Need help understanding Cloaked app before I keep using it?

I’ve been testing the Cloaked app for privacy and masking my real contact info, but I’m not sure if I’m using all the features correctly or if there are any hidden downsides. Can anyone share an honest Cloaked app review, including real-world pros, cons, and any issues with security, reliability, or customer support, so I can decide whether it’s safe and worth relying on long term?

I have used Cloaked for about a year. Short version. It does what it says, but you need to know some tradeoffs.

What it does well:

  1. Aliases for email
    You create unique emails for each site. They forward to your real inbox.
    You can pause or block any alias if it gets spammed or sold.
    Replying from your real inbox still keeps the alias as the sender, so your real email stays hidden.
    Example. I have 70+ aliases. About 10 started getting spam after signups. I killed those in 2 taps.

  2. Masked phone numbers
    You get phone numbers that forward to your real cell.
    You can receive texts and calls. You can turn off calls or texts per number.
    Good for dating apps, Craigslist, job applications, and random services.
    I nuked one number after a recruiter spammed me 15 times in 2 days.

  3. Masked credit cards
    Virtual cards with spending limits and per-merchant use.
    You set a cap like 10 dollars, one time use, or subscription with a max.
    Good for trials and shady looking sites. If they overcharge, the card fails.
    Saved me once when a site tried to bill me 5 times in a day.

  4. Data control
    You see which alias is tied to which service.
    So if “brandX_newsletter@…” starts spam, you know who leaked or sold your info.

Now the downsides and gotchas:

  1. Vendor lock-in
    All those aliases live in Cloaked.
    If Cloaked dies or you stop paying, you risk losing access to those channels.
    For important things like bank, taxes, health, I use a long term alias or my main email.

  2. Reliability
    Email forwarding works fine for me, maybe one delay issue in months.
    Phone calls are mostly fine, although once in a while a call fails or lags a bit.
    SMS codes from banks and 2FA usually work, but I do not trust them for critical logins.
    For 2FA, I prefer an authenticator app or my main phone number.

  3. Cost
    If you use it a lot, the subscription makes sense.
    If you make one or two aliases per month, it feels overkill.
    I use it for almost every signup, so it pays off for me.
    Check your usage patterns before you commit long term.

  4. Usability
    Mobile app is decent. Some UI quirks, but you learn it in a day.
    Desktop web is fine for managing lots of aliases in bulk.
    You need to stay organized.
    I name aliases like “amazon.shop@” or “dating.bumble@” so I know what is what.

  5. Hidden downsides people ignore:
    • If you forget which email or phone number you used for a service, recovery can get confusing.
    • Some services block forwarding or virtual numbers for verification.
    • Support desks sometimes get suspicious if your email looks too alias-like.

How to get the most out of it:

  1. Use labels and notes in Cloaked.
    Write down what each alias is for. Future you will thank present you.
  2. Separate by risk level.
    Low risk stuff like newsletters, random blogs, and coupons. Use Cloaked for everything.
    Medium risk like shopping, social media. Cloaked aliases plus backup recovery via your main email or authenticator.
    High risk like banks, government, medical. I keep those on my core email and phone.
  3. Keep a small list outside the app.
    I store the alias for critical accounts in my password manager notes.
    So if Cloaked has an outage, I still know what email I used at a bank or a major service.

Privacy angle:
They claim encrypted storage and a zero knowledge style approach for sensitive data.
I have not seen obvious red flags in their policy, but you still place trust in one company that sits in front of your communication.
If you give them everything, they become a single point of failure and a single place that knows a lot about your life pattern.
I treat it as a shield for spam and over-sharing, not as the core identity for mission critical accounts.

When I would use it:
• Dating apps
• Online shopping on unknown stores
• Short term services or free trials
• Giveaways and “enter your email” promos
• Forms that ask for phone when they do not need it

When I avoid it:
• Banks, brokerages, mortgage
• Medical portals
• Government or tax related accounts
• Long term things you need to access for 10+ years

If you keep using Cloaked, I would:
• Set a rule. Aliases for anything disposable or annoying.
• Keep critical stuff on your core contact info.
• Audit your aliases once every month, kill the noisy ones.
• Add notes so you do not get lost six months later.

So, no huge hidden catch, but you trade some convenience and trust in one app for better control of spam and data sharing.

I’ve been using Cloaked for a while too, and I mostly agree with @byteguru, but I’d add a few different angles and a couple spots where I actually don’t see it the same way.

1. Where Cloaked quietly shines

  • It’s really good at “identity compartmentalization,” not just spam control.
    I use totally separate alias “personas” per context: one cluster for work-adjacent stuff, one for hobbies, one for anything that might be a little sketchy. That mental separation alone makes it easier to nuke a whole slice of my online life if it gets noisy.

