Business Problem
Despite cybersecurity measures, corporate staffs remain exposed to spam, hacking, network hijacking and even digital blackmailing (also called as Ransomware attacks), due to predictable patterns in corporate email IDs, even when their email addresses may not be publicly shared.
Why does it need to be addressed?
- This vulnerability increases security risks, financial risks and even reputational risks
- Thus highlighting the urgent need for privacy-first solution to safeguard digital identity and organizational integrity
- While also impacting staff’s productivity as well as mental peace
What is the probable solution?
- Spammers (or attackers to be precise), exploit publicly exposed data and leaked databases to target users and harvest email addresses from social media platforms
- They guess corporate email ID formats such as Firstname.Lastname or Firstname_Lastname, until messages don’t bounce, with Firstname.Lastname being the most common
- Transform standard email formats into cryptic IDs by scrambling first and last names to disrupt predictable targeting patterns
- Implement an AI-powered detection system, using machine learning to identify and eliminate toxic emails proactively
- Prevent malicious content from reaching staff inboxes, boosting security and preserving productivity through early intervention
How do we plan to solve it? - The Proposed Solution
We have broken the solution in two phases.
- Phase 1: Pattern Disruption Engine
- Phase 2: AI-Driven Toxicity Detection and Incineration Engine
Phase 1: Pattern Disruption Engine
Algorithmically scramble employee name formats in email IDs
For example pravin.dhayfule@website will become something like prdvya.luinhef@website
Obfuscate identity markers while maintaining internal addressability and communications
The staff members will not be permitted to share these cryptic email IDs to anyone outside the organization
Integrate seamlessly with email provisioning systems (e.g., Microsoft 365, Google Workspace)
These cryptic email IDs will be automatically tagged to the staff’s name in the corporate address book such that the users do not need to remember the email addresses and manually type them
Pros
- Scrambled naming conventions render email IDs highly unpredictable and resistant to guesswork
- Unique obfuscation ensures distinct email identifiers even for individuals with identical first and last names
- Social media-based harvesting becomes virtually ineffective due to the absence of standard patterns
Cons
- Cryptic email IDs, while enhancing security, may reduce memorability and require additional assistance
- Intelligent autocomplete functionality will be essential within corporate email clients to streamline recipient selection and maintain efficiency
- Despite internal safeguards, external data leaks from third-party services and vendors remain a residual exposure risk that must be actively mitigated
Current Status of Phase 1
Phase 1 is currently delivered as an offline MS Excel utility, freely available for download and use by system administrators to assist in generating cryptic email identifiers. Even if you have more than one staff member with similar Firstname and Lastname, the Excel formulae will generate multiple unique cryptic email IDs for the same name, so you don’t need to worry about running out of the variants.
How to use?
There are two options to use this tool.
Option 1: EncodeMe.xlsm (Standalone Excel File)
Launch the standalone Excel file and start generating secure, scrambled user credentials instantly. No add-in installation required. Perfect for quick deployment in corporate environments.
Option 2: EncodeMe-Addin.xlam (Advanced Excel Add-in)
For users needing enhanced flexibility, the EncodeMe-Addin.xlam add-in allows seamless formula replication across multiple Excel files. Although unsigned (prompting a standard Excel security warning), it’s fully offline and safe to enable, with no internet connectivity or external dependencies.
Watch this tutorial video to learn how to use the utility and apply its built-in formulae effectively
Phase 2: AI-Driven Toxicity Detection and Incineration Engine
Functional Flow: AI-Driven Email Obfuscation & Toxicity Elimination
Phase 2 transitions from a macro-enabled Excel utility to a robust, AI-powered web application, focused on automated identity obfuscation and intelligent toxicity elimination.
Designed for system administrators, the new interface will allow direct generation and management of cryptic email identifiers via a secure online dashboard. Each user will be assigned two distinct IDs to balance operational clarity with uncompromised security:
- The Public Facing Email Alias: A human-readable email address, serving as an externally visible identifier. This alias does not correspond to a physical mailbox but redirects seamlessly to the actual internal inbox through the Email Honeypot Server for scrutiny of the email message.
- The Actual Email ID:A system-generated cryptic address, mapped to the user’s secure mailbox. This ID remains undiscoverable from outside the organization, preventing unsolicited inbound communication and unauthorized targeting.
Inbound Email Processing Sequence
- External Delivery Attempt: An external sender initiates an email to a corporate user’s public-facing alias, a human-readable address that serves only as a redirect and does not correspond to a physical mailbox.
