We still impersonate (not forge) the email address if the user allows their email addresses to be visible.
We still impersonate (not forge) the email address if the user allows their email addresses to be visible.