  • The masked numbers are actually great for outbound calls too.
    I use a dedicated alias number for marketplace sales so buyers never see my real phone. If that micro-world starts getting creepy, I just switch to a new number and my main life isn’t touched.

2. Where I partly disagree with using it less

@byteguru avoids Cloaked for almost all “serious” accounts like banks / medical. I’m more mixed on that.

  • For banks and government: I agree, use your real email and phone, or at least something you fully control long term. Too many security checks, and you really do not want to depend on a third party service in a crisis.

  • For things like job portals, some insurance accounts, or secondary financial services:
    I do use a Cloaked email, but I lock it in as a “semi-permanent” identity. I treat that alias almost like a real address, back it up in my password manager, and don’t rotate it. So I still get privacy benefits without the chaos of forgetting what I used.

3. Subtle downside people rarely think about

  • You are centralizing behavioral metadata.
    Yes, they encrypt stuff, but structurally they still see:

    • Which services you interact with
    • When you get emails / calls / texts
    • Rough patterns of your life
      If you’re super threat-model focused, that’s not trivial. You’re basically replacing “a bunch of companies know a bit about me” with “one company sits in front of almost everything.” For normal people that’s acceptable, for high-risk users maybe not.
  • Account recovery can be more brittle than it looks.
    If a site uses email as the only recovery path and that email is a Cloaked alias you later kill or lose access to, you’re stuck. I’d argue:

    • For any account you’d cry about losing, make sure you have at least two independent recovery routes: main email or authenticator, plus maybe Cloaked.

4. Things worth double checking before you commit harder

Ask yourself:

  • If Cloaked vanished for a week, what would actually break for you?
    If the answer is “I can’t log in to my bank, job portal, tax account, and my kid’s school,” then you went too far.

  • Are you okay with possible weirdness around SMS and short codes?
    I’ve had a couple services outright refuse virtual-style numbers, and a few codes arrive late. I don’t put truly time sensitive critical 2FA entirely on Cloaked. It’s a nice extra, not my main security layer.

5. How I’d tune your use of it

  • Use it aggressively for: newsletters, ecom stores, trials, dating, contests, random “download this PDF” forms.
  • Use it cautiously for: work-adjacent tools, long-running subscriptions, job boards. Pick a few “anchored” aliases and never change them without documenting it.
  • Avoid it for: anything tied to legal identity, government, retirement accounts, primary banking.

If you’re already testing it, I wouldn’t stop, but I’d run a quick audit inside Cloaked, tag what’s disposable vs semi-permanent, and store the important aliases next to their logins in your password manager so you’re not guessing 2 years from now.

Short take on Cloaked after real-world use

I’m in the same general camp as @byteguru and the other reply, but I’d slice it a bit differently.

Where Cloaked actually changes behavior (in a good way)

  • It forces you to think in “channels” instead of one global email / phone.
  • I use it to separate who can interrupt me vs who can only drop messages in a low‑priority bucket.
  • That focus control is underrated: turning off notifications for a noisy alias feels safer than unsubscribing from 40 places.

One place I disagree slightly
People keep saying “never use Cloaked for serious stuff.” I think that is too absolute.

  • For some medium‑stakes accounts, I prefer a Cloaked email over my real one because it lets me cut marketing spam without touching the core login.
  • The trick is not “serious vs not serious,” it is “recoverable vs not recoverable.” If you cannot easily recreate or recover it, stick to your primary email/number or at least have a backup route.

Pros of Cloaked app

  • Better compartmentalization of life contexts.
  • Easy to burn an identity if it leaks or gets sold.
  • Reduces inbox fatigue when used with filters and tagging.
  • Good for online selling, dating, and anything where you expect one‑off or short‑term contact.

Cons of Cloaked app

  • You are introducing a new single point of failure. Lose Cloaked or get locked out and some accounts become painful to recover.
  • Some services really do not like virtual numbers or forwarding schemes, especially for 2FA SMS.
  • Mental overhead: you must track which alias is “permanent” versus “throwaway,” or you will confuse yourself later.
  • Like the other poster hinted, you concentrate metadata with one provider, which some threat models find worse than spreading data.

How I’d refine your setup

  • Decide on 3 buckets:
    1. Core identity (bank, taxes, health) never on Cloaked.
    2. Long‑haul but noncritical (job boards, utilities, subscriptions) on stable Cloaked aliases that you treat as permanent.
    3. Disposable (newsletters, ecommerce, random sign‑ups) on aliases you are fine deleting monthly.
  • Mirror your important Cloaked aliases in your password manager so recovery paths are obvious.

If you keep using Cloaked, think of it less as “privacy magic” and more as structured risk management for your email and phone footprint.