ProtonBlog(new window)
how to stop email trackers

How to stop email trackers from invading your privacy

Share this page

Around 50% of all emails contain trackers that spy on your email activity — over 160 billion messages sent every day. Here’s how they work and how to block them.

Working silently in the background, email trackers not only monitor how you respond to messages but can also be used to track you across the web. We explain how email trackers work, why they threaten your privacy, and the easiest way to stop them.

What is email tracking?
How do email trackers work?
Spy pixels
Tracking links
Why email trackers threaten your privacy
How to block email trackers
1. Get enhanced tracking protection
2. Hide your email with aliases
3. Turn off autoloading images
4. Get a browser extension
5. Use a VPN
Stop email trackers, protect your privacy

What is email tracking?

Email tracking is a form of digital surveillance that can monitor when, how, from where, and with what device you read emails. By inserting email trackers in newsletters and other marketing materials, companies may see whether you opened a message, details about your device, and even your location.

How do email trackers work?

There are two common types of email trackers: spy pixels and tracking links.

Spy pixels

Spy pixels, also known as tracking pixels, are tiny, single-pixel images that are inserted into an email.

When you open a message with a spy pixel, this transparent and usually invisible image is loaded from the source server, sending sensitive information back to the sender or the tracking database.

How email trackers work when you open an email

Spy pixels may collect the following information about your online activity:

  • Whether you opened an email and how many times
  • The date and time you opened it
  • What device and operating system you used to open it
  • Your internet service provider (ISP) and rough location inferred from your IP address(new window)

Some emails contain a single spy pixel to collect limited information for the sender, for example, to measure the email open rate for a marketing campaign. But others may contain several tracking pixels to send information to multiple third parties(new window).

Companies also try to track you with tracking links – URLs containing tracking parameters. Designed to track the effectiveness of marketing campaigns, tracking links can track your interactions with websites over time and between apps.

The most common tracking parameters are UTM (Urchin Tracking Module) parameters, which are supported natively by Google Analytics.

Here’s a breakdown of a link with typical UTM tracking parameters.

UTM parameters are often generic. But they can also be customized just for you, depending on the sender’s needs.

Ad and tech companies have also developed custom tracking parameters that aren’t always documented, making it hard to tell what information they collect. 

Clicking a tracking link in an email you receive can have a significant impact on your privacy because the advertiser already has your email address, which it can use to tie all your online activity together.

Why email trackers threaten your privacy

The threat email trackers pose to your privacy goes far beyond an individual sender knowing when you opened an email, as a Princeton study of spy pixels(new window) has shown.

First, by linking your email address, browser and device fingerprint(new window), and IP address with third-party tracking cookies, email trackers can be used to track your browsing activity across the web.

Second, as trackers can connect email addresses to your browsing histories and profiles, this “leads to further privacy breaches such as cross-device tracking and linking of online and offline activities”, as the Princeton research explains. For example, you could get ads from a store if you had the store’s loyalty card linked to your email address.

Third, emails may contain several trackers that send information to multiple third parties, not just an individual sender. Princeton researchers found that 70% of emails from mailing lists contain at least one tracker.(new window) One sample email analyzed sent tracking requests to 24 third parties, including major data brokers(new window).

Armed with this data, big tech companies, advertisers, governments, or even criminal attackers can build detailed profiles of you(new window) — all without your consent.

At Proton, we’ve found that almost 50% of all emails contain spy pixels(new window). Across the globe, that means over 166 billion emails are sent with trackers every day.

How to block email trackers

There are ways to block spy pixels, though they’re not all equally effective or convenient. Here’s how you can stop email trackers from spying on you:

1. Get enhanced tracking protection

The easiest way to stop email tracking is to use Proton Mail with enhanced tracking protection(new window).

Enhance tracking protection automatically blocks trackers by

  • Removing known spy pixels every time you receive an email
  • Preloading other remote images using a proxy with a generic IP address to hide your IP address and location
  • Caching images for a few days for faster, secure access
  •  “Cleaning” tracking links to remove known UTM or other tracking parameters

Proton Mail tells you when you open an email containing blocked trackers with this tracker icon. The number on the icon (9 in the example below) indicates the total number of trackers (spy pixels) blocked and links cleaned.

Shield icon showing the figure 9 with a tooltip showing 3 trackers blocked and 6 links cleaned

Click the shield icon to learn more about the blocked trackers and cleaned links. 

More details about the trackers blocked and links cleaned

Enhanced tracking protection is enabled by default on the Proton Mail web, iPhone, and iPad apps for all Proton Mail users.

