a computing system receiving from a third party an attempted communication addressed to a virtual identifier associated with a first user, wherein the virtual identifier is not usable to send communications other than by receiving communications addressed to the virtual identifier and forwarding the received communications to the first user via an actual identifier associated with the first user;