The newly introduced feature allows generating a random number of unique email addresses, which will later forward messages to your actual iCloud inbox.
The created burner addresses work just like any standard email. They can be used when signing up for new services or newsletters, making purchases, or in business communication.
The feature can be used in two situations:
1. While using the app or website directly. If you’re creating an account or subscribing to a newsletter, the Hide My Email Address option allows you to generate a fake address at any time. However, it is important to remember that it will then be assigned to a particular service, with no possibility of reuse.
2. Having an iCloud+ subscription, you can use your iPhone, iPad, or Mac to create multiple unique email addresses in advance and use them later at any time.
The feature also allows you to change the Email address to which messages are forwarded, as well as disable the option to receive mail or deactivate burner addresses. Apple assures that the new option doesn’t read or process any of the content in the messages transmitted in this way. They are only subjected to the standard filtering processes that are carried out within the anti-spam system.
We already know that with the new Apple feature you can hide your email address. But what benefits it may offer to mail users?
It certainly guarantees privacy and enhanced security. The option allows you to keep your email address private while you’re online, and thus limit the flow of information about you. As a result, it prevents database administrators from knowing your real addresses.
Moreover, the new feature minimizes the possibility of receiving unwanted messages. You can easily limit their inflow to your mailbox without looking for the unsubscribe button or worrying if the unsubscribe link did actually work. By deactivating the forwarding address we close the connection with the sender. Such mail protection can be used for example for unsolicited marketing communication.
The last benefit that Apple’s new feature gives is data processing monitoring. While using fake email addresses, you can easily verify which administrator is sharing his contact list with other parties. All you need to do is to use a different temporary Email address during each sign-up.
It could mean a spike in hardbounces of iCloud subscribers. This is because they can no longer use the unsubscribe button, replacing it with an option to deactivate the forwarding address, which is available for iOS users. When this happens, emails sent to this address will receive a message saying there’s no such user:
host mx01.mail.icloud.com[17.42.251.10] said: 550 5.1.1: user does not exists (in reply to RCPT TO command)
These addresses will be stored on the EmailLabs’ internal Blacklist where they are automatically blocked. However, this doesn’t change the fact that over the next few months the level of hardbounces may increase for iCloud mail users. Therefore, Emaillabs’ customers should be prepared for this.
The second thing to pay attention to is the From address that will be displayed in the iCloud inboxes. When a subscriber uses burner email addresses, the messages he receives to his mailbox will have a modified sender address. This is most likely caused by forwarding itself that is done between iCloud addresses.
So if you see a subscriber’s message with a strange string in your email address, it means this customer uses Apple’s new Hide My Email Address feature and you only have a temporary TO address in your database, not the recipient’s private email.
Finally, it is worth mentioning that this is not the only update that Apple has made recently. With the new iOS 15, the company allowed its users to block the option to track open rates. You can read more about it in our article.
Gmail has announced significant changes in the requirements for email senders to maintain a good reputation and proper classification of messages in user inboxes starting from February 1, 2024....
Vercom S.A. public joint-stock company to which the EmailLabs project belongs, has been assessed and certified to be compliant with the ISO/IEC 27001 and ISO/IEC 27018 standards. The Vercoms’...
The increasing number of phishing attacks each year, and the projection that this trend will continue to escalate, aren’t likely to astonish anyone. This can be attributed, in part,...
Out of all the things that can go wrong when sending out marketing emails, having your emails end up in the recipient’s spam folder is arguably the most dreaded...
Email Authentication, Security
DMARC is an email authentication protocol that is designed to give domain owners the ability to protect their domain from unauthorized use, commonly known as email spoofing. Spoofing occurs...
With the emergence of the Covid-19 pandemic, many brands have been challenged to adapt in a short period to the changed reality and new consumer attitudes. That meant reorganizing...
Google and Yahoo's Requirements
2024 marks a turning point in the fast-paced world of email deliverability, as this is the year when Google and Yahoo updated their sender requirements. With the enforcement period...
Best practices, Email Marketing
B2B email marketing – it’s a term you’ve likely heard before, but what does it really entail? And, more importantly, how can it be done effectively? In this article,...
Deliverability, Sending Reputation
Email sender reputation is one of the most important factors that can determine whether your emails reach the intended recipient or not. So, what is the email sender reputation,...
Google and Yahoo's Requirements
2024 marks a turning point in the fast-paced world of email deliverability, as this is the year when Google and Yahoo updated their sender requirements. With the enforcement period...
Best practices, Email Marketing
B2B email marketing – it’s a term you’ve likely heard before, but what does it really entail? And, more importantly, how can it be done effectively? In this article,...
Deliverability, Sending Reputation
Email sender reputation is one of the most important factors that can determine whether your emails reach the intended recipient or not. So, what is the email sender reputation,...
Email Authentication, Sending Reputation
In the realm of email, sender authorization is a powerful tool wielded by local and global providers like Gmail, Yahoo, and AOL to combat spam. Additionally, as an authenticated...
As an integral part of your email infrastructure, SMTP and SMTP port numbers are not just for tech whizzes – they’re important for anyone using email. You’ve likely heard...
Ever wondered why you can’t attach a movie to an email? Or why won’t that PowerPoint presentation just send? It all comes down to the maximum size of email...
One of the most dire situations a business can face is unauthorized access to its company network. This breach can lead to the theft of valuable intellectual property and...
The Simple Mail Transfer Protocol (SMTP) holds significant importance in the realm of email communication. As a vital component of mail servers, SMTP takes charge of sending, receiving, and...
The significance of email protection and data security is growing exponentially in today’s digital world, with StartTLS emerging as a key player in this arena. As an encryption protocol...