Learn more about enhanced tracking protection

Get Proton Mail button

2. Hide your email with aliases

Another way to limit email tracking is to hide your email address. By using email aliases(new window), you can send and receive emails while protecting your personal email address from third-party tracking.

A good email aliasing service, like SimpleLogin by Proton(new window), allows you to create random email addresses for different services, keeping your real address private.

3. Turn off autoloading images

As spy pixels work by loading images, you can block them by stopping images from loading automatically.

Here’s how to stop autoloading images with popular email providers on the web. With most email services, you’ll also need to change the equivalent settings in any desktop or mobile apps you use.

Stop Gmail autoloading images

  1. Sign in to your account at mail.google.com(new window).
  2. Go to Settings → General → Images.
  3. Select Ask before displaying external images.

Stop Outlook.com autoloading images

  1. Sign in to your account at outlook.com(new window)
  2. Go to Settings → General → Images
  3. Select Always use the Outlook service to load images.

Stop Proton Mail autoloading images

  1. Sign in to your account at mail.proton.me(new window).
  2. Click Settings → All settings → Proton Mail → Email privacy
  3. Turn off Auto show remote images.

With Proton Mail, you don’t need to turn off autoloading images because it has enhanced tracking protection enabled by default on the Proton Mail web, iPhone, and iPad apps. Since you can view images without being spied on, remote images are autoloaded by default on these platforms.

4. Get a browser extension

If you use Gmail, you can use third-party extensions, like Ugly Email or PixelBlock, to block email trackers. But these are browser-based and only work with Gmail on the web.

Moreover, adding any third party to your email is always an extra privacy risk as you need to give them full access to your email.

5. Use a VPN

Finally, using a trusted virtual private network (VPN)(new window) like Proton VPN(new window) can help to beat email trackers. A VPN encrypts your internet traffic and hides your real IP address.

First, masking your IP address makes it more difficult for trackers to link your email activity with your identity.

Second, some good VPNs actively block some trackers. For example, Proton VPN’s NetShield Ad-blocker(new window) blocks connection attempts to servers hosting trackers and malware, including email trackers. But email-specific blockers, like Proton Mail’s enhanced tracking protection, will often be more effective as they’re focused on email.

Stop email trackers, protect your privacy

Spying on you silently in the background, email trackers are endemic and a pervasive threat to your privacy.

Some trackers may be relatively innocuous, like silent read receipts from companies to measure a single marketing campaign. Others are far more invasive, linking your email activity with your IP address, device details, and browsing history to track you across the web for surveillance-based advertising(new window).

While you may have checked a box next to a company’s privacy policy(new window), you never signed up to reveal intimate personal details about your life — information that can be shared and sold beyond your control.

At Proton, we’re working to give everyone the tools to stay secure and in control of their personal data at all times. That’s why we offer Proton Mail free with enhanced tracking protection.

If you want to support our mission, sign up for a paid plan. Our Proton Unlimited plan includes 500 GB of encrypted storage, 15 addresses, and unlimited aliases to protect your email address. 

Stay secure!

Protect your privacy with Proton
Create a free account

Share this page

Harry Bone(new window)

A long-standing privacy advocate, Harry worked as a translator and writer in a range of industries, including a stint in Moscow monitoring the Russian media for the BBC. He joined Proton to promote privacy, security, and freedom for everyone online.

Related articles

How to share a PDF
Sharing a PDF with coworkers, friends, or family members can sometimes be trickier than it seems if you’re trying to share a large file or if you want to use secure encryption. In this article, we show you how to share any PDF quickly, easily, and se
Proton Pass for Windows
Proton Pass is launching its new app for Windows, allowing you to access our password manager from your desktop. As one of our community’s most requested features, it’s available to everyone starting today. Proton Pass is the centerpiece of our effo
password policy
Businesses are increasingly dealing with the fallout from cybercrime: The number of attacks is on the rise and the damage done is growing exponentially. One of the most common vulnerabilities for organizations are their passwords. Since they are your
How to free up disk space
If you’ve ever owned an electronic device of any kind, you know the struggle of running out of space. No matter if it’s a smartphone, laptop, or desktop computer, there never seems to be enough room for all your files. Let’s show you some simple ways
What is 3-2-1 backup
Data backup is vital for businesses and individuals alike: In case something happens to your primary computer, you always have a copy of your data to fall back on.  How should you approach backup, though? The 3-2-1 rule can act as a guide when decid
What was your first pet’s name? In what city were you born?  We’ve all had to answer these questions to reset a long-forgotten password, but consider how that works. Much of this information is easy to find for others (or easily forgotten by you), m