This Article is About
identity theft
several thousand dollars
living in china
business decisions
freelance writers
marketer
anonymity
malware
curiosity
hacks
locals
reputation
Spam, Identity Theft, And Privacy - Hide Your Email IP Address
Join 1000's of Authors at StreetArticles Today!

I read a story today about a guy who wanted to hide his email IP address. He was purchasing a domain, which was quite expensive (several thousand dollars). The website was related to Greece, the country where he was from, and he discovered that the seller was asking for higher prices from locals. When he had an American friend bid on the same domain, the American received a price 50% less that his. How could the seller know where this man was located? By the IP address of his email. This is just one example of why someone might want to hide their email IP address.

IP address can say a lot about a user, for good or bad. As in the example above, it can be used to see where you're sending email from, and make business decisions based on that. As an online marketer, I'll be the first to admit that some of my business decisions are based on the location of the user. Some are with regards to knowledge of a certain area, ie, I'd be more likely to hire someone from the UK to do work on my sites targeted at UK Internet users. Other are based on previous experience with people from a certain region, for example I've had some terrible freelance writers from India, and now rarely hire people from that country.

Seeing as so much communication is done through email these days, hiding your email IP address and exchanging it for another can seriously increase your business and buying potential. If you're an American living in China, using your Chinese IP address to communicate with others may be inconvenient or even damaging to your reputation. With recent hacks and other malware originating from China, exchanging your Chinese IP for an American one would definitely bring benefits to your business and ease of communication.

There are also numerous other reasons for anonymity while sending email. You'd be surprised what you can, with enough curiosity and tech, find out from the header in an email originating from you computer. You can even find out the admin login name, IP address, and routing information. This is an example of what you might find in an email header.

Received: from ADMIN NAME (xxx(.)xxx(.)xxx(.)xxx) by smtp(.)yourservice(.)com (xxx(.)xxx(.)xxx(.)xxx) with Microsoft SMTP Server id 8.1.311.2; FRI, 16 Sept 2011 12:01:32

Spammers steal IP data every day and abuse it. Do you want to put yourself at risk simply by sending an email address to an unfamiliar and potential harmful recipient?

Other general reason to hide email IP address would include a general desire for privacy and anonymity online, or situations where you fear what the recipient of the email could do if they knew who you were. There are all legitimate reasons, but it's by no means an exhaustive list. Anonymous email services and virtual private networks are two of the ways that anonymous emails can be sent.


Street Talk

No comments present
You May Also Like
How to Repair the Damage Of Identity Theft
If you have been the victim of identity theft then you have to act quick disregarding the emotional toll that comes with being on the receiving end of this crime. The faster you act the more can be done to repair the damage inflicted on your reputation and credit rating.…
By: Pammy Ewell in  Insurance  >  Personal Property   Oct 19, 2012  
0
  Likes: 0

What Are The Problems Caused By Identity Theft
Theft can be a minor crime – that is when it involves mere stealing of objects. But then, there is a more offending theft crime that is a lot more disastrous and damaging. This is committed when a criminal gets hold of your personal information, commits a crime and flees.…
By: Pammy Ewell in  Insurance  >  Personal Property   Oct 19, 2012  
0
  Likes: 0

Types Of Identity Theft
Identity theft is often associated with stealing someone’s credit card information. However, this is just one part of it because identity theft encompasses other kinds of activity too. There are 5 known types of this form of crime and they are classified as character or criminal, credit, government based tracking…
By: Pammy Ewell in  Insurance  >  Personal Property   Oct 19, 2012  
0
  Likes: 0

Best Way to Protect Yourself Against Identity Theft
Just imagine the degree of inconvenience you will get into when you become a victim of identity theft. However, people believe that if you become at risk of being involved in this type of fraud, there is no one else to blame but yourself – for you probably did something…
By: lee8 in  Legal  >  Identity Theft   Feb 05, 2013  
0
  Likes: 0

