Disposable e-mail address
From Wikipedia, the free encyclopedia
Disposable e-mail addressing (DEA) refers to an alternative way of sharing and managing e-mail addressing. DEA aims to set up a new, unique e-mail address for every contact or entity, making a point-to-point connection between the sender and the recipient. Subsequently, if anyone compromises the address or utilises it in connection with any e-mail abuse, the address-owner can easily cancel (or "dispose" of) it without affecting any other contact. Following the cancellation or replacement of a disposable e-mail address, the (ex-)owner need notify no more than one person/contact of the change.
Contents |
[edit] Uses
Disposable e-mail addressing, in essence, sets up a different, unique DEA for every sender/recipient combination. It operates most usefully in situations where someone may sell or release an e-mail address to spam lists or to other unscrupulous entities. The most common situations of this type involve online registrations for things such as discussion groups, bulletin boards, chat rooms, online shopping, and file hosting services. In a time when e-mail spam has become an everyday nuisance, and when identity theft threatens, DEAs can serve as a convenient tool for keeping network users safe and sane.[1]
Most likely, but not always, cancellation of a disposable e-mail address takes place because someone starts to use the address in an illegitimate manner. This may occur through the accidental release of an e-mail to a spam list, or because the original recipient unscrupulously and deliberately obtained it deceptively. Alternatively, the user may simply decide not to receive further correspondence from that company. Whatever the cause, DEA allows the address owner to take unilateral action by simply cancelling the address in question. Later, the owner can determine whether to update the recipient or not.
For the sake of convenience, disposable e-mail addresses typically forward to one or more real e-mail mailboxes where the owner receives and reads messages. The contact with whom a DEA is shared never needs to know the real e-mail address of the user. If a database manages the DEA, it can also quickly identify the expected sender of each message by retrieving the associated contact name of each unique DEA. Used properly, DEA can also help identify which recipients handle e-mail addresses in a careless or illegitimate manner. Moreover, it can serve as an effective tool for spotting counterfeit messages, or phishers.
[edit] Advantages over traditional e-mail
Ideally, owners share a DEA once with each contact/entity. Thus, if the DEA should ever change, only one entity needs to be updated. By comparison, the traditional practice of giving the same e-mail address to multiple recipients means that if that address subsequently changes, many legitimate recipients will need to receive notification of the change and to update their records — a potentially tedious process.
Additionally, because access has been narrowed down to one contact, that entity then becomes the most likely point of compromise for any spam that account receives. (see "filtering" below for exceptions to this) This allows users to determine firsthand the trustworthiness of the people they share their DEAs with. "Safe" DEAs that have not been abused can be forwarded to a real e-mail account, while messages sent to "compromised" DEAs can be routed to a special folder, sent to the trash, held for spam filtering, or returned undeliverable if the DEA is deleted outright.
Further, because DEAs serve as a layer of indirection between the sender and recipient, if the DEA user's actual email address changes, for instance moving from a university address to a local ISP, then the user need only update the DEA service provider of the change, and all outstanding DEAs will continue to function without updating.
[edit] Security and filtering
It is possible for spammers to "guess" commonly used DEAs by trying addresses in the form of <CommonCompanyName@RandomName.DEAServiceProvider.com> or other widely used formats. This is especially likely if a user's subdomain (The "RandomName" part) has already been posted publicly somewhere. To combat this, users can make their e-mail addresses more obscure through using random names, checksums, a mutated form of a name, or some combination of the above. A harder-to-guess example might be <CompanyName.Checksum@YourDomain.DEAServiceProvider.com> or <RandomTextCompanyNameRandomText@YourDomain.DEAServiceProvider.com>. There is an obvious tradeoff in that the more obscure an address is, the harder it will be for users to remember and quickly type them. Mentally computed checksums may help with this.[citation needed]
[edit] "Poor man's DEA"
The plus addressing technique allows users to create DEAs using an existing e-mail address without the need for a DEA service provider. (This does not rule out using this technique with a DEA service provider, so long as plus addressing is supported.) All that is required is for the e-mail server to support plus addressing. A checkstring, which is optional, allows the MTA to block attempts by spammers to bypass the DEA filtering. As an example, a static string or checksum that can be computed in one's head (or by a MTA with sieve or procmail) can be used as a checkstring that can be added to a DEA to evade spammers. As an example, <User+CompanyName.CheckString@EmailServiceProvider.com> can function as a hard-to-compromise "poor man's DEA". It is possible for a human (or a program) to extract the real e-mail address just by removing everything after the plus; however it is considered unlikely that a program would bother going to this effort, since the vast majority of e-mail addresses do not use this technique.[2]
[edit] The downside
Many forum and wiki administrators dislike DEAs because they obfuscate the identity of the members and make maintaining member control harder. As an example, trolls, vandals and other users that may have been banned may use throwaway e-mail addresses to get around attempts to ban them. [3] Using a DEA provider only makes this easier; the same convenience with which a person may create a DEA to filter spam also applies to trolls. For this reason, most forum programs have functionality to make it easier to ban DEAs. [4] As a result, forum, wiki administrators, blog owners, and indeed any public site requiring user names may have a compelling reason to ban DEAs. Site operators that expect to generate revenue from the sales of gathered user e-mail addresses may choose to ban DEAs as well due to the low market value of such addresses.
As a counterbalance to the risks of asking a user to give a "permanent" e-mail address in a publicly accessible site, administrators have the option to prevent, or give the option for hiding, the publication of users' email addresses. An "e-mail this user" script can be used to allow communication with the user without the sender knowing their e-mail address.[5] This provides some minimal protection of users from spam and allows them to use real email addresses, which may make a ban on DEAs easier for users to accept. The problem is when the website itself is hacked, and the real addresses and other personal information is stolen, or when the website changes owners and email policies changed without notice to the user.
Caught in the crossfire between Internet undesirables and administrative and user attempts to deal with them, DEA providers have trouble presenting a total solution. A user may find it advantageous to decide whether to provide a "real" e-mail address to a public/commercial entity on a case-by-case basis. On the one side, the trustworthiness and reputation of the site administrators, the availability of options to hide e-mail addresses, the existence/enforcement of an acceptable privacy policy and the chance that the site may one day be compromised or transferred to new owners are all factors that should be taken into account. On the other, there are the risks of confusing people by using long or oddly named addresses often associated with DEAs, being perceived as a troll or someone with a motive to hide their identity, and the chance that the DEA provider may eventually cease operations.
[edit] Blacklisting Disposable Email Address
Albeit disposable address protects users from unwanted emails, fake identities pollute the user base of web publishers. That's why some sites (including Facebook[citation needed]) have lately chosen to use public disposable email address blacklists to prevent fake identities. This step however is widely considered as a blow to the open internet movement as this technique can just as easily be used by malicious spammers.
[edit] References
- ^ Disposable e-mail addresses foil marketing plans. Network World (2006-12-04). Retrieved on 2007-02-02.
- ^ Disposable E-mail Addresses. PC Magazine (2004-03-22). Retrieved on 2007-02-06.
- ^ Successful Forum Tip #3 - Troll Prevention and Extermination (2004-08-09). Retrieved on 2007-02-02.
- ^ Add New Ban. SMF 1.1 Online Manual. Simple Machines LLC. Retrieved on 2007-02-02.
- ^ Email Options. vBulletin Manual. Jelsoft Enterprises Ltd. Retrieved on 2007-02-02.
[edit] External links
- SpamHelp List of disposable email providers
- Temporary Addresses at the Open Directory Project
|