The Security Pros and Cons of Using Email Aliases

One way to tame your email inbox is to get in the habit of using unique email aliases when signing up for new accounts online. Adding a “+” character after the username portion of your email address — followed by a notation specific to the site you’re signing up at — lets you create an infinite number of unique email addresses tied to the same account. Aliases can help users detect breaches and fight spam. But not all websites allow aliases, and they can complicate account recovery. Here’s a look at the pros and cons of adopting a unique alias for each website.

What is an email alias? When you sign up at a site that requires an email address, think of a word or phrase that represents that site for you, and then add that prefaced by a “+” sign just to the left of the “@” sign in your email address. For instance, if I were signing up at example.com, I might give my email address as krebsonsecurity+example@gmail.com. Then, I simply go back to my inbox and create a corresponding folder called “Example,” along with a new filter that sends any email addressed to that alias to the Example folder.

Importantly, you don’t ever use this alias anywhere else. That way, if anyone other than example.com starts sending email to it, it is reasonable to assume that example.com either shared your address with others or that it got hacked and relieved of that information. Indeed, security-minded readers have often alerted KrebsOnSecurity about spam to specific aliases that suggested a breach at some website, and usually they were right, even if the company that got hacked didn’t realize it at the time.

Alex Holden, founder of the Milwaukee-based cybersecurity consultancy Hold Security, said many threat actors will scrub their distribution lists of any aliases because there is a perception that these users are more security- and privacy-focused than normal users, and are thus more likely to report spam to their aliased addresses.

Holden said freshly-hacked databases also are often scrubbed of aliases before being sold in the underground, meaning the hackers will simply remove the aliased portion of the email address.

“I can tell you that certain threat groups have rules on ‘+*@’ email address deletion,” Holden said. “We just got the largest credentials cache ever — 1 billion new credentials to us — and most of that data is altered, with aliases removed. Modifying credential data for some threat groups is normal. They spend time trying to understand the database structure and removing any red flags.”

Why might spamming aliases be a bad idea? According to the breach tracking site HaveIBeenPwned.com, only about .03 percent of the breached records in circulation today include an alias.

Email aliases are rare enough that seeing just a few email addresses with the same alias in a breached database can make it trivial to identify which company likely got hacked and leaked said database. That’s because the most common aliases are simply the name of the website where the signup takes place, or some abbreviation or shorthand for it.

Hence, for a given database, if there are more than a handful of email addresses that have the same alias, the chances are good that whatever company or website corresponds to that alias has been hacked.

That might explain the actions of Allekabels, a large Dutch electronics web shop that suffered a data breach in 2021. Allekabels said a former employee had stolen data on 5,000 customers, and that those customers were then informed about the data breach by Allekabels.

But Dutch publication RTL Nieuws said it obtained a copy of the Allekabels user database from a hacker who was selling information on 3.6 million customers at the time, and found that the 5,000 number cited by the retailer corresponded to the number of customers who’d signed up using an alias. In essence, RTL argued, the company had notified only those most likely to notice and complain that their aliased addresses were suddenly receiving spam.

“RTL Nieuws has called more than thirty people from the database to check the leaked data,” the publication explained. “The customers with such a unique email address have all received a message from Allekabels that their data has been leaked – according to Allekabels they all happened to be among the 5000 data that this ex-employee had stolen.”

HaveIBeenPwned’s Hunt arrived at the conclusion that aliases account for about .03 percent of registered email addresses by studying the data leaked in the 2013 breach at Adobe, which affected at least 38 million users. Allekabels’s ratio of aliased users was considerably higher than Adobe’s — .14 percent — but then again European Internet users tend to be more privacy-conscious.

While overall adoption of email aliases is still quite low, that may be changing. Apple customers who use iCloud to sign up for new accounts online automatically are prompted to use Apple’s Hide My Email feature, which creates the account using a unique email address that automatically forwards to a personal inbox.

What are the downsides to using email aliases, apart from the hassle of setting them up? The biggest downer is that many sites won’t let you use a “+” sign in your email address, even though this functionality is clearly spelled out in the email standard.

Also, if you use aliases, it helps to have a reliable mnemonic to remember the alias used for each account (this is a non-issue if you create a new folder or rule for each alias). That’s because knowing the email address for an account is generally a prerequisite for resetting the account’s password, and if you can’t remember the alias you added way back when you signed up, you may have limited options for recovering access to that account if you at some point forget your password.

What about you, Dear Reader? Do you rely on email aliases? If so, have they been useful? Did I neglect to mention any pros or cons? Feel free to sound off in the comments below.

from Krebs on Security https://ift.tt/BAleGNT
via IFTTT

Vivaldi permite ahora silenciar los paneles, personalizar los gestos balancín y sigue mejorando el correo

Vivaldi 5.4 permite silenciar paneles

Después de presentar las funciones de correo, calendario y lector de feeds RSS, parece que los cambios introducidos en este navegador con nombre de histórico de la música sean menos importantes. Hoy, el CEO del proyecto ha anunciado el lanzamiento de Vivaldi 5.4, la primera versión mayor desde su parón veraniego, y lo ha hecho mencionando un par de cosas útiles en su titular, a lo que también ha añadido que siguen mejorando aquel 3-en-1 que introdujeron en Vivaldi 4.0.

Lo primero que menciona Jon von Tetzchner es que ahora podremos silenciar los paneles web, esas «mini-aplicaciones» que se pueden fijar a la izquierda. Se pueden silenciar del mismo modo que silenciamos las pestañas, algo que facilita las cosas. También destaca que se pueden personalizar los gestos balancín. Estos gestos son los que se hace si pulsamos primero un botón del ratón y luego el otro, y hasta ahora estaban reservados a moverse atrás/adelante.

Otros cambios de Vivaldi 5.4

  • Posibilidad de copiar y compartir un enlace de lo seleccionado. Como aún no he instalado Vivaldi 5.4, no puedo asegurar cómo funciona esto, si funciona siempre o si tiene que haber un enlace tipo «target» en la página, pero von Tetzchner promete que podremos resaltar algo en una página web y compartir el enlace para que otros vean exactamente lo que queremos.
  • HTTPS sobre HTTP, lo que actualiza todas las conexiones a HTTPS. La opción tiene que activarse desde los ajustes, barra de direcciones, seguridad.
  • Se sigue puliendo el correo, el calendario y el lector de feeds RSS.
  • Posibilidad de esconder palabras clave de motores de búsqueda en las búsquedas.
  • Posibilidad de pegar e ir, actualmente con el atajo Ctrl + Shift + V.
  • Chromium está ahora en 104.0.5112.83.
  • Lista completa de cambios en la nota de este lanzamiento.

Vivaldi 5.4 está disponible desde hace unas horas, y ya se puede instalar en aquellas distribuciones Linux que añaden el repositorio oficial tras la primera instalación. A otras distribuciones llegará en las próximas horas.

from Linux Adictos https://ift.tt/ZeWqi8P
via IFTTT