How Do You Report Identity Theft? Step By Step Guide
Having your identity stolen can lean to terrible financial losses if not caught early on. As soon as you suspect that you may have been a victim of fraud, you need to take action quickly. But how do you report identity theft? Well, I'll tell you exactly what you need…
By: Jason Molnar in  Legal  >  Identity Theft   Oct 24, 2011  
0
  Likes: 1

Online Identity Theft And Your Browser
A web browser is in fact a piece of software used for sending, receiving and displaying information on the web. Most of us probably don’t think of it as software, we probably don’t think about it much at all. A browser is just something that we use for more or…
By: Larry Chamberlain in  Computers and Technology  >  Software   Mar 19, 2012  
0
  Likes: 0

Ten Reasons You Should Protect Yourself From Identity Theft
Identity theft is an ever-evolving crime that has and will plague millions of people. There are still so many people out there that have no clue their identity has been stolen; many times they don't find out until it's too late. Once it's too late, it can take a lifetime…
By: Bryan2 in  Legal  >  Identity Theft   Dec 26, 2011  
0
  Likes: 0

Identity Theft What To Do
Identity theft is a serious crime, and it has been growing so fast. It takes place when unknowingly to someone a thief illegally uses your credit card, security number ,name or other personal records to secure goods ,services, or credit with your hard earned assets. Everyday in the USA and…
By: Winston Hackshaw in  Legal  >  Identity Theft   May 22, 2011  
0
  Likes: 1

avoiding identity theft on the internet
In another article I mentioned the many dangers of identity theft on the internet. Phishing, social networking profiles, keylogging, and fraudulent charges are just a few of the dangers we are exposed to each time we surf the internet. How do we protect ourselves from the dangers? This article will…
By: Rhemawriter in  Finance   Aug 04, 2011  
0
  Likes: 0

Subtance Abuse Treament for An Addicted Spouse
Addicts who are trying desperately to get clean and sober might want to check out drug treatment near to there home. Some people have different opinions and perceptions about drug treatment and what it can do for them and what it cannot do so I though I would just clear…
By: Arthur Coburn in  Self Improvement  >  Addictions   Dec 17, 2011  
0
  Likes: 1

The Legal Debate Over P2p, Vpns, Torrents, And Your Privacy
Once the internet was thought as a wonderful service that circumvented all attempts of governments to control information. Sadly, this isn’t the case anymore. As you are probably aware, the websites that you can access are very different if you are living in China for example, or the United States.…
By: Roderick B in  Computers and Technology   Feb 04, 2013  
0
  Likes: 1

When You Learn Quickbooks, Know These 3 Vital Reports
Accountants are generally responsible for preparing three primary types of financial statements for a business. But when you learn Quickbooks, you can easily pull up these 3 vital reports yourself through the "Reports Center." The first of these reports is the income statement. The income statement reports the income and…
By: Mat Hultquist in  Business  >  Accounting   May 24, 2011  
0
  Likes: 0

What is Cryp1 Ransomware And How to Remove it
This is an article about a malicious program, which is called Cryp1. It is a virus that enters the user's computer, encrypts all the files that it can, and requires a ransom for their decryption. Such viruses are called ransomware, and are considered the most dangerous types of viruses. Their…
By: John137 in  Computers and Technology  >  Software   Jun 08, 2016  
5
  Likes: 11

How to Download Icloud Backup File to PC
Most iPhone users prefer iCloud to backup their data on iPhone. iCloud works really well for most of iPhone users. However, do you know how to download iCloud backup files to your computer? In this article, I will show you how to download iCloud backup file to PC. You need…
By: alan smith in  Computers and Technology  >  Software   Jun 06, 2016  
0
  Likes: 1

Macbook Pro Blu - Ray Player Software - Play Blu - Ray Disc Or ISO Files on Macbook Pro
The Mac Pro (not to be confused with MacBook Pro) is an Intel Xeon-based workstation computer manufactured by Apple Inc. The Mac Pro, in most configurations, is the fastest computer that Apple offers, and is one of three desktop computers in the current Macintosh lineup, the other two being the…
By: JerryEdison001 in  Computers and Technology  >  Software   Jun 04, 2016  
0
  Likes: 2

Article Views: 1826    Report this Article