01
addrproxy.com

Dryopteris filix-mas

Address Proxy

A forwarding layer between your identity and your physical location. addrproxy.com provides anonymous, verifiable mailing addresses that shield your real address from public records, commercial databases, and unwanted correspondence. Every piece of mail is scanned, catalogued, and forwarded to your specified destination through encrypted channels. No tracking. No retention beyond 72 hours. The address exists; you remain invisible behind it.

Think of it as a NAT for postal mail -- your private address space is translated through a public-facing proxy, and the outside world sees only the proxy endpoint. The architecture is simple. The privacy is absolute.

Radix systemata

01 — Registration

Generate a proxy address through our terminal interface. Each address is cryptographically bound to your account and valid for the duration you specify. No identity documents required. No verification beyond a working email.

02 — Interception

Mail arrives at the proxy address. It is opened in a secure facility, scanned at 600dpi, and the digital copy is encrypted with your public key. Physical mail is shredded within 72 hours unless you request forwarding.

03 — Forwarding

Encrypted scans are delivered to your inbox. Physical forwarding routes through three intermediate addresses before reaching your destination. The chain is rebuilt monthly. No single node knows both origin and endpoint.

Infrastructure

Distributed across 14 jurisdictions. Each proxy address maps to a physical facility in its registered country. Mail processing is air-gapped -- scanning systems have no network access. Images are transferred via write-once optical media to the encryption workstation.

Encryption

All scanned documents are encrypted client-side using your provided PGP public key. We never hold your private key. Encrypted payloads are stored for 72 hours, then overwritten with random data three times. The physical mail follows the same destruction protocol.

Audit Trail

Every proxy address maintains a cryptographic log of all mail received, forwarded, and destroyed. The log is append-only and signed with the facility key. You can verify any entry independently. We publish Merkle roots monthly.

Transverse section, dicotyledon
hello@addrproxy.com PGP: 0xAF29 3D8B 11E4 Warrant canary updated monthly No tracking. No cookies. No JavaScript analytics.
collected: 2026.02.26