I'm going to focus on what's readily accessible to the bulk of the population.If you don't want your participation in certain sites going public, then this will be useful.It doesn't matter if you don't agree with the lifestyle choice of those on the site and certainly I myself am not one to look around the house at everyday items and think "I wonder if that could...".That's entirely beside the point though which is that a bunch of consenting adults now have their identities in the hands of an untold number of people who are willingly sharing the data around web. I've had this post in mind for some time as I've seen more and more deeply personal data spread across the web.Let's start somewhere extremely practical yet often not acknowledged in discussions on privacy and anonymity.This is a fundamentally important questions because it greatly impacts the defences you apply.
A great alternative where an email address is simply a requirement to entry and you care little about anything that's actually sent to it is to use a Mailinator address.One of those ways is obviously when data is breached from a system and all the email addresses are on easy display: address. It's not always that explicit either, for example Ashley Madison returned slightly different responses which could still be observed. For example, when doing a password reset: If you authenticate to another site using your Gmail account (social logins are increasingly common), then you may be prompted to share data attributes such as your name with that site.When you create a set of personally identifiable attributes such as those in the Gmail signup screen above, there are all sorts of ways that info can be leaked.The email address is the first, most logical step and honestly this is a huge portion of the anonymity story as it relates to identities being spread around the web when a system is compromised. Consider the data that many sites request on signup: name, location (possibly your exact address), date of birth, phone number etc.If protecting your identity is indeed important to you, consider what these values should be.” If credit card information or Social Security numbers are stolen in a breach, then there’s a good chance there could be financial repercussions.But if those pieces of the puzzle are missing, there are still plenty of ways the data can be useful to a thief.Not just the mechanisms above, there's always legal requests by law enforcement.Whilst that's unlikely to be the threat that most folks just wanting to remain genuinely anonymous on the classes of personal site we continually see being breached, it's also an unnecessary risk.But whenever a “mature” website or similar online activity is at the heart of the crime, there is another concern.While this type of crime will hopefully never befall a victim of identity theft, there is always the potential for extortion.