- Firewall & Proxy Server Interception: The corporate firewall forwards the email to the secure proxy gateway, also referred to as the Email Honeypot, where structured inspection begins.
Layered Processing Pipeline Within the Proxy Server
- Alias Mapper: Maps the incoming public alias to the user’s actual cryptic email ID, ensuring accurate routing without exposing internal address patterns.
- AI-Based Toxicity Detector: Performs a multi-tier scan to assess the safety level of the email, categorizing it as:
- Safe
- Moderately Safe
- Toxic
Detection Stages
Stage 1: Sender Reputation Assessment
- Validates the sender’s address and origin IP against global spammer intelligence databases.
- Emails flagged in this stage are routed directly to the Toxin Incinerator.
Stage 2: Content Integrity Check
- Analyzes the body for phishing traits, malicious links, and inappropriate language.
- Failed messages are diverted to the Incinerator to prevent exposure.
Stage 3: Attachment Screening
Uses corporate malware detection tools followed by Toxin Detector’s AI engine to scan for threats including:
- Malicious scripts (e.g., XSS payloads)
- Objectionable media
- Embedded links or executable content
Toxin Incinerator (Forensic Quarantine Module)
- Segregates and contains all emails classified as toxic or suspect.
- Removes all attachments and hyperlinks to prevent accidental interaction, even by investigators.
- Only moderately safe emails retain links and attachments and are available for deeper inspection.
- Access is restricted to the security incident response team via a controlled interface.
Final Mail Delivery
- Emails classified as safe are routed to the user’s actual cryptic mailbox, securely identified during the alias mapping stage.
- Toxic emails never reach the end user and are siloed for forensic review only.
Join Me in Shaping Phase 2
Phase 2 is ready to begin, and I am looking for visionary co-founders, who are passionate about privacy-first innovation, and digital identity protection. The high-level concept blue-print, which I have illustrated above, is intuitive and thoughtfully structured. Now it is time to build.
If you’re a technologist, strategist, or product builder eager to make a meaningful impact, let’s connect. Together we will shape the future of secure communication and transform this vision into a scalable, real-world solution.
These are the SMEs, whom I am seeking as co-founders.
Note: These are not salaried jobs but invitation for business partnership and will need investment in future during the realisation of the product and company formation.
Infrastructure & Security Co-Founder
An experienced specialist in Linux Administration, Firewall and Email Proxy Server Specialist. Help architect and maintain a secure, scalable email proxy infrastructure to support cryptic ID routing, threat interception, and seamless mail delivery.
Core Responsibilities
- Design and implement an email proxy layer to route and monitor inbound/outbound corporate traffic
- Enable real-time obfuscation, pattern masking, and threat detection within mail flow
- Ensure compliance with security protocols (SPF, DKIM, DMARC), email hygiene, and encryption standards
- Optimize performance, reliability, and scale across varied deployment environments
Preferred Skills
- Email Server & Proxy Design: Experience with Postfix, Exim, or custom SMTP servers
- Network Security & Protocols: Deep understanding of TLS, DNS, SMTP, IMAP, and POP3
- Traffic Inspection Middleware: Ability to develop plugins or hooks for content analysis
- Threat Response Systems: Integration with SIEMs, threat feeds, and alerting tools
Solutions Architecture Co-Founder
Accountable for the development and integration of the technology infrastructure, bringing together email obfuscation, secure proxy routing, and intelligent filtering into a cohesive, scalable system.
Core Responsibilities
- Define the Architecture of the modular systems for email obfuscation, proxy routing, and AI-based threat detection
- Develop and prototype key components, including pattern-disruption algorithms, proxy interceptors, and email classifiers
- Integrate cryptic ID workflows with enterprise-ready email platforms (Microsoft 365, Google Workspace)
- Evaluate and implement secure messaging protocols, custom SMTP extensions, and encryption layers
- Ensure technical interoperability between backend systems, DevOps environments, and client-facing utilities
- Collaborate hands-on with backend developers, DevOps, and ML engineers to solve system-level challenges
Preferred Skills
- System Architecture: Design and code microservices, modular pipelines, and secure APIs
- Backend Development: Experience with Linux Shell Scripting, Python, Java and Node.js
- Database Design: Experience with PostgreSQL, MongoDB, or other scalable systems
- Email Server Engineering: Custom SMTP logic, proxy filters, and mail-routing strategies
- Security Protocols: TLS encryption, SPF/DKIM/DMARC validation, zero-trust principles
- Dev-Ops Integration: Seamless CI/CD support, containerization, API endpoint orchestration
- Hands-on Leadership: Active code contribution, rapid prototyping, and technical mentorship
Full-Stack Engineering Co-Founder
Own the design, development, and delivery of core user-facing applications, admin portals, and integration layers, connecting cryptic ID generation and email security workflows across enterprise environments.
