Metadata-free communication
AfterMail routes every message through a five-hop mixnet, strips all identifying metadata, and delivers through a protocol that has never heard your name. Familiar interface. Zero trace.
The Problem
End-to-end encryption was supposed to be enough. It isn't. The message content is protected. Everything else — who sent it, when, from where, to whom, how often — is logged, analyzed, and in many jurisdictions, legally compelled.
The encryption got stronger. The gap didn't close.
AfterMail is not a privacy feature bolted onto an email client. It is a layered architecture — network anonymization, identifierless messaging, and a familiar interface — designed from the routing layer up. Each layer independently defeats a class of surveillance.
Every packet is encrypted, padded to uniform size, and routed through five independent mix nodes before delivery. No single node knows both sender and destination. Timing correlation attacks — the method that breaks most private networks — are defeated at the packet level. Resistant to global passive adversaries.
SimpleX has no user IDs, no phone numbers, no email addresses. Connections are established via one-time invitation codes. Messages are delivered through disposable, single-direction queues. No global identifier connects your conversations to each other — or to you. XFTP extends these guarantees to file transfers.
An email-familiar interface over the Nym and SimpleX stack. Compose, send, receive. Inbox, sent, archived. The cognitive model you already have — without the surveillance architecture beneath it. At-rest encryption via passphrase-derived keys with biometric surface, remote wipe, and multi-device sync routed entirely through Nym.
Access Tiers
Full access to the AfterMail architecture. The security model does not degrade by tier. Every user gets five-hop routing and identifierless delivery.
Unlimited everything. For individuals and teams who need AfterMail as infrastructure, not a secondary channel.
Private deployment for defense, government, and organizations where the infrastructure itself must be owned. FedRAMP-aligned. No shared nodes.
Waitlist
AfterMail is in development. Join the waitlist to be notified at launch, receive early access, and help shape the product.
Your email is used once — to notify you. Then discarded.
Co-Founder
AfterMail is looking for a technical co-founder with a background in distributed systems, cryptography, or defense/FedRAMP. The stack is defined. The thesis is published. What's needed is someone who has solved hard infrastructure problems at scale and wants to build something that matters.
hello@aftermail.co →About
Vordan is a practitioner-focused governance and accountability publication. Since April 2026, it has tracked the accountability gap across cybersecurity, AI governance, post-quantum cryptography, and digital sovereignty — written for the people building and defending systems.
AfterMail is Vordan's first product. It emerged directly from the reporting: months of documenting how privacy providers comply, how metadata becomes the exposure surface, and how architectural gaps survive policy fixes. The doctrine is Accountable by Design: governance built in before deployment, not retrofitted after failure. Applied to communication infrastructure, that doctrine produces AfterMail.
Founded by Dominick Costa, a New York-based GRC practitioner and operations leader with 20 years running systems at scale.
Threat Model
An adversary observing traffic correlates senders and recipients by timing and packet volume, even without reading content.
Mitigated — Nym mixnetA provider logs who communicated with whom, when, from which IP, how often. Disclosed under legal compulsion.
Mitigated — SimpleX + NymUser accounts tie communications to a real-world identity. A single legal request retrieves an entire history.
Mitigated — no accounts existPhysical or remote access to a device allows recovery of messages, keys, and contact graphs.
Mitigated — passphrase keys + remote wipeA state-level adversary observing all internet traffic simultaneously attempts correlation attacks at scale.
Mitigated — Nym timing destructionIf the device running AfterMail is fully compromised at OS level, no communication layer can protect message content.
Out of scope — by design| Exposure surface | Gmail / Outlook | Proton Mail | Signal | AfterMail |
|---|---|---|---|---|
| Message content | Exposed | Protected | Protected | Protected |
| Sender / recipient identifiers | Exposed | Exposed | Phone number | None exist |
| Communication graph | Exposed | Exposed | Phone numbers | Not constructible |
| Timestamps and frequency | Exposed | Exposed | Registration date | Destroyed — Nym |
| IP address / location | Exposed | VPN mitigates | Sealed sender | Hidden — Nym routing |
| Network traffic analysis | Vulnerable | Vulnerable | Vulnerable | Defeated — mixnet |
| Legal compulsion disclosure | Full metadata | Account + IP metadata | Registration + last seen | Queue ID only |
Contact
For co-founder inquiries, early access, Sovereign tier discussions, or press — reach out directly.
Private Nym node deployment. Air-gap capable. DoD and FedRAMP-aligned architecture. Admin controls limited to Active/Inactive — no message access at any level.
Sovereign tier discussions are handled directly and confidentially.