This document proposes securing emails through Shamir's secret sharing technique. It splits confidential information like passwords or SSNs into multiple shares that are sent in separate emails. The recipient can then reconstruct the original secret by combining a sufficient number of shares, providing perfect information-theoretic security. The system architecture involves generating shares on the sending end and reconstructing the secret on the receiving end. This approach offers an alternative secure email solution and protects against intruders obtaining private keys. Examples demonstrate how a secret is split into shares and then reassembled from the shares.