Core Responsibilities
- Develop responsive web interfaces for system administrators, corporate IT teams, and end-users
- Implement secure APIs and backend services that connect to obfuscation engines, proxy infrastructure, and filtering modules
- Optimize data handling and interactions with Third-Party Threat Databases, ML engines, and Admin dashboards
- Ensure seamless authentication flows, role-based access control, and integration with enterprise identity systems
- Contribute to architecture decisions, performance optimization, and cross-functional engineering effort
Preferred Skills
- Frontend Development: React, Angular, or Vue for building web user interfaces
- Backend Development: Experience with Python, Java and Node.js
- Database Administration: Experience with MySQL, PostgreSQL, MongoDB, or other scalable systems
- Integration Workflows: RESTful APIs, OAuth, SSO
- Security Best Practices: Role-based access, data encryption, secure session management
UX Strategy Co-Founder
Lead the end-to-end UX and product design strategy for web application, email proxy workflows, and filtering intelligence into clear, frictionless experiences for system admins, enterprise users, and IT stakeholders.
Core Responsibilities (apart from Wireframing and Visual Designing)
- Conduct deep-dive interviews and stakeholder workshops across admin, enterprise users, and IT personnel
- Map privacy concerns, trust factors, and workflow friction related to email identity and threat visibility
- Analyze behavioral patterns around email usage, security responses, and alert fatigue
- Define UX strategy for cryptic ID onboarding, email threat visualization, and admin control panels
- Develop user journeys and interaction flows tailored to enterprise and IT environments
- Translate research findings into adoption-oriented workflows and accessible interface concepts
- Collaborate with product and full-stack co-founders to iterate design patterns based on technical feasibility
- Monitor usage patterns post-deployment to drive continuous improvement and reduce cognitive load
- Ensure visual hierarchy and semantic labeling to support clear risk signaling and efficient email interaction
Preferred Skills
- UX Research & Strategy: Experience in mapping enterprise workflows, conducting stakeholder interviews
- Interaction Design: Proficiency in creating wireframes, prototypes, and responsive layouts
- Privacy-Centered UX: Ability to visualize obfuscation and risk mitigation workflows without exposing sensitive data
- Design Systems: Experience with token-based scalable design systems (Figma, Storybook, etc.)
- Accessibility & Clarity: WCAG compliance, multilingual UX, semantic labeling practices
- Behavioral Modeling: Understanding of user motivation, security anxiety, and habit formation in tech adoption
Sales & Marketing Co-Founder
Lead the go-to-market strategy, demand generation, and stakeholder engagement to bring privacy-first innovation to enterprises, institutions, and high-impact users.
Core Responsibilities
- Conduct competitive landscape analysis and identify target market segments across industries
- Define positioning statements aligned with privacy-first values, email security concerns, and identity protection
- Develop compelling narratives to communicate technical features as tangible enterprise benefit
- Architect multi-channel sales funnels tailored to IT decision-makers, system admins, and CIOs
- Launch outreach campaigns on LinkedIn, startup communities, and enterprise forums
- Build strategic partnerships and onboarding pathways for pilot customers and early adopters
- Collaborate on pitch decks, landing pages, product banners, and conversion-optimized copy
- Coordinate with UX and design co-founder to ensure visual storytelling clarity for demos and stakeholder presentations
- Create tailored messaging for different co-founder roles, investor interests, and ecosystem partners
- Define and monitor KPIs for sales performance, user activation, and funnel optimization
- A/B test messaging strategies and iterate on conversion flows based on real-world feedback
- Establish scalable revenue models, pricing structures, and customer success playbooks
Preferred Skills
- B2B Sales & Outreach: Building pipeline from early leads to enterprise clients
- Marketing Strategy: Privacy-centric branding, SEO, campaign execution
- Strategic Communication: Translating technical depth into business impact
- Analytics & Tools: Familiarity with CRM systems, ad platforms, and attribution modeling
- GTM Execution: Comfortable pitching, storytelling, and scaling outreach
Let's Talk
Interested in learning more or exploring a co-founder role?
Feel free to email me to start a conversation, and discover how you can contribute to this journey of busting the email toxicity once and forever. Let’s build something meaningful together.

