Skip to main content

Email Verification, why or why not


You have a customer list, it’s yours, you collected all the names.

a burst of email
You’ve used it several times for marketing in the past.  Recently you used it again.  Some of your email messages came back because the addresses are invalid.  You want to send out another campaign but there’s only so much time you have to compose new content and get out a mailing.  Having over 29% invalid email addresses is so disappointing.   You do not have time for sanity checks; After all how many people leave out the @com on their Gmail address, or forget about that little dot between it.  Besides, this is an older list, and you believe all those addresses worked before?  Instead of deleting all those bounces, 29% of them.:

Does it make sense to trust an email verification service?

If you think about it, your member list, ideally, collected by you, is comprised of subscribers who are opted into your list.  All those addresses should be deliverable.  Why then would you use an email verification service which is only used to identify deliverable email addresses?   Could they help with those 29% bounced emails?

Just how is an email authenticated deliverable?

Letters with the word authenication
When an email is sent,  it’s essentially asking if a mailbox exists.  The sender’s server called the “Mail Transfer Agent” or MTA searches the @domain.com portion of the recipients’ email address to determine the destination mail server. That server is known as the MX server (“Mail Exchanger”).  The MX server replies the email address is active or not.  (exists or not).  When you send several, hundreds, or thousands of emails for verification, each one is processed in succession.  In other words, once the MX server replies to the first request, it moves on to the next address
This process, checking a mailbox existence, was and still is widely used by Spammers.  When Dundee Internet began, Spam was virtually unknown.  Then around the late 1990s and early 2000s, we became aware of dictionary attacks
A dictionary attack, a well-known spammer technique is used to validate email addresses.  It works by saturating a mail server with usernames from a dictionary type list, hence the name dictionary attack.  Accounts such as info@, president@, sales@ and so forth are usually the primary target.  This was an inexpensive way to verify a valid email box while creating a list of validated addresses.  ISPs, being the resourceful bunch we are, developed mechanisms to curtail these attacks, the easiest one being, to set the MTA to reject emails from unknown users.
Today, instead of using dictionary attack methods to valid email addresses, a spammer can hire an email verification service to achieve the same results – They eliminate non-existent email boxes.  By elimination, the result is a list of deliverable addresses.  But that’s all you get, email addresses, nothing more.  And by chance, someone on your validated list accepts your email (read or not). You may be surprised when suddenly, you’re on a  blacklisted.  Circumstances change:

  • A comcast.net email user may move to a town where Comcast doesn’t exist. They now have a Hotmail account.
  • Ellen got married. Her email address is ellen23982@gmail. She wants the world to know she’s married and happy so she creates mrshappyellen@gmail.com and stops using ellen23982@gmail
  • A new employee is working from home; the company requires him to use their email address and allows personal email as well. The employee stops using barry995@hotmail and exclusively sends and receives an email from bossbarry@mycompany.com
Inactive email address, if they remain inactive, can become spam traps, or eventually deleted and recycled.  Someone else may create an ellen23982 or a barry995.   An email verification service will only verify these addresses are active, not the person associated with them.  
Email marketers should have, not only the email address of their subscriber, but the name attached to it. They may use several methods when collecting names and addresses, including, point of sale sign up, trade show collection, online sales, and website signup.  Regardless of how these addresses are gathered, it usually takes time to build up a good list of opted-in members.   During this process, mistakes will be made.  Addresses will be entered incorrectly, by accident or on purpose, depending on the collection method. The email marketer will know how to correct some of these errors by reviewing the bounce report.

A bounce report covers different types of bounces, and like everything else the nature of the bounce is in the details.

.
In this case, the part of the bounce report to pay attention to is the area that attributes a bounce to a non-existent email address, user or mailbox: these addresses need to be removed.   Other bounces may clear themselves up,  you can read more about bounces here.  
.
cartoon of a cell phone and envelope with a caption update your contacts
Email verification is not accurate, it only verifies that there is an active email address, not the name s behind it.  Just because delivery is good, the data (the email address owner’s name) doesn’t have to be.
The best way to verify an email address, collect addresses with data authentication, such as their name.   When you add those addresses, do some sanity checks, add the missing @ or dot com.  If they bounce as invalids, remove them from your list and move on.  

Comments

Popular posts from this blog

Revolutionizing Group Communication: How DiscussionListServices.com Leads the Wa

  Tammy runs a nonprofit organization and there is so much to do. It’s a position that comes with its fair share of challenges and rewards. Managing a nonprofit means wearing multiple hats, including organizing events to coordinating volunteers and everything in between. With so many tasks and conversations happening across various groups, it's no wonder Tammy finds it hard to keep up. Was it Amy who said she would work with the kids on Wednesday and bring chairs, or was it crayons? And the weekend brunch—was it scheduled for 12 PM at 1 Main Street or 1 PM at 12 Main Street? YIKES!  Amidst the clutter of apps , digital reminders, and calendars, the details do get lost. Lost details lead to confusion and miscommunication. Overworked and stretched thin, Tammy needs a solution that simplifies communication without demanding more of her limited time. This is a common scenario for many nonprofit leaders, and the solution lies in effective communication tools. This is where group email o

Understanding Permalink Structures In WordPress

 In WordPress, a permalink (short for "permanent link") is the URL to a specific post, page, or other content on your site. The permalink structure refers to how these URLs are formatted. WordPress allows you to customize the structure of your permalinks to make them more user-friendly and SEO-friendly.   Types of Permalink Structures in WordPress   Plain   URL example: http://mybookstation.com/?p=123   Description: This is the default setting and is not very user-friendly or SEO-friendly .   Day and Name   URL example: http://mybookstation.com/2024/05/22/sample-post/   Description: Includes the year, month, day, and the post name.   Month and Name   URL example: http://mybookstation.com/2024/05/sample-post/   Description: Includes the year, month, and the post name.   Numeric   URL example: http://mybookstation.com/archives/123   Description: Uses the post ID in the URL.   Post Name   URL example: http://mybookstation.com/sample-post/   Description: Uses the post name (slug)

Exploring Green Website Design: Sustainable Solutions For A Digital Future

Do my online activities impact the environment? Quite possibly. It’s important to remember that everything has a cost, even seemingly free Wi-Fi. Accessing the internet consumes energy, from powering our devices to running wireless networks. Each of these actions releases a few grams of carbon dioxide into the atmosphere. But have you ever wondered where all this data is stored? Whether on standalone servers, networked systems, or in the “cloud ”, storing our endless data streams requires a significant amount of energy. This is where the concept of a green website comes into play. Using less energy to access websites, data, and information is not a solution most of us have. However, we can minimize the ecological footprint on a smaller scale with a green website design. This method, while minimizing the ecological footprint, can maximize functionality and appea l. What is Green Website Design? The principles of Green Website Design start with a holistic approach to web design and de