Mail Forwarding - Why Would You Do It?

First of all we need to get some terms stated. I have been in the business for just over two years and there is still some confusion over the topic.

Mail forwarding: is a service that allows you to have your mail sent to a “mailbox” and then they will forward it off to your location. This mail is generally sent in bulk to the recipient and is very useful if you travel, or don’t have a permanent address.

Mail Redirection: is when you have mail sent direct to a mailbox and then it is “remailed” to another location. This is mainly used by organisations or individuals who wish to keep their physical address a secret.

Remailing: is as simple as receiving a letter, re-stamping and addressing the letter then posting it again. This is pretty much what happens when mail is forwarded or redirected.

First of all when you think about tampering with mail such as remailing, forwarding etc. you think “dodgy” or is that legal? Quite simply yes, it is legal but it all depends on what the intent of the service is. I will explain why people need to have a fake mail address.

Mail Drop: is defined as “an address or place at which a nonresident person receives mail, often of a secret nature” (2005) Dictionary.com

So why are there so many names for the same services?

It is pretty simple to understand why there are so many names and that is because the vendors that offer these services are trying to obtain as many hits through search engines as possible, they use phrases such as “forwarding” “redirection” etc.

In doing this they can confuse the customer and they will not have a clear understanding of the services that are available.

What service should I use then?

Mail drops are generally the most defined term and are understandably the most common. I define Mail Drops as a mailbox that has been purchased on your behalf and all mail within the mailbox is sent to your predefined recipient address. Most Vendors provide shared mail boxes, where you share a box with many users for a cheap price, or dedicated services where you actually rent the whole mailbox. You should look at how manageable your account is, can you have multiple predefined recipient addresses, and can you see what mail you have and how much mail you have in the box at any time.

Why would people even use such a service?

Anonymity is the simple answer, or people who choose to keep their identity secret from others. There are many reasons for doing this, the most legitimate reason for using such services is for people who move around and do not have one stagnant address. Although the services are set up by legitimate vendors, there are the customers who wish to evade the law and have private documents sent without detection. These customers can harm or damage the vendor’s reputation and if any prohibited material is detected they can often face heavy charges.

There are many vendors out there who provide this service, I am not going to recommend any particular vendor but I do advise that you shop around and take a look at their history and talk to other customers who have used their services. All the vendors are located in multiple countries; you should take a look at their country of origin, what privacy laws are enforced there, what is their law enforcement like? Then take a look at the site. Read their privacy statement, try to understand it. Make sure you fully understand their terms of service. You do not want to be stuck with a huge fine, or if you’re trying to keep yourself anonymous, you don’t want to have your private information public. Or worst of all have them read your private mail!

Good luck

Steve
©Private Mail Services
http://www.private-services.com 2005 - Keeping You Anonymous

In The News:


pen paper and inkwell


cat break through


Money Mule Email Scam Hits U.S.

Imagine this ? you open up your email box and... Read More

Burning Bridges is Bad, But Firewalls are Good

When you signed up for that ultra-fast DSL or Cable... Read More

5 Tips For An Unbreakable Password

Despite the current wave of identity theft and corporate security... Read More

7 Ways to Spot a PayPal Scam E-Mail

Paypal is a great site and is used by many... Read More

Anti-Spyware Protection: Behind How-To Tips

There is no doubt that "how-to articles" have become a... Read More

Dialing Up a Scam: Avoiding the Auto-Dialer Virus

For many, the daily walk to the mailbox evokes mixed... Read More

Fishing for Fortunes. Scam!

Spelt phishing, but pronounced as above, this despicable act is... Read More

Just Whos Computer is this Anyway?

Well, this is an article I never thought I would... Read More

Is Spyware Watching You?

Imagine my surprise when I received a phone call from... Read More

DOS Attacks: Instigation and Mitigation

During the release of a new software product specialized to... Read More

Do You Know What your Kids Are Doing Online?

It's a sad statistic, but hundreds of unsuspecting kids are... Read More

Arming Yourself Against Spyware

While clicking from site to site on the internet you... Read More

Virus Prevention 101

Blaster, Welchia, Sobig, W32, Backdoor, Trojan, Melissa, Klez, Worm, Loveletter,... Read More

A New Era of Computer Security

Computer security for most can be described in 2 words,... Read More

3 Things You Must Know About Spyware

1)Spyware is on your system. Like it or not, statistically... Read More

Online Shopping: 10 Tips For Safe Online Shopping

Have you ever bought a product or service from the... Read More

Computer Viruses - How to Remove a Computer Virus from Your Computer

Computer viruses infect millions of computers every day. Viruses can... Read More

Everything You Need To Know About Spyware and Malware

You are at your computer, checking out software on EBay.... Read More

Phishing - Identity Theft & Credit Card Fraud

What is Phishing? Phishing is a relatively newly coined term... Read More

8 Surefire Ways to Spot an E-Mail Identity Theft Scam!

The E-Mail Identity Theft Scam is running Rampant. These E-Mail... Read More

If You Sell Anything Online Your ePockets Are Being Picked

You and I are a lot alike. We are both... Read More

The Saga of the Annoying Adware

When we think of adware, what comes to mind are... Read More

Spy Scanners ? Don?t Compromise your Privacy

Spies, spyware, internet parasites are among what they are usually... Read More

Whats All This I Hear About Firewalls?

At this point, if you've got the whole "turning the... Read More

Desktop Security Software Risks - Part 1

This is the second in a series of articles highlighting... Read More

Make Money Online - Defend Against The Latest Scam

First, let's do a little recap'. As I stated in... Read More

Steganography ? The Art Of Deception & Concealment

The Message Must Get Through The year is 300A.D.,... Read More

The Risk Of Electronic Fraud & Identity Theft

Electronic Fraud and Identity Theft Human beings are pretty... Read More

Information Security for E-businessmen: Just a Couple of Ideas

If you constantly deal with bank or electronic accounts, it... Read More

I Spy...Something Terribly Wrong (In Your Computer)

This really chapped my lips...I recently bought a new computer.... Read More

The 5 Critical Steps to Protecting Your Computer on the Internet

Spyware, viruses and worms... oh my!If you are connected to... Read More

Reducing Fraudulent Transations ? 5 Simple Ways To Protect Yourself

The money being spent online is steadily growing. With billions... Read More

What is Spyware?

The most frustrating part of having Spyware on your computer... Read More