Articles in Category: Email Privacy
Issues around the privacy of your email, who can see it and when, and steps you might take to keep it more secure.
The list of BCC’ed recipients is not included with emails, so there is no way of determining if or who else the email was sent to.
It’s surprisingly difficult to encrypt email. We’ll look at a practical solution that anyone can use, as well as the way things “should” work.
Both children and adults receive harassing or abusive email. Sadly, there’s no easy way to trace it back to a sender who doesn’t want to be found.
It’s very common to want confirmation that an email has been opened, delivered, or read. In the age of spam, it’s simply not possible with any accuracy.
Email programs commonly block remote images. I’ll look at why, and how spammers and others use remote images for good and evil.
Sometimes you may want to explicitly keep someone from contacting you. Ignoring them is often simplest, but there are tools to help as well.
It’s unlikely, maybe impossible. I’ll walk you through why that is, and one way you might get lucky.
In a work environment all bets are off. If they’re looking hard enough, an employer can see everything you do on a work computer.
It is not reliably possible to determine if an email has been read or opened. They keyword there is reliably. There are techniques that get some information, but it’s impossible to be 100% accurate.
Of course Gmail can read your email. How else would they be able to filter it for spam? But “who” or “what” is reading it, and does it really matter?
Not just email, but any information that is anywhere on “the cloud” is subject to backups. That means there is a copy somewhere. Is this a problem?
It’s typically impossible for the average computer user to determine who’s reading your email, particularly since tracing through a an IP address is virtually impossible with legal assistance. The best option is securing your account from any prying eyes from the start.
Anonymous email is both very easy do to, and yet also extremely difficult. The level of difficulty involved depends on the likelihood that someone would go the extra mile to identify you.
Several urban legends would have you believe that when you forward an email, it can somehow be tracked. It cannot. Period. I’ll explain why that is.
Electronic greeting cards, or ecards, seem like a nice idea, but often end up giving the recipient more than you intended, in the form of spam or worse.
Using BCC on forwarded email is one way to reduce the amount of spam your recipients might get as the email is forwarded further.
It’s not only not possible to prevent email from being forwarded, it’s also not possible to prevent that forward from being modified, forged or defaced.
Finding out who owns a Hotmail account is nearly impossible.