Articles in Category: Email Privacy
Issues around the privacy of your email, who can see it and when, and steps you might take to keep it more secure.
It’s impossible to truly determine if someone opened an email, but newsletters worrying about their reputation try to get an idea.
It’s not only impossible to prevent email from being forwarded; you can’t even prevent that forward from being altered, forged or defaced.
If someone else shares or administers your email account, then your privacy is at risk.
It can be very difficult — perhaps impossible — to determine if your mail’s being read before you get to it.
Sometimes you want to keep someone from contacting you. Ignoring them is often simplest, but there are tools to help as well.
Finding out who owns an email address is difficult at best. There’s little you can do on your own, but if you’re being harassed, law enforcement may help.
Several urban legends would have you believe that when you forward an email, it can somehow be tracked. It cannot. Period. I’ll explain why that is.
Using BCC on forwarded email is one way to reduce the amount of spam your recipients might get.
“BCC” is a way to send copies of email without all the recipients being visible. But can you still view the BCC’ed?
Encrypted email cannot be sniffed, but chances are you aren’t using encrypted email. I’ll explain what I mean and what you might want to do.
Your school can see email being sent and received across its systems, and there’s no way to know whether or not they’re actually looking.
Sending anonymous email ranges from easy to complex, depending on the likelihood of someone going the extra mile to identify you.
Anonymity on the internet is really, really hard. Some of the practices we might use to stay anonymous could still be leaking identifiable, traceable information.
It’s surprisingly difficult to encrypt email. We’ll look at a practical solution that anyone can use, as well as the way things “should” work.
Both children and adults receive harassing or abusive email. Sadly, there’s no easy way to trace it back to a sender who doesn’t want to be found.
It’s very common to want confirmation that an email has been opened, delivered, or read. In the age of spam, it’s simply not possible with any accuracy.
Email programs commonly block remote images. I’ll look at why, and how spammers and others use remote images for good and evil.
It’s extremely unlikely. I’ll walk you through why that is, and one way you might get lucky.
In a work environment all bets are off. If they’re looking hard enough, an employer can see everything you do on a work computer.
Of course Gmail can read your email. How else would they be able to filter it for spam? But “who” or “what” is reading it, and does it really matter?
Not just email, but any information that is anywhere on “the cloud” is subject to backups. That means there is a copy somewhere. Is this a problem?
It’s typically impossible for the average computer user to determine who’s reading your email, particularly since tracing through a an IP address is virtually impossible with legal assistance. The best option is securing your account from any prying eyes from the start.
Electronic greeting cards, or ecards, seem like a nice idea, but often end up giving the recipient more than you intended, in the form of spam or worse.