ProtonBlog
Email tracker protection

Enjoy a safer email experience free from trackers

At Proton Mail, we believe that reading emails should be as private as our end-to-end encryption makes sending them.

Today, we’re happy to introduce enhanced tracking protection, a feature that will provide an additional layer of privacy to your inbox. Now you can read your emails without letting advertisers watch you, build a profile on you, or serve you ads based on your mail activity.

By default, Proton Mail on the web now protects your privacy by:

  • Blocking tracking pixels commonly found in newsletters and promotional emails, preventing senders from spying on your mail. 
  • Hiding your IP address from third parties so your location remains private. 

With enhanced tracking protection, you can continue to use your Proton Mail address to subscribe to newsletters and register for online accounts everywhere while enjoying a better, more private email-reading experience. 

How does email tracking work?

Email tracking is a form of digital surveillance that has become a serious concern(new window) in recent years. Over 40% of emails sent and received daily(new window) are tracked. It works by embedding a tiny, invisible spy pixel in an email sent to you, logging details about your mail activity. Every time you open the email, the spy pixel collects information such as:

  • When you opened an email
  • How many times you have opened an email
  • The device(s) involved
  • Your location and IP address

The gathered data is sent to the email sender, all without your consent. Email trackers can sometimes even expose your information to third parties(new window), allowing them to track you across the web and connect your online activity to your email address(new window), further shaping your invisible online profile. 

Use Proton Mail for a cleaner, more private inbox 

At Proton Mail, our vision is to build a better internet where privacy is the default. As part of this vision, we’ve built enhanced tracking protection to keep your personal data safe. The feature is enabled by default on our web app, so you can enjoy peace of mind knowing that your emails are always protected. 

You can also learn more about spy pixels and how we block them from your emails(new window)

Once again, we thank you for being a valuable member of the Proton community!

Protege tus correos electrónicos y también tu privacidad
Obtén Proton Mail gratis

Artículos relacionados

compromised passwords
en
  • Cuestiones básicas de privacidad
Compromised passwords are a common issue and probably one of the biggest cybersecurity threats for regular people. How do passwords get compromised, and is there anything you can do to prevent it? * What does compromised password mean? * How do pa
Is WeTransfer safe?
en
  • Cuestiones básicas de privacidad
WeTransfer is a popular service used by millions worldwide to send large files. You may have wondered if it’s safe or whether you should use it to share sensitive files. We answer these questions below and present a WeTransfer alternative that may su
what is a dictionary attack
en
  • Cuestiones básicas de privacidad
Dictionary attacks are a common method hackers use to try to crack passwords and break into online accounts.  While these attacks may be effective against people with poor account security, it’s extremely easy to protect yourself against them by usi
en
Data breaches are increasingly common. Whenever you sign up for an online service, you provide it with personal information that’s valuable to hackers, such as email addresses, passwords, phone numbers, and more. Unfortunately, many online services f
en
Secure, seamless communication is the foundation of every business. As more organizations secure their data with Proton, we’ve dramatically expanded our ecosystem with new products and services, from our password manager to Dark Web Monitoring for cr
what is a brute force attack
en
  • Cuestiones básicas de privacidad
On the subject of cybersecurity, one term that often comes up is brute force attack. A brute force attack is any attack that doesn’t rely on finesse, but instead uses raw computing power to crack security or even the underlying encryption. In this a