In 2003 we received a number of emails from concerned
customers wondering if Sneakemail had been "hacked"
because they were now receiving spam through the Sneakemail
addresses they had created and used for Orbitz.com. A few
days later the news broke that in fact Orbitz.com had been
compromised and their users emails were now
in the hands of spammers. Because our users
had used Sneakemail, they not only knew why they were now
receiving more spam, but they could easily stop it by simply
deleting a single Sneakemail address.
SomeCompany.com wants your email address... but you don't trust
them with it. more...
Log into sneakemail.com to create a new "Sneakemail address". more...
Name your new Sneakemail address - "SomeCompany", for example. more...
Enter the email address you are hiding - "firstname.lastname@example.org" more...
A new Sneakemail address is generated, something like
email@example.com, give this to them
When mail is sent to <firstname.lastname@example.org>, we
forward it to email@example.com. The from header will
look something like this: From: "SomeCompany"
If you reply, it will be delivered back through our servers
and your email address will remain hidden.
No worries - heartbleed bug was introduced
to OpenSSL in December 2011 and has been out in the wild since OpenSSL release
1.0.1 on 14th of March 2012. Sneakemail's OpenSSL was last updated January