{"id":8163,"date":"2019-01-15T02:22:08","date_gmt":"2019-01-15T02:22:08","guid":{"rendered":"https:\/\/www.appservgrid.com\/paw92\/?p=8163"},"modified":"2019-01-24T02:44:41","modified_gmt":"2019-01-24T02:44:41","slug":"dont-return-to-sender-how-to-protect-yourself-from-email-tracking-linux-com","status":"publish","type":"post","link":"https:\/\/www.appservgrid.com\/paw92\/index.php\/2019\/01\/15\/dont-return-to-sender-how-to-protect-yourself-from-email-tracking-linux-com\/","title":{"rendered":"(Don&#8217;t) Return to Sender: How to Protect Yourself From Email Tracking | Linux.com"},"content":{"rendered":"<p>There are a lot of different ways to track email, and different techniques can lie anywhere on the spectrum from marginally acceptable to atrocious. Responsible tracking should aggregate a minimal amount of anonymous data,\u00a0similar to\u00a0page hits: enough to let the sender get a sense of how well their campaign is doing without invading users\u2019 privacy. Email tracking should always be disclosed up-front, and users should have a clear and easy way to opt out if they choose to. Lastly, organizations that track should minimize and delete user data as soon as possible according to an easy-to-understand data retention and privacy policy.<\/p>\n<p>Unfortunately, that\u2019s often not how it happens. Many senders,\u00a0<a href=\"https:\/\/www.eff.org\/deeplinks\/2019\/01\/federal-government-offers-case-study-bad-email-tracking\" target=\"_blank\" rel=\"noopener\">including the U.S. government<\/a>, do email tracking clumsily. Bad email tracking is ubiquitous, secretive, pervasive, and leaky. It can expose sensitive information to third parties and sometimes even others on your network. According to a\u00a0<a href=\"https:\/\/senglehardt.com\/papers\/pets18_email_tracking.pdf\" target=\"_blank\" rel=\"noopener\">comprehensive study from 2017<\/a>, 70% of mailing list emails contain tracking resources. To make matters worse, around 30% of mailing list emails also leak your email address to third party trackers when you open them. And although it wasn\u2019t mentioned in the paper, a quick survey we did of the same email dataset they used reveals that around 80% of these links were over\u00a0<a href=\"https:\/\/www.eff.org\/encrypt-the-web\" target=\"_blank\" rel=\"noopener\">insecure, unencrypted HTTP<\/a>.<\/p>\n<p>Here are some friendly suggestions to help make tracking less pervasive, less creepy, and less leaky.<\/p>\n<p>Read more at\u00a0<a href=\"https:\/\/www.eff.org\/deeplinks\/2019\/01\/stop-tracking-my-emails\" target=\"_blank\" rel=\"noopener\">EFF<\/a><\/p>\n<p><a href=\"https:\/\/www.linux.com\/news\/dont-return-sender-how-protect-yourself-email-tracking\" target=\"_blank\" rel=\"noopener\">Source<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>There are a lot of different ways to track email, and different techniques can lie anywhere on the spectrum from marginally acceptable to atrocious. Responsible tracking should aggregate a minimal amount of anonymous data,\u00a0similar to\u00a0page hits: enough to let the sender get a sense of how well their campaign is doing without invading users\u2019 privacy. &hellip; <\/p>\n<p class=\"link-more\"><a href=\"https:\/\/www.appservgrid.com\/paw92\/index.php\/2019\/01\/15\/dont-return-to-sender-how-to-protect-yourself-from-email-tracking-linux-com\/\" class=\"more-link\">Continue reading<span class=\"screen-reader-text\"> &#8220;(Don&#8217;t) Return to Sender: How to Protect Yourself From Email Tracking | Linux.com&#8221;<\/span><\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1],"tags":[],"class_list":["post-8163","post","type-post","status-publish","format-standard","hentry","category-linux"],"_links":{"self":[{"href":"https:\/\/www.appservgrid.com\/paw92\/index.php\/wp-json\/wp\/v2\/posts\/8163","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.appservgrid.com\/paw92\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.appservgrid.com\/paw92\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.appservgrid.com\/paw92\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.appservgrid.com\/paw92\/index.php\/wp-json\/wp\/v2\/comments?post=8163"}],"version-history":[{"count":1,"href":"https:\/\/www.appservgrid.com\/paw92\/index.php\/wp-json\/wp\/v2\/posts\/8163\/revisions"}],"predecessor-version":[{"id":8635,"href":"https:\/\/www.appservgrid.com\/paw92\/index.php\/wp-json\/wp\/v2\/posts\/8163\/revisions\/8635"}],"wp:attachment":[{"href":"https:\/\/www.appservgrid.com\/paw92\/index.php\/wp-json\/wp\/v2\/media?parent=8163"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.appservgrid.com\/paw92\/index.php\/wp-json\/wp\/v2\/categories?post=8163"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.appservgrid.com\/paw92\/index.php\/wp-json\/wp\/v2\/tags?post=8163"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}