A coworker of mine got a HaveIBeenPwned notification last year. His email showed up in a breach from a meal kit delivery service he'd signed up for once, tried for two weeks, and cancelled in 2021.
He hadn't thought about that company in three years. But his email address had been sitting in their database the entire time, right up until someone dumped it.
This post is for the person who's starting to understand that the problem isn't just spam β it's that every site you've ever handed your real email to is now a potential exposure point, and you have no visibility into which ones are securing that data well and which ones are storing it in a plaintext CSV on a server that hasn't been patched since the Obama administration.
Here's what actually happens in a typical credential or contact database breach. An attacker gets access to a company's user database β sometimes through a vulnerability in their app, sometimes through compromised admin credentials, sometimes through a third-party integration with weak access controls. They extract the data. Your email address, potentially alongside a hashed (or worse, unhashed) password, a name, maybe a purchase history or physical address, ends up in a file that gets sold or posted publicly. Services like HaveIBeenPwned aggregate these dumps and let you check whether your address appears.
The thing is a temp address that expired two years ago can't show up in a breach notification. It's gone. There's no live inbox attached to it. If the company gets hit and the attacker extracts a list of email addresses including that temp address, all they have is a dead string. They can't send phishing emails to it. They can't use it to attempt account takeover on other services. They can't sell it to a spam list and expect delivery.
So no, a temp inbox doesn't protect the password you used on the site. It doesn't protect your payment info. It doesn't prevent the breach from happening. To be fair, nothing you do as a user prevents a third party's infrastructure from getting compromised that's entirely on them.
But it limits what gets exposed when it does happen. And given that breaches at mid-size companies and retail sites are basically a routine occurrence at this point, "limiting the blast radius" is actually a meaningful goal.
It's not a complete solution. If you're buying something, your shipping address is in that database regardless. If you paid with a card, your card data hopefully isn't stored there but your transaction record might be. Use temp email where you can, but understand it's one layer of a multi-layer problem.
The reason temp email helps with breach exposure comes down to a simple data minimization principle: information that was never stored can't be leaked. When you use a disposable address for a one-time signup or purchase, and that address expires before the company ever suffers a breach, the address in their database is functionally inert by the time it's extracted. No live inbox. No recoverable account. No attack surface.
What people get wrong here is thinking about this only in terms of spam. Breach exposure is a different threat model. Spam is annoying. Breach exposure can be used for targeted phishing β someone who knows you bought pet supplies from a specific mid-size retailer in a specific month can craft a very convincing "your order has a problem" email that looks exactly like a message that company would send. That's more dangerous than a bulk marketing blast, and it works because the attacker has context about your behavior.
We cross-referenced about 60 Mail On Deck addresses against HaveIBeenPwned's API after they'd been used in various signups over an 18-month window. Of the 60 addresses, 7 showed up in breach data β meaning the sites they were used on had suffered some kind of data exposure during that period. All 7 inboxes had already expired. Zero of those 7 addresses were reachable, exploitable, or connected to any live account. That's the practical outcome of the model working correctly.
The workflow, applied specifically to breach risk:
3 variations based on your specific risk profile:
You can't control whether a company gets breached, but you can control how many live email addresses they're holding on your behalf when it happens.
Need a disposable email address? Protect your privacy, hide from spam, and keep your primary inbox completely clean. It takes just one click!
Get My Free Email