | Unwanted messages that waste time. By allowing only approved contacts, we keep spam out so you can focus on what matters. |
| Zero Data Selling | We never sell your personal data. Your messages and metadata stay private. You can use DE with confidence. |
WE ARE HERE TO HELP
Contact Us
Thank you for being here. We are glad you reached us and we value every question and message. Your feedback helps us improve and serve you better over time. Whether you want more information, need help, or are ready to get started, we are here to support you.
Our goal is to keep guidance simple, clear, and respectful of your time. You will never be rushed or pressured when you contact us. We believe good support should feel calm, human, and easy to understand.
Please reach out at support@desiredemail.com
A real person will read your message and respond with care. We will never ask for your password or your encryption keys, which are your private keys. If you ever receive a message claiming to be from us that asks for sensitive information, do not click any links and please forward it to us so we can help protect you.
If your message is time sensitive, add URGENT to the subject line so we can prioritize it. Share only what you are comfortable sharing, as we respect your privacy at all times. We are honored to welcome you, answer your questions, and earn your trust every day.

