Basically create an alias for every combination to prevent privacy cross contamination.

For instance, not only should you make an email alias for an Eventbrite account, but for every organization you sign up for events with. You are required to enter an email (any email) for the event, which can be seen by both Eventbrite and the organization. If you enter in the email of your Eventbrite account then the org could give that away, resulting in email spam and you can’t be sure if it was either Eventbrite itself or the org that sold you out. If that happens then you would probably want to delete email address but then you have to change it in other places you need to send/receive emails from.

Another example is Discourse forum sites. While Discourse is open source and self-hostable, you may not always be sure if a Discourse site is self-hosted or using paid hosting. A lot online places have both their own website and a separate discourse site. Bitwarden’s forum site doesn’t have a sign-in option using your Bitwarden.com account, and Raindrop.io uses canny.io to track app feedback which has also uses its own login. (I’m actually glad I made an alias for every single Discourse forum site before realizing all of this).

  • Dave.
    link
    fedilink
    -22 days ago

    Then you end up with an inbox full of drive-by spam to abuse/admin/aardvark/… (insert dictionary here)…/zack/ziggy.

    • NekuSoul
      link
      fedilink
      4
      edit-2
      2 days ago

      I believe there are some services, including some selfhosted ones, that allow you to quickly create (and later delete) unique aliases.

      That said, I was surprised that these dictionary spam attacks don’t really happen all that much, at least based on my own experience. Most of the ambient drive-by spam my server receives targets email addresses belonging to domains I don’t even own. Blocking those and a few Sieve scripts gets rid of 99% of spam for me.

      Interestingly, there was one time I received spam to a bogus address belonging to my own domain: A while back, one of my actual email addresses got leaked (thanks Sega) and a few months later that address got copied into another dataset but with a typo, which I assume was caused someone using OCR.

    • @[email protected]
      link
      fedilink
      English
      22 days ago

      Is that something you have experience with or are you just making up scenarios to pose as arguments?

      Because I’ve been doing this for years and I don’t have this issue. You could also just preemptively auto-trash anything that goes to those very common emails, but I don’t and it’s not an issue.