This guide walks through the basic steps to start using Cloaked. You do not need to complete everything at once. Begin with the area you want to protect first.
Cloaked offers several privacy tools that work together, including identities, data removal, call protection, and private payments. Most users start with one feature and expand from there as they become more familiar with the platform.
1. Access Cloaked on Your Primary Device
Sign in to Cloaked on the device you use most often. Your account automatically syncs across all platforms, so anything you do on one device will appear everywhere else.
Mobile App
Best if your priority is managing calls, texts, and on-the-go privacy. Download it here.
Web Dashboard
Best for managing existing accounts, reviewing data removal progress, and handling subscriptions from a desktop browser. Visit it here.
When signing in for the first time, many Cloaked accounts use a phone number as the username. You may receive a one-time passcode via text message to complete the login.
2. Choose What You Want to Protect First
Most users begin by focusing on one privacy goal. Choose the feature that matches what you want to improve right now.
If you want to... | Start here |
Stop spam calls | Call Guard |
Reduce existing data exposure | Data Removal |
Hide your real email or phone number | Identities |
Make private online purchases | Cloaked Pay |
Each feature works independently, so you can start with whichever one is most useful to you.
3. Try One Feature
Once you choose a starting point, begin using that feature first.
Call Guard
Turn on Call Guard to screen unknown callers and reduce spam calls.
Data Removal
Enroll in Data Removal to begin submitting removal requests to data brokers. During enrollment, you will complete a short form so Cloaked knows what personal information to search for across data broker databases.
Once enrolled, you can monitor the status of removal requests and update your enrollment details from the Data Removal progress page.
Identities
Create a Cloaked Identity to generate unique contact details you can use instead of your real information. Identities can generate email addresses, phone numbers, usernames, and passwords for different accounts.
Cloaked Pay
Set up Cloaked Pay to generate private payment details you can use for online purchases.
You can expand into additional features anytime after getting comfortable with your first one.
4. Add Cloaked Where You Need It
Once you begin using Cloaked, a few tools can make it easier to use day-to-day.
Install the Browser Extension
The Cloaked browser extension allows you to generate identities and autofill usernames and passwords when signing up for websites or logging into accounts.
When opening the extension for the first time, sign in so it can access your Cloaked identities.
Keep the Mobile App Available
The mobile app is required if you use Cloaked phone numbers for calls or texts. It also allows you to manage identities, view alerts, and monitor privacy activity from your device.
Important: Save Your Recovery Key
Cloaked uses zero-knowledge encryption, which means your encrypted data cannot be accessed or reset by Cloaked if you lose your password.
To protect your account:
Go to Security Settings
Generate a Recovery Key
Store it somewhere safe and memorable
Your recovery key is the only way to regain access to your account if you lose your password. If both your password and recovery key are lost, encrypted data stored in your account cannot be recovered.
What to Do Next
Once your account is set up, you can continue expanding how you use Cloaked.
Some common next steps include:
• Updating existing logins to use Cloaked-generated emails and passwords
• Checking your Data Removal progress as brokers process requests
• Using Cloaked identities whenever websites request contact information
You can gradually adopt more features over time depending on your privacy needs.
