Documentation
Documentation for privacy.fish
Practical guidance on setup, retention, account recovery, compatibility, and the privacy assumptions behind the service.
OpenBSD setup
Basic OpenBSD notes for generating SSH keys and preparing for privacy.fish access.
Company Introduction and Philosophy
The company philosophy behind privacy.fish and why privacy and security are treated as primary product requirements.
User Manual
User-facing notes for account creation, SSH keys, payment, provisioning, mail access, sending, receiving, and deletion.
Email Infrastructure Architecture
A technical overview of the privacy.fish email infrastructure, trust boundaries, OpenBSD stack, and operational security model.
Risk Management and Compromise Response
How privacy.fish thinks about live compromise, impact boundaries, operational risk, and response after an incident.
Administrator Workstation Design
How the admin workstation is treated as replaceable infrastructure and rebuilt around minimal trusted material.
Privacy Information
Privacy information covering payment codes, one-time payments, provider exposure, server logs, and website data.
Jurisdiction
Why Norway was selected for privacy.fish and how jurisdiction affects logging, disclosure, and legal exposure.
References
Reference notes for account limits, supported domains, storage duration, compatibility, and operational assumptions.
Next step
Ready to use a privacy-first mailbox?
The service is designed for technical users who want stronger privacy guarantees and can work with SSH / SFTP.