What You Are Disclosing Through Tracking "Fingerprints"

By William Weiner April 10, 2024

Tracking Pixels Are Following You

A tracking pixel, also known as a web beacon, clear GIF, or pixel tag, is a tiny, often invisible image embedded in digital content like emails. Typically a 1x1 pixel graphic, it is virtually undetectable to users. Tracking pixels raise significant privacy concerns because they collect information without explicit user consent. When you open an email containing a tracking pixel, your email client sends a web request to load external content referenced by the email, thereby revealing certain data.

What You Are Disclosing Through Tracking “Fingerprints”

When tracking pixels load, the servers gather various pieces of information, including:

  • IP Address: Indicates the network and, to some extent, the geographic location of the device.
  • Device Information: Details such as operating system, browser type and version, screen resolution, and system fonts, which can help distinguish between different devices.
  • Email Client Information: Identifies the specific email client and version.
  • Time and Date Stamps: Patterns of email openings provide additional distinguishing features.

Moreover, tracking pixels can encode additional information into the request address, such as:

  • Unique Identifier: A unique ID associated with the recipient or the email.
  • Campaign Information: Data about the specific marketing campaign.
  • Recipient Details: Information about the recipient, like their email address or name.
  • Email Metadata: Details about the email, such as the subject line and send time.

Beyond Basic Data Collection

Loading external content can infer more information, including:

  • Open Confirmation: Whether the email has been opened.
  • Timestamp: The exact time and date when the email was opened.
  • Geolocation: Approximate location based on the IP address, such as city, region, or country.
  • Device Information: Specifics about the device, such as operating system and device type.
  • Email Client: The email client or webmail service used.
  • Engagement Metrics:
  • Duration: How long the email was open (though this is less common and harder to track accurately).
  • Clicks: Whether any links within the email were clicked, and which links.
  • Forwards: Indications that the email was forwarded.

Social Network Discovery

When you share content, including emails with friends and family, their tracking information can create new fingerprints. This allows tracking pixels to infer social connections indirectly. While they don’t directly identify friends or family members, these new fingerprints provide connection information.

Ethical and Privacy Concerns

Inferring social connections and collecting detailed information without explicit consent raises significant ethical and privacy concerns:

  • Consent and Transparency: Collecting and inferring detailed information without explicit consent is unethical and likely illegal under privacy regulations like GDPR and CCPA.
  • Data Minimization: Ethical data practices require that only necessary data is collected for specific, stated purposes.
  • User Control: Users should have control over their data and be informed about how it is being used, including the use of tracking pixels.

The Role of AI in Privacy Risks

Artificial Intelligence (AI) can now analyze large amounts of raw data, uncovering new information and insights not apparent to humans. The rapid development of AI amplifies the privacy risks presented by email tracking.

Several laws aim to address these concerns, but protections are limited in scope and geographic coverage. Leading regulations include:

  • General Data Protection Regulation (GDPR) - European Union
  • California Consumer Privacy Act (CCPA) - United States (California)
  • ePrivacy Directive (EU Cookie Law) - European Union
  • Personal Information Protection and Electronic Documents Act (PIPEDA) - Canada
  • Children’s Online Privacy Protection Act (COPPA) - United States

Actions You Can Take to Protect Your Privacy

Many email clients offer options to reduce the privacy risks from external content automatically loaded within emails. Users can configure settings to disable automatic image loading, block single-pixel images, or proxy image loading through their servers to hide IP address and client information. However, these measures often only address part of the tracking problem, and users need to enable privacy filters manually.

EMail Parrot: Removing All External Content

EMail Parrot addresses these privacy concerns by removing all external content from emails sent through its system. This includes images, videos, gifs, HTML, and active components. If the automatically loaded content starts with “http”, it is stripped. This feature can be disabled if desired, but it is discouraged for group privacy.

EMail Parrot is a group emailing solution designed to prevent the distribution of tracking content among group members, prioritizing privacy and security. By removing tracking content, EMail Parrot protects email addresses from even group members and ensures the privacy of all users.

Conclusion

Tracking pixels and other tracking tactics are powerful tools for gathering detailed insights into user engagement with emails, improving marketing strategies at the expense of user privacy. While some tools and settings exist to prevent tracking, they often offer minimal protection. Legal protections lag behind, and AI compounds privacy threats.

EMail Parrot enhances email privacy and security by stripping external content and preventing tracking. This article highlights one of the significant privacy attacks occurring today. If privacy concerns you and you participate in email groups, EMail Parrot is likely right for you. For more information, visit EMail Parrot or contact info@emparrot.com.

Reference: Major Tracking Privacy Laws

  1. General Data Protection Regulation (GDPR) - European Union
    • Scope: Applies to all organizations processing personal data of individuals within the EU, regardless of location.
    • Key Provisions:
      • Consent: Requires explicit consent before collecting personal data.
      • Transparency: Organizations must inform individuals about data collection and use.
      • Right to Access: Individuals can access their personal data and understand its processing.
      • Right to Erasure: Individuals can request deletion of their personal data.
      • Data Minimization: Only necessary data should be collected.
      • Penalties: Non-compliance can result in significant fines.
  2. California Consumer Privacy Act (CCPA) - United States (California)
    • Scope: Applies to businesses collecting and processing personal data of California residents, meeting specific thresholds.
    • Key Provisions:
      • Right to Know: Consumers can know what personal data is collected, used, and shared.
      • Right to Delete: Consumers can request deletion of their personal data.
      • Right to Opt-Out: Consumers can opt out of the sale of their personal data.
      • Non-Discrimination: Businesses cannot discriminate against consumers exercising privacy rights.
      • Penalties: Violations can result in fines.
  3. ePrivacy Directive (EU Cookie Law) - European Union
    • Scope: Applies to cookies and similar technologies storing information on a user’s device.
    • Key Provisions:
      • Consent: Requires informed consent before placing cookies or similar tracking technologies.
      • Transparency: Users must be informed about the use and purpose of cookies.
      • Exceptions: Some necessary cookies are exempt from consent requirements.
  4. Personal Information Protection and Electronic Documents Act (PIPEDA) - Canada
    • Scope: Applies to private-sector organizations collecting, using, or disclosing personal information in commercial activities.
    • Key Provisions:
      • Consent: Requires meaningful consent for collecting, using, and disclosing personal information.
      • Transparency: Organizations must explain their privacy practices clearly.
      • Access: Individuals can access their personal information and challenge its accuracy.
      • Accountability: Organizations must be accountable for personal information.
  5. Children’s Online Privacy Protection Act (COPPA) - United States
    • Scope: Applies to websites and online services directed at children under 13 and those knowingly collecting information from children under 13.
    • Key Provisions:
      • Parental Consent: Requires verifiable parental consent before collecting personal information from children.
      • Privacy Policy: Operators must provide a clear privacy policy.
      • Right to Review: Parents can review their children’s personal information and request its deletion.