Proton
Email tracker protection

At Proton Mail, we believe that reading emails should be as private as our end-to-end encryption makes sending them.

Today, we’re happy to introduce enhanced tracking protection, a feature that will provide an additional layer of privacy to your inbox. Now you can read your emails without letting advertisers watch you, build a profile on you, or serve you ads based on your mail activity.

By default, Proton Mail on the web now protects your privacy by:

  • Blocking tracking pixels commonly found in newsletters and promotional emails, preventing senders from spying on your mail. 
  • Hiding your IP address from third parties so your location remains private. 

With enhanced tracking protection, you can continue to use your Proton Mail address to subscribe to newsletters and register for online accounts everywhere while enjoying a better, more private email-reading experience. 

How does email tracking work?

Email tracking is a form of digital surveillance that has become a serious concern(nowe okno) in recent years. Over 40% of emails sent and received daily(nowe okno) are tracked. It works by embedding a tiny, invisible spy pixel in an email sent to you, logging details about your mail activity. Every time you open the email, the spy pixel collects information such as:

  • When you opened an email
  • How many times you have opened an email
  • The device(s) involved
  • Your location and IP address

The gathered data is sent to the email sender, all without your consent. Email trackers can sometimes even expose your information to third parties(nowe okno), allowing them to track you across the web and connect your online activity to your email address(nowe okno), further shaping your invisible online profile. 

Use Proton Mail for a cleaner, more private inbox 

At Proton Mail, our vision is to build a better internet where privacy is the default. As part of this vision, we’ve built enhanced tracking protection to keep your personal data safe. The feature is enabled by default on our web app, so you can enjoy peace of mind knowing that your emails are always protected. 

You can also learn more about spy pixels and how we block them from your emails

Once again, we thank you for being a valuable member of the Proton community!

Powiązane artykuły

A phone screen with a speech bubble with a phone number in it
en
Your email address and passwords aren't the only information hackers can use to scam you. Here's what someone can do with your phone number — and how to protect it.
A web application screen with an unlock icon in the bottom right corner
en
Your best defense against a data breach could be improving your web application security: Find out how Proton Pass can help.
Investigative journalist Vegas Tenold explains the gear he uses to protect his privacy and stay safe.
en
  • Co nowego w obszarze ochrony prywatności
Follow investigative journalist Vegas Tenold as he explains his gear and how it keeps him safe from surveillance as he works in the field.
Coinbase, the largest Bitcoin exchange in the US, suffered a data breach
en
  • Co nowego w obszarze ochrony prywatności
  • Proton Wallet
Coinbase employees sold sensitive personal information to attackers, including government IDs and BTC transaction history. Proton Wallet is built to avoid these risks.
Whistleblower's whistle. Journalists must use secure channels to communicate with whistleblowers.
en
  • Przewodniki dot. prywatności
Whistleblowers risk everything to expose the truth. This guide helps journalists keep their sources safe using secure tools like Proton Mail, Signal, and SecureDrop.
An image showing a phone screen with a child icon and three icons with '17+' '8-12' and '3-5' to indicate age ratings
en
  • Przewodniki dot. prywatności
Parents can help their children develop healthy screen habits by learning about dark design patterns — Proton investigates how