The newly introduced feature allows generating a random number of unique email addresses, which will later forward messages to your actual iCloud inbox.
The created burner addresses work just like any standard email. They can be used when signing up for new services or newsletters, making purchases, or in business communication.
The feature can be used in two situations:
1. While using the app or website directly. If you’re creating an account or subscribing to a newsletter, the Hide My Email Address option allows you to generate a fake address at any time. However, it is important to remember that it will then be assigned to a particular service, with no possibility of reuse.
2. Having an iCloud+ subscription, you can use your iPhone, iPad, or Mac to create multiple unique email addresses in advance and use them later at any time.
The feature also allows you to change the Email address to which messages are forwarded, as well as disable the option to receive mail or deactivate burner addresses. Apple assures that the new option doesn’t read or process any of the content in the messages transmitted in this way. They are only subjected to the standard filtering processes that are carried out within the anti-spam system.
We already know that with the new Apple feature you can hide your email address. But what benefits it may offer to mail users?
It certainly guarantees privacy and enhanced security. The option allows you to keep your email address private while you’re online, and thus limit the flow of information about you. As a result, it prevents database administrators from knowing your real addresses.
Moreover, the new feature minimizes the possibility of receiving unwanted messages. You can easily limit their inflow to your mailbox without looking for the unsubscribe button or worrying if the unsubscribe link did actually work. By deactivating the forwarding address we close the connection with the sender. Such mail protection can be used for example for unsolicited marketing communication.
The last benefit that Apple’s new feature gives is data processing monitoring. While using fake email addresses, you can easily verify which administrator is sharing his contact list with other parties. All you need to do is to use a different temporary Email address during each sign-up.
It could mean a spike in hardbounces of iCloud subscribers. This is because they can no longer use the unsubscribe button, replacing it with an option to deactivate the forwarding address, which is available for iOS users. When this happens, emails sent to this address will receive a message saying there’s no such user:
host mx01.mail.icloud.com[17.42.251.10] said: 550 5.1.1: user does not exists (in reply to RCPT TO command)
These addresses will be stored on the EmailLabs’ internal Blacklist where they are automatically blocked. However, this doesn’t change the fact that over the next few months the level of hardbounces may increase for iCloud mail users. Therefore, Emaillabs’ customers should be prepared for this.
The second thing to pay attention to is the From address that will be displayed in the iCloud inboxes. When a subscriber uses burner email addresses, the messages he receives to his mailbox will have a modified sender address. This is most likely caused by forwarding itself that is done between iCloud addresses.
So if you see a subscriber’s message with a strange string in your email address, it means this customer uses Apple’s new Hide My Email Address feature and you only have a temporary TO address in your database, not the recipient’s private email.
Finally, it is worth mentioning that this is not the only update that Apple has made recently. With the new iOS 15, the company allowed its users to block the option to track open rates. You can read more about it in our article.
Gmail has announced significant changes in the requirements for email senders to maintain a good reputation and proper classification of messages in user inboxes starting from February 1, 2024....
Vercom S.A. public joint-stock company to which the EmailLabs project belongs, has been assessed and certified to be compliant with the ISO/IEC 27001 and ISO/IEC 27018 standards. The Vercoms’...
The increasing number of phishing attacks each year, and the projection that this trend will continue to escalate, aren’t likely to astonish anyone. This can be attributed, in part,...
Out of all the things that can go wrong when sending out marketing emails, having your emails end up in the recipient’s spam folder is arguably the most dreaded...
Email Authentication, Security
DMARC is an email authentication protocol that is designed to give domain owners the ability to protect their domain from unauthorized use, commonly known as email spoofing. Spoofing occurs...
With the emergence of the Covid-19 pandemic, many brands have been challenged to adapt in a short period to the changed reality and new consumer attitudes. That meant reorganizing...
What is the darknet? Shrouded in mystery for many years and often associated with ominous connotations, the darknet is a part of the internet that evokes curiosity, fascination, and...
A few weeks ago, at Vercom, we began the process of implementing the NIS2 Directive and preparing to meet the requirements of the Digital Operational Resilience Act (DORA). What...
If you’ve been following our updates, you’re likely aware of the recent changes in email sender requirements introduced by major global providers like Gmail and Yahoo. As of February...
What is the darknet? Shrouded in mystery for many years and often associated with ominous connotations, the darknet is a part of the internet that evokes curiosity, fascination, and...
A few weeks ago, at Vercom, we began the process of implementing the NIS2 Directive and preparing to meet the requirements of the Digital Operational Resilience Act (DORA). What...
If you’ve been following our updates, you’re likely aware of the recent changes in email sender requirements introduced by major global providers like Gmail and Yahoo. As of February...
Have you ever sent an email in haste and immediately wished you hadn’t? It happens more often than we’d like to admit. If you ever find yourself in this...
One safe and easy way to keep track of your digital interactions is to save emails as PDFs. However, do you know the best ways to easily turn your emails into PDF files? In this article, we’ll look into the different ways you can do to turn your emails into accessible PDF files. Let’s start! Key Takeaways To save emails...
Sending large files online can sometimes feel like maneuvering through a maze with unexpected twists and turns. The frustration of hitting attachment size limits or dealing with slow uploads...
Are you a bit baffled by email protocols like IMAP, POP3, and SMTP? Have no fear – this article is here to explain it all. If you have ever...
In 2024, global providers like Gmail and Yahoo have implemented a series of changes, primarily targeting bulk senders. These changes, already in effect, are part of a continuous update...
In the face of dynamic technological advancements and increasingly sophisticated cyber threats, ensuring network security has become crucial. Dozen security incidents present a challenge that we cannot afford to...