They're simple, mostly free and easily obtainable by everyone.I'd also like to encourage those who do give online anonymity a lot of thought to leave their suggestions in the comments section, keeping in mind the target audience being your normal, everyday people.Given that this data breach included highly personal information that many of the members might not want shared, it’s alarming to think that a thief could extort money from some of the members in exchange for not blasting the news of their participation in a site dedicated to sexual relationships with strangers.This practice has unfortunately become so commonplace in the world of social media that it has its own term, sextortion.Gmail (or equivalent - there are many other free online mail providers) gives you a full blown email address and obviously requests a lot of info in the process.A great alternative where an email address is simply a requirement to entry and you care little about anything that's actually sent to it is to use a Mailinator address.The measures you take to hide your identity from, say, a significant other or general member of the community may not be sufficient to hide from government oversight.
Let's jump into it, and we'll start somewhere simple.
One of those ways is obviously when data is breached from a system and all the email addresses are on easy display: address. It's not always that explicit either, for example Ashley Madison returned slightly different responses which could still be observed. For example, when doing a password reset: If you authenticate to another site using your Gmail account (social logins are increasingly common), then you may be prompted to share data attributes such as your name with that site.
When you create a set of personally identifiable attributes such as those in the Gmail signup screen above, there are all sorts of ways that info can be leaked.
Email addresses can be used for phishing attempts, but can also be sold to online marketers for spam.
Physical addresses can lead to mail fraud and “dumpster diving,” which can then easily turn into other potential forms of identity theft, scams, or fraud.