Identities
Cloaked identities are at the core of each of our products. Create, share, and save real working phone numbers, emails, passwords and more.
Features
A new way to think about security.
Woman with curly hair in a yellow sweater writing at a table with a laptop, coffee cup, and notebook near a window.
Protect your privacy
Cloaked identities, or Cloaks, are the foundation of our product. You can use them in any situation where someone is asking for your personal information.
Young man in a black jacket sitting indoors, focused on his smartphone with a laptop and notebook on the table.
Real working information
Make new phone numbers, emails, and logins in seconds and start communicating using Cloaked phone numbers and emails.
Person wearing a cream sweater holding a smartphone with three cameras above a marble table with a ceramic cup.
Dedicated inbox
Keep your inbox clean. Cloaked collects all calls, texts, and emails sent to your identities and stores them in one place.
Smiling woman working on a laptop in a bright, modern cafe with large windows.
Online and in real life
Never fear giving out your personal info again. Use Cloaked identities 
to protect your privacy anywhere you go.
There’s more to Cloaked.
Explore dozens more features to bolster your privacy and protect your security.
View Features
Mobile app screen titled Home with options to generate Number, Email, Password, Username, Card, and TOTP Code, and a section for ID Theft Protection.
Call Guard
Data Removal
Phone Number & Email Aliases
Cloaked Pay
Custom Fields
One-Time Passcodes
Dark Web & SSN Monitoring
ID Theft Protection
Encrypted Password Manager
VPN
AI Defense
Privacy Law
AutoCloak AI
Privacy Law
Mobile app screen titled Home showing options to generate new Number, Email, Password, Username, Card, and TOTP Code, with an ID Theft Protection message at the bottom.