• Pringles@lemm.ee
    link
    fedilink
    English
    arrow-up
    0
    ·
    1 month ago

    For e-mails, you can just get firefox relay with your own subdomain and generate infinite e-mail masks for 1$ a month. I usually take “nameofshop@mysubdomain.mozmail.com” for example. It’s pretty great because you just make the masks on the fly.

    • sugar_in_your_tea@sh.itjust.works
      link
      fedilink
      English
      arrow-up
      0
      ·
      edit-2
      1 month ago

      Yup.

      If you use the same email everywhere, they can try brute-forcing the password by using the email instead of your username. Give them less to go on. $1/month is absolutely worth it to prevent an important account from getting hacked.

    • Blackmist@feddit.uk
      link
      fedilink
      English
      arrow-up
      0
      ·
      1 month ago

      The email mask is free without a subdomain. I use it for the odd random signups where the only thing I’m really interested in is not having another nobhead add me to their spam lists.

      • toynbee@lemmy.world
        link
        fedilink
        English
        arrow-up
        0
        ·
        1 month ago

        For users of Gmail, I can confirm this works and you can even set it up so that address+nameofshop goes to a folder called “nameofshop.”

        You can also apparently add a dot anywhere before @gmail.com and still receive the email. I haven’t tried this one, but the last time I mentioned this someone said it was part of the email standard, so presumably it works.

        I don’t know of tricks specifically of this vein for proton mail, but I do know you can setup a catch-all address so, for example, something addressed to invalidaddress@domain.com goes instead to spam@domain.com.

        I’ve not tried SimpleLogin, but apparently it offers similar functionality.

      • Pringles@lemm.ee
        link
        fedilink
        English
        arrow-up
        0
        ·
        1 month ago

        I didn’t know that actually. They can still deduce your actual email address from that, but for the identification of the culprit that would work as well.

    • xthexder@l.sw0.com
      link
      fedilink
      English
      arrow-up
      0
      ·
      1 month ago

      I’ve been doing this for several years now (not specifically that service, since I have my own domains). It’s really nice knowing exactly who sold your email to the spam bots, because it’s right in the address. Super easy to block once that happens.