tag:blogger.com,1999:blog-3993498847203183398.post1489573454653819841..comments2024-03-19T09:14:24.926+00:00Comments on RevK<sup>®</sup>'s ramblings: Gourmet Society data leakRevKhttp://www.blogger.com/profile/12369263214193333422noreply@blogger.comBlogger8125tag:blogger.com,1999:blog-3993498847203183398.post-76694261198366900042014-08-21T09:37:41.644+01:002014-08-21T09:37:41.644+01:00I use suffixed addresses - I've had surprise f...I use suffixed addresses - I've had surprise from companies that I have an email address with their name in, but they have always accepted it without question. I find another side-effect useful... if an address is actually receiving a lot of wanted mail, it's easy for exim to filter it for me.<br /><br />I did have one odd failure that the sender never bothered to send me the full error message for - but it did work the second time they tried it.<br /><br />If a company either objects (not happened yet) or has a member of staff that can't even spell their own name (has happened once), then I use something obliquely related to the company name. When an address gets hit by a spammer (I use similar addresses for mailing lists), I put a date code and a letter somewhere in the suffix for future correct use and just feed the old one straight into spamassassin.Phil Reynoldshttps://www.blogger.com/profile/07080812032624786351noreply@blogger.comtag:blogger.com,1999:blog-3993498847203183398.post-89087458832634789112014-08-19T10:55:21.286+01:002014-08-19T10:55:21.286+01:00I also have been using this scheme for a few years...I also have been using this scheme for a few years, but there's at least one firm that refuses to believe that they have leaked my address, despite the unique use of it, but suggest I've given it away on a forum - which I certainly haven't!<br />Ah well, at least I know I can't trust them.<br />Cheers,<br />Howard<br />HDRWhttps://www.blogger.com/profile/09148633895717850549noreply@blogger.comtag:blogger.com,1999:blog-3993498847203183398.post-2602888484226199022014-08-14T16:21:57.081+01:002014-08-14T16:21:57.081+01:00I had an issue early on with my version of this sc...I had an issue early on with my version of this scheme where a small company was very concerned to see that their name appeared in my email address. So I switched to reversing the name. Then I had the Santander issue and realised I couldn't be sure how old the affected addresses were, so I added a monthly code. So now my spam-trap addresses are a little more unwieldy to type (and certainly to read over the phone on the odd occasion when that's needed) but I can be sure they aren't a dictionary attack and I have a known earliest date when they were compromised.<br /><br />The worst place for email compromises is anything connected with major MMOs like World of Warcraft. Since many players will use the same address for their Bnet account and for forums, tools, etc. the black hats have compromised practically every major such site. In the years when I was active on WoW I got phishing mails pretending to be from Blizzard to the addresses I had given on every single such site, but never once to the address I gave the real Bnet, showing just how bad the problem is.Anonymousnoreply@blogger.comtag:blogger.com,1999:blog-3993498847203183398.post-38714310278106036862014-08-12T15:48:54.727+01:002014-08-12T15:48:54.727+01:00I too use the uniq address plan.
It may be worth ...I too use the uniq address plan.<br /><br />It may be worth noting that if one gets spam, then yes, one explanation is the company's database was compromised. In theory however, it's also possible we've suffered a compromise ourselves, causing the uniq address to leak.<br /><br />This scenario is hopefully unlikely. However, actually proving it hasn't happened may not be hugely straightforward...Chris Ehttps://www.blogger.com/profile/04650717410852254452noreply@blogger.comtag:blogger.com,1999:blog-3993498847203183398.post-75430751608203031532014-08-12T15:15:02.226+01:002014-08-12T15:15:02.226+01:00I, too, have been doing this for years; the freque...I, too, have been doing this for years; the frequency of address leaks is not high IME, but is disappointing. Two in particular stand out: (a) Computer Weekly (who really should know better), and (b) Alliance & Leicester / Santander (the leak occurred recently, long after the Santander takeover, but it might have been an old A&L machine being scrapped etc.)<br /><br />I've had little joy when pointing out to people that they have leaked my details: e.g. Avid tried to insist that it wasn't them that had leaked my unique-to-them address, but it must have been a dictionary attack, and it was my fault for using a guessable word for the local-part (when did you ever hear of a dictionary attack that tried only one address?)st42https://www.blogger.com/profile/01085718626453111584noreply@blogger.comtag:blogger.com,1999:blog-3993498847203183398.post-32545208271338571562014-08-12T14:45:30.509+01:002014-08-12T14:45:30.509+01:00I've done this occasionally; the most irritati...I've done this occasionally; the most irritating was Verio, with whom I registered a domain a long time ago. Thanks to Whois abuse, I *still* get spam attempts to verio@... over a decade later...<br /><br />At some point soon I plan to self-host the domain again, so I can reject certain senders on the SMTP delivery attempt. Blackholing everything from hetzner.de and plusserver.de should help greatly; from their policy of not accepting spam reports, I presume they're some sort of pink contract outfit.jas88https://www.blogger.com/profile/05563592458314214904noreply@blogger.comtag:blogger.com,1999:blog-3993498847203183398.post-27792465153158362492014-08-12T14:19:32.489+01:002014-08-12T14:19:32.489+01:00I don't know how I manage it, but I get almost...I don't know how I manage it, but I get almost no spam. I'm conservative in what I sign up for online, but I do sign up for things.Owen Smithhttps://www.blogger.com/profile/00890951742186614705noreply@blogger.comtag:blogger.com,1999:blog-3993498847203183398.post-4973458313568874212014-08-12T13:38:59.190+01:002014-08-12T13:38:59.190+01:00I've been using a similar system for more than...I've been using a similar system for more than a decade now, and this is sadly very common. When a company goes out of business, it is almost guaranteed to happen. I suspect because as part of the liquidation process, everything of value is sold off, including user databases. I've also seen it happen regularly when companies change ownership (without getting in financial difficulties first).<br /><br />I just set the compromised address to be rejected, and in the rare case that I'm still interesting in the account, I change the email address. When the new address also gets targeted spam, it shows they're either getting my data repeatedly stolen, or sell updates of their database to spammers ;)Ingmarhttps://www.blogger.com/profile/10507518973954113086noreply@blogger.com