Proton

Your email has become a prime target for advertisers seeking valuable information about your online activity. Many advertisers try to track you using spy pixels, which we recently discovered are present in over half of all emails. These pixels allow advertisers to track when, where, and from which device you open their emails, compromising your privacy.

Proton Mail protects you from tracking pixels by default, but advertisers have more tools they can use to track you. After spy pixels, tracking links embedded in an email or newsletter are one of the most common ways companies try to spy on you.

These tracking links typically tell an organization which email you read, what you clicked to open the link, and what marketing campaign you engaged with. While not all tracking links are nefarious, they can relay sensitive information that companies can use to personally identify you, profile your behavior, and follow what you do across apps and websites.

Starting today, we’re happy to introduce Tracking Links Protection on our web app. It removes known tracking parameters from links in your emails and is turned on by default. We’re the first email service to offer this level of protection because we believe your inbox belongs to you.

How do tracking links work?

Tracking links can be particularly insidious. They’re often hard to detect: many times, it’s only after you click that you’ll notice an overly long URL in your browser’s address bar, filled with tracking parameters.

Most companies track links to monitor the effectiveness of their marketing campaigns, which can have a significant impact on your privacy. By attaching parameters to the URLs in their emails, these companies can track your interactions with their website over time and between apps.

They can then use this information to build a profile on you, refine it to better target you, and share it with third parties. Clicking a tracking link in an email you received can have a significant impact on your privacy because the advertiser already has your email address, which it can use to tie all your online activity together.

The most common tracking parameters are Urchin Tracking Module (UTM) parameters, which are supported natively by Google Analytics. They typically include the campaign name, audience, source (in this case, email), and touchpoint (such as a button in an email). While UTM parameters can be generic, they can also be customized just for you, depending on the sender’s needs. In addition, other ad and tech companies have developed custom tracking parameters that aren’t always documented, making it hard to tell what information they collect. 

With all this in mind, we believe tracking links are increasingly being used as a form of surveillance and privacy abuse.

How Proton Mail protects you from email tracking

Proton Mail already blocks tracking pixels used by snooping email senders, so cleaning links from tracking parameters was a logical next step as part of our commitment to protect your privacy. 

To accomplish this, we’ve created a blocklist of known tracking parameters using both internal and external, community-supported sources. This ensures that we block not only UTM tracking parameters but also some other custom parameters used by ad companies.

Cleaned links will still redirect you where the sender intended, but they won’t inform the sender that you clicked their link, where you came from, or anything else. We’ve added more details about links and the trackers we block that you can now access by clicking the shield icon.

While privacy-focused browsers like Firefox, Brave, and Safari offer or are developing similar features that block tracking links, it’s unclear whether Chrome or Edge will ever adopt such measures. To ensure you receive consistent privacy protection no matter which browser you use, we built Tracking Links Protection directly into Proton Mail.

Learn how to use Tracking Links Protection

It should be noted that email tracking remains a game of cat and mouse. It’s likely that some advertisers will change their tracking parameters to get around blocking technologies or make it so that removing them would break the link. (In such a case, we default to leaving the link intact.)

If you’re particularly concerned about link tracking, be sure to enable our link confirmation feature to make sure you always know where you’re being redirected. 

Use Proton Mail for a safer inbox, free from trackers 

By choosing Proton Mail, you can have peace of mind knowing that what you do in your inbox and with your emails will stay with you. We want to enable you to keep your personal information private and secure from companies trying to track your every move online. 

With our ongoing efforts to protect you from trackers, we’re building a higher standard for email where tracking has no place. Thank you for your support and let us know what you think of Tracking Links Protection on Reddit(new window) or Twitter(new window).

Secure your emails, protect your privacy
Get Proton Mail free

Related articles

en
Cyberattacks aren’t always executed through sophisticated methods like man-in-the-middle (MITM) attacks on public WiFi. Sometimes, they rely on something as simple as looking over your shoulder.  Shoulder surfing attacks are when someone watches you
en
Proton prioritizes our community’s privacy and data security in every aspect of our business.  To further demonstrate our commitment, we underwent a rigorous external audit and – on May 2, 2024 – received our ISO 27001 certification.  As an organiz
en
Anyone with an iPhone can now enjoy Proton Drive’s secure and private photo backup capabilities. This feature is gradually rolling out to the Proton community and will be available to everyone by the end of this week. Smartphones have made us all am
en
From the very beginning, Proton has always been a different type of organization. This was probably evident from the way in which we got started via a public crowdfunding campaign that saw 10,000 people donate over $500,000 to launch development. As
en
Your online data is valuable. While it might feel like you’re browsing the web for free, you’re actually paying marketing companies with your personal information. Often, even when you pay for services, these companies still collect and profit from y
en
Password spraying attacks pose a major risk to individuals and organizations as a method to breach network security by trying commonly used passwords across numerous accounts. This article explores password spraying attacks, explaining their methods