Proton
pixel tracking: here's how to tell which emails track your activity

What is pixel tracking? How to tell when emails are tracking you

Advertisers, political organizations, and other entities are quietly monitoring your email activity through tiny pixel trackers embedded in the messages you receive. These trackers can reveal when you open an email, where you’re located, and what device you’re using.

While many people don’t realize this tracking is happening, it’s yet another reason to consider moving away from free email providers like Google, which rely on ad-driven revenue. If the service is free, chances are your data and online activity are the real product being sold to advertisers.

In this article, we’ll find out what pixel tracking is and how it works, how to identify emails that contain these hidden trackers, and how Proton Mail is raising the bar for email privacy.

What is pixel tracking?

Also known as a web beacon or spy pixel, pixel tracking is a method used to monitor and gather data about how users interact with digital content. It does so by embedding a small, often invisible graphic (typically 1×1 pixel) in websites, emails, or advertisements.

Tracking pixels often serve one of two purposes: 

  • Retargeting pixels for tracking users who have visited a website but did not complete a desired action, like making a purchase. They help marketers create targeted ads and re-engage users across different platforms.
  • Conversion pixels for monitoring specific actions, such as purchases or sign-ups, to measure how effective marketing campaigns are.

How pixel tracking works

When someone opens a webpage or email, a pixel tracker is “loaded” from a server, which allows the server to log this interaction. Here’s what happens:

  1. Embedding the snippet: A small snippet of HTML or JavaScript code containing the pixel URL is embedded in the webpage or email — usually graphics.
  2. Triggering the snippet: When you open the page or email, your browser or email client automatically requests the image from the server.
  3. Collecting data: The request logs your information, such as IP address(new window), device type, operating system, email open time, time of visit, session duration, clicks, scrolls, and sometimes geographic location. 

How to tell which emails track you with pixels

To find out if an email uses pixel tracking, you can try the following methods:

1. Check email headers

Email headers contain detailed information about the email’s journey from sender to recipient, including signs of pixel trackers.

In Gmail, for example, you can click the three-dot menu next to the reply button and select “Show original” to view the full header information.

Look for terms such as “track” or “pixel” in the header. Any reference to a 1×1 pixel image hosted on an external server indicates that tracking is in place.

2. Use browser extensions

Extensions like Trocker or Ugly Email are designed to identify and block pixel tracking in emails, displaying an icon when tracking is detected. However, they only work on desktop browsers, so they won’t detect trackers if you’re checking email on mobile devices or using native email apps.

3. Use Proton Mail for enhanced tracking protection

Proton Mail has enhanced tracking protection enabled by default, which blocks known tracking pixels on all your devices. We pre-load other remote images on your behalf using a proxy with a generic IP address and geolocation. This hides your personal information and the exact time you opened the email.

The Proton Mail web app removes tracking parameters from URLs, so you can safely click links knowing that the sender can’t monitor your behavior. Additionally, you can view the number of blocked trackers and cleaned links for each email.

Keep your inbox more private with Proton Mail

If you want to take your email privacy to the next level by blocking tracking pixels and safeguarding your online activity, consider switching to Proton Mail, a secure email service that features end-to-end encryption.

Besides enhanced tracking protection, Proton Mail provides hide-my-email aliases that allow you to sign up for online services or subscribe to newsletters without exposing your real email address.

By using aliases, you can receive fewer emails with tracking pixels, limit your exposure to spam and phishing attempts, and keep your inbox more private. Plus, the link confirmation feature, which is enabled by default, asks you to confirm before opening an external link.

Moving your email account to Proton Mail is simple with the Easy Switch feature, which syncs your emails, calendars, and contacts securely in one click.

Making the move to Proton Mail is just the first step if you want to deGoogle your life, as Proton Mail is part of a larger encrypted ecosystem designed to protect your data, including passwords, internet connections(new window), cloud storage(new window), calendar, and digital assets.

Related articles

Proton Mail and Proton Calendar winter product roadmap
en
  • Product updates
  • Proton Calendar
  • Proton Mail
Preview upcoming updates to Proton Mail and Proton Calendar, including performance boosts, new features, and enhanced privacy tools.
Gantt chart displaying Proton Drive plans and development of new features
en
Discover the tools, features, and improvements coming to Proton Drive’s secure cloud storage and document editor this winter and spring.
laptop showing Bitcoin price climbing
en
  • Privacy guides
Learn what a Bitcoin wallet does and the strengths and weaknesses of custodial, self-custodial, hardware, and paper wallets.
A cover image for a blog describing the next six months of Proton Pass development which shows a laptop screen with a Gantt chart
en
Take a look at the upcoming features and improvements coming to Proton Pass over the next several months.
The Danish mermaid and the Dutch parliament building behind a politician and an unlocked phone
en
We searched the dark web for Danish, Dutch, and Luxembourgish politicians’ official email addresses. In Denmark, over 40% had been exposed.
Infostealers: What they are, how they work, and how to protect yourself
en
Discover insights about what infostealers are, where your stolen information goes, and ways to protect yourself.