Documenti di Didattica
Documenti di Professioni
Documenti di Cultura
1
2 5 CONCERNS
4 Multiple email aliases may well not exist, and demands for one are strange, sus-
picious and inconvenient, and creating a dierently struc-
Another approach is to register one main and many aux- tured alias or account may cause varying degrees of has-
iliary email addresses, which will forward all mail to the sle.
main address, i.e., the auxiliaries are used as aliases of the More eective techniques for controlling undesirables
main address. The advantage of this approach is that the without inconveniences to legitimate DEA users might
user can easily detect which auxiliary email is 'leaking' include: recognizing legitimate DEAs for what they are
with spam and block or dispose it. (they usually have a proper domain and a xed prex
Some services require additional time to set up forward- or sux), distinguishing them from short-lived, random
ing but others allow to create new addresses on the y throwaway address patterns or domains used by undesir-
without registering them with the service in advance. ables, wildcard banning (e.g., if a real person John Smith,
However, this method allows storage and access of all using DEA, needs to be banned, he can be banned as
emails from a single main account, although to manage john.smith*@(domain) or even *@(domain), based on
forwarding for some services the user has to remember their DEA pattern).
the password for each alias. As with any kind of threat and defence measures, no at-
A variation is to use a catch-all address, then forward tempts to use or thwart DEAs are foolproof any lter-
to the real mailbox using wildcards. Many mail servers ing method is bound to result in some false positives (le-
allow the use of '*', meaning 'any number of charac- gitimate users getting banned), and some false negatives
ters. This makes the whitelist automatic and only re- (undesirables getting through, and legitimate users man-
quires the administrator to update the blacklist occasion- aging to come up with a DEA pattern getting around lim-
ally. In eect the user has one address, but it contains itations imposed by site administrators). This is because
wild cards, e.g.; 'me.*@my.domain', which will match the email address may be partly or fully dened by the
any incoming address that starts with 'me.' and ends with user, made to appear as permanent"-looking as needed,
'@my.domain'. This is very similar to the '+' notation but or made to avoid a particular pattern, defeating any lter-
may be even less obvious since the address appears to be ing because for all intents and purposes it is not dierent
completely normal. from a permanent one, despite being limited to one pur-
pose.
As a counterbalance to the risks of asking a user to give
5 Concerns a permanent email address in a publicly accessible site,
administrators have the option to prevent, the publica-
tion of users email addresses or to give users the option
5.1 Restrictions by site administrators of hiding their address. An email this user script can
be used to allow communication with the user without
Many forum and wiki administrators dislike DEAs be- the sender knowing his email address.[9] This provides
cause they obfuscate the identity of the members and users with some minimal protection from spam and al-
make maintaining member control dicult. As an ex- lows them to use real email addresses, which may make a
ample, trolls, vandals and other users that may have been ban on DEAs easier for users to accept. The problem is
banned may use throwaway email addresses to get around when the website itself is hacked, and the real addresses
the ban.[7] Using a DEA provider only makes this easier; and other personal information is stolen, or when the web-
the same convenience with which a person may create a site changes owners and email policies are changed with-
DEA to lter spam also applies to trolls.[8] As a result, out notifying the user, or if the website was set up from
forum, wiki administrators, blog owners, and indeed any the beginning with the intention to spam the user.
public site requiring user names may have a compelling
Caught in the crossre between Internet undesirables and
reason to ban DEAs. Site operators expecting to generate
administrative and user attempts to deal with them, DEA
revenue by selling the user email addresses they gather
providers have trouble presenting a total solution. A user
may choose to ban DEAs as well due to the low mar-
may nd it necessary to come up with a conventional-
ket value of such addresses. There are several free lists
looking email address (or create a separate mailbox
available to help detect DEA domains as well as managed
in the worst case) to a public/commercial entity if re-
services.
quired. There is always uncertainty about the trust-
Banning DEAs might not be as eective at deterring un- worthiness and reputation of the site administrators, the
desirable users as the administrators might hope spam- availability of options to hide email addresses, the ex-
mers, vandals and trolls who routinely engage in such ac- istence/enforcement of an acceptable privacy policy and
tivities can easily generate brand new email addresses, the chance that the site may one day be compromised or
even legitimate-looking ones, using throwaway domains transferred to new owners. Even the largest and otherwise
or creating new accounts with free email services. This reputable companies have been compromised or resorted
would be more of a problem for legitimate DEA users, to sending spam or giving away emails to third parties.
for whom the concept of a real or permanent address
3
6 See also
Guerrilla Mail
TrashMail
7 References
[1] Disposable e-mail addresses foil marketing plans. Net-
work World. 2006-12-04. Retrieved 2007-02-02.
[8] Add New Ban. SMF 1.1 Online Manual. Simple Ma-
chines LLC. Retrieved 2007-02-02.
8 External links
Temporary Addresses at DMOZ
Mailinator.com
4 9 TEXT AND IMAGE SOURCES, CONTRIBUTORS, AND LICENSES
9.2 Images
File:Question_book-new.svg Source: https://upload.wikimedia.org/wikipedia/en/9/99/Question_book-new.svg License: Cc-by-sa-3.0
Contributors:
Created from scratch in Adobe Illustrator. Based on Image:Question book.png created by User:Equazcion Original artist:
Tkgd2007