Click here to close now.


News Feed Item

Enymity Goes Viral

RICHMOND, Va., Jan. 14, 2013 /PRNewswire/ -- Enymity has brought anonymity to the Internet and has revolutionized the way ecommerce transactions are being completed. Enymity does this by acting as a middleman for the consumer wanting to purchase products and services from the Internet. The purchasing process is facilitated by Enymity for the consumer. This is how it works; consumers first find the product or service they want to purchase, then gather the needed information to describe it to Enymity on their website, such as a screen shot, a sku # or item # along with the website URL address. Once Enymity receives the order, they go and purchase the item or service using their bank accounts and name and can even facilitate the shipping and handling, creating the first way a consumer can purchase any legal item they desire without the worry of anyone ever knowing they did. This is what Enymity calls the "Secrecy of Purchase," allowing the consumer to retain their security, privacy and anonymity when purchasing goods and services from the Internet.

Enymity started out as a business method to solve the problem for consumers of not being able to purchase products and services from the Internet, while simultaneously retaining their 4th Amendment Rights to privacy. The benefit to the additional problem of security and identity fraud was soon realized. If a consumer only gave their credit card information to one entity on the Internet, then they would eliminate the chance of fraud and theft on the Internet, plus they would avoid the high cost of monthly memberships to identity lock and monitoring type business. Naturally, there is a cost associated with the Enymity service, but most clients making just a few purchases a month generally pay less than the identity and bank monitoring company's monthly fees. Another great benefit is consumers do not have to surrender all their personal information to an identity monitoring company to begin with, which once again is another choice taken from the consumer that Enymity has restored.

Enymity is structured to provide the various levels of privacy a consumer may desire. The services offered range from the basic joining of a website service for $4.95 all the way up to their Specialized Service of $49.95 for facilitating the hiring of a private detective or lawyer in a divorce situation or the paying for a dinner companion for a business engagement. The cheapest service of $4.95 is for those consumers who want to join a religious, political, adult or other form of service offered by a website. The consumer simply goes to and registers and logs on with their anonymous email, preferably a new, recently created one with no name identification, and then they enter the URL website address and the desired purchase information, such as a preferred username and password in the proper fields. The order is placed with Enymity by the consumer paying Enymity the cost of joining the site plus the $4.95 service fee. Once Enymity receives the order, they place the order and then send the customer a "confirmation of purchase" email that includes their username and password to go to the purchased site and log on.

The Specialized Service works similarly but has a few more steps and a more hands on approach.  

Enymity's clients come from all walks of life and have various reasons for protecting their privacy, and especially what they purchase, from the prying eye of all the entities recording and documenting their data for mostly nefarious reasons. Clients of Enymity are individuals working in the public eye to individuals in the private sector. Let's face it, everyone has likes and interests they would rather not be known by others and in the worst case for that information to be used against them. If one does not want their bank or credit card company to know what they are buying, does not want to have to submit their financial information to many different and unknown vendors they buy from, or do not want to provide their identity, then is here to help.

Media Contact:

This press release was issued through eReleases® Press Release Distribution. For more information, visit

SOURCE Enymity

More Stories By PR Newswire

Copyright © 2007 PR Newswire. All rights reserved. Republication or redistribution of PRNewswire content is expressly prohibited without the prior written consent of PRNewswire. PRNewswire shall not be liable for any errors or delays in the content, or for any actions taken in reliance thereon.

Latest Stories
SYS-CON Events announced today that Machkey International Company will exhibit at the 17th International Cloud Expo®, which will take place on November 3–5, 2015, at the Santa Clara Convention Center in Santa Clara, CA. Machkey provides advanced connectivity solutions for just about everyone. Businesses or individuals, Machkey is dedicated to provide high-quality and cost-effective products to meet all your needs.
WebRTC converts the entire network into a ubiquitous communications cloud thereby connecting anytime, anywhere through any point. In his session at WebRTC Summit,, Mark Castleman, EIR at Bell Labs and Head of Future X Labs, will discuss how the transformational nature of communications is achieved through the democratizing force of WebRTC. WebRTC is doing for voice what HTML did for web content.
Docker is hot. However, as Docker container use spreads into more mature production pipelines, there can be issues about control of Docker images to ensure they are production-ready. Is a promotion-based model appropriate to control and track the flow of Docker images from development to production? In his session at DevOps Summit, Fred Simon, Co-founder and Chief Architect of JFrog, will demonstrate how to implement a promotion model for Docker images using a binary repository, and then show h...
As a CIO, are your direct reports IT managers or are they IT leaders? The hard truth is that many IT managers have risen through the ranks based on their technical skills, not their leadership ability. Many are unable to effectively engage and inspire, creating forward momentum in the direction of desired change. Renowned for its approach to leadership and emphasis on their people, organizations increasingly look to our military for insight into these challenges.
The IoT is upon us, but today’s databases, built on 30-year-old math, require multiple platforms to create a single solution. Data demands of the IoT require Big Data systems that can handle ingest, transactions and analytics concurrently adapting to varied situations as they occur, with speed at scale. In his session at @ThingsExpo, Chad Jones, chief strategy officer at Deep Information Sciences, will look differently at IoT data so enterprises can fully leverage their IoT potential. He’ll sha...
Today air travel is a minefield of delays, hassles and customer disappointment. Airlines struggle to revitalize the experience. GE and M2Mi will demonstrate practical examples of how IoT solutions are helping airlines bring back personalization, reduce trip time and improve reliability. In their session at @ThingsExpo, Shyam Varan Nath, Principal Architect with GE, and Dr. Sarah Cooper, M2Mi's VP Business Development and Engineering, will explore the IoT cloud-based platform technologies driv...
SYS-CON Events announced today that DataClear Inc. will exhibit at the 17th International Cloud Expo®, which will take place on November 3–5, 2015, at the Santa Clara Convention Center in Santa Clara, CA. The DataClear ‘BlackBox’ is the only solution that moves your PC, browsing and data out of the United States and away from prying (and spying) eyes. Its solution automatically builds you a clean, on-demand, virus free, new virtual cloud based PC outside of the United States, and wipes it clean...
The enterprise is being consumerized, and the consumer is being enterprised. Moore's Law does not matter anymore, the future belongs to business virtualization powered by invisible service architecture, powered by hyperscale and hyperconvergence, and facilitated by vertical streaming and horizontal scaling and consolidation. Both buyers and sellers want instant results, and from paperwork to paperless to mindless is the ultimate goal for any seamless transaction. The sweetest sweet spot in innov...
SYS-CON Events announced today that Key Information Systems, Inc. (KeyInfo), a leading cloud and infrastructure provider offering integrated solutions to enterprises, will exhibit at the 17th International Cloud Expo®, which will take place on November 3–5, 2015, at the Santa Clara Convention Center in Santa Clara, CA. Key Information Systems is a leading regional systems integrator with world-class compute, storage and networking solutions and professional services for the most advanced softwa...
"Matrix is an ambitious open standard and implementation that's set up to break down the fragmentation problems that exist in IP messaging and VoIP communication," explained John Woolf, Technical Evangelist at Matrix, in this interview at @ThingsExpo, held Nov 4–6, 2014, at the Santa Clara Convention Center in Santa Clara, CA.
The modern software development landscape consists of best practices and tools that allow teams to deliver software in a near-continuous manner. By adopting a culture of automation, measurement and sharing, the time to ship code has been greatly reduced, allowing for shorter release cycles and quicker feedback from customers and users. Still, with all of these tools and methods, how can teams stay on top of what is taking place across their infrastructure and codebase? Hopping between services a...
Containers are changing the security landscape for software development and deployment. As with any security solutions, security approaches that work for developers, operations personnel and security professionals is a requirement. In his session at @DevOpsSummit, Kevin Gilpin, CTO and Co-Founder of Conjur, will discuss various security considerations for container-based infrastructure and related DevOps workflows.
WebRTC has had a real tough three or four years, and so have those working with it. Only a few short years ago, the development world were excited about WebRTC and proclaiming how awesome it was. You might have played with the technology a couple of years ago, only to find the extra infrastructure requirements were painful to implement and poorly documented. This probably left a bitter taste in your mouth, especially when things went wrong.
DevOps and Continuous Delivery software provider XebiaLabs has announced it has been selected to join the Amazon Web Services (AWS) DevOps Competency partner program. The program is designed to highlight software vendors like XebiaLabs who have demonstrated technical expertise and proven customer success in DevOps and specialized solution areas like Continuous Delivery. DevOps Competency Partners provide solutions to, or have deep experience working with AWS users and other businesses to help t...
Enterprises can achieve rigorous IT security as well as improved DevOps practices and Cloud economics by taking a new, cloud-native approach to application delivery. Because the attack surface for cloud applications is dramatically different than for highly controlled data centers, a disciplined and multi-layered approach that spans all of your processes, staff, vendors and technologies is required. This may sound expensive and time consuming to achieve as you plan how to move selected applicati...