Helping people with computers... one answer at a time.
Email privacy issues including anonymous email, secure email, email encryption, email tracing and more.
Depending on how careful you've been about posting public information about yourself, an email address can lead people to find a lot about you.
Most sites that require registration and an e-mail address do not make that information available for searching. In fact, they shouldn't.
It's not only not possible to prevent email from being forwarded, it's also not possible to prevent that forward from being modified, forged or defaced.
It is very easy to capture and save images from the internet, whether they are from websites or social networks. Anything you put out there can easily be grabbed.
Ultimately, I think the best thing to do is realize that it can be forwarded, regardless of what technology you use.
If an account is being shared, then Google has no way of knowing who is at the keyboard. I explore how search history works and what might be found there.
Encrypted email cannot be sniffed, but chances are that you aren't using encrypted email. I'll explain what I mean and what you might want to do.
When sending email on a company owned computer or using a company owned network, the company can watch. They can likely read your email and much more.
The IT department has physical access to your email account. That means they can do any number of things with it.
Many people are getting messages from Tagged indicating that a friend has posted photos. Here's a clue: they didn't.
Hiding emails online in the Drafts folder does not add a layer of security. It can still be accessed by the authorities.
Tracking services exist which claim to be able to tell you whether or not someone has opened your email. They're only half right.
Once you've logged into a site cookies are often used to keep you logged in for some period of time. There are risks associated with that, and more.
We'll look at what sniffing is and ways to avoid it.
It's very common to want confirmation that an email has been delivered or read. In an age of spam it's simply not possible with any accuracy.
Email is architected as a fairly unsecure media. That means that there are many things that can go wrong when email gets delivered and protecting yourself can be difficult.
Anonymous email is both very easy do to, and yet also extremely difficult. The level of difficulty involved depends on the likelihood that someone would go the extra mile to identify you.
Encrypting email is surprisingly difficult. We'll look at a practical solution that anyone can use, as well as the way it "should" work.
Both children and adults can receive harassing or abusive email. Sadly there's no easy way to trace it back to a sender who doesn't want to be found.
Without installing keystroke logging or other spyware on your computer, there's no way to tell if anyone is reading your emails before you do.
You are right not to send it from work or your home. It's going to take some extra steps to keep from being traced.
Many people want to be able to send anonymous email; email for which the sender cannot be identified. It´s easy. And it´s impossible.
Stopping someone from sending you harassing email is harder than you might expect. Techniques to blocking harassing email are imperfect, at best.
Encrypting a connection to your mail server requires more than just checking a box. Different ISPs have enabled it in different ways and on different ports.
It's common for email programs to automatically block remote image retrieval. We'll look at why and how spammers and others can use remote images.
When forwarded, an email using BCC is one way to reduce the amount of spam your recipients might get as the email is forwarded further.
Email is easy, ubiquitous, and almost trivial to forge or alter. We'll look at why that is, what it means, and one approach to avoiding it.
It's tempting and even noble to want to help, but letting a stranger access your computer without strict supervision is asking for trouble.
Online email providers have stringent security functions in place to reduce duplication and hacking of email as much as possible.
Many of the free email services run ads along side your email that are targeted to the content of the message. My opinion? Nothing to worry about.
In the quest to go paperless, many companies offer statements and other information in electronic form. I'll look at what's typically safe and secure.
If someone else shares or administers your email account, then your privacy could easily be at risk.
Online email is probably not permanently deleted - although for all practical purposes, you should assume you do not have access to those backups.
Email is ubiquitous and convenient, yet surprisingly not very secure. I'll look at why that is and when you should worry.
If friends (especially ex-friends) are looking at your email and they have access to your account, I would seriously consider that you treat this has a hacked email account.
It is perfectly safe to stay logged into your email account if you keep yourself protected from a few specific scenarios.
Email addresses are generally not a gateway to much more than public information, but still use caution when sharing it with someone who you don't trust.
Often times when you send an email and there's a problem you'll get a bounce in return. If that bounce is from someone else, something might be fishy.
Blocking remote images in email is a common and important anti-spam technique. We'll look at how to turn it off, and then discuss why you shouldn't.
Email addresses are by definition, fairly specific. It's unlikely but malware, misconfiguration or other interference could cause misdeliveries.
Retyping your email to unsubscribe is an unnecessary barrier to being removed from an email list. With today's technology, it should not be required.
By forwarding email that includes previously-forwarded email addresses, you're exposing all of those people to a couple of risks and annoyances.
Sending truly anonymous email can be tricky, and just about any piece of semi-consistent data can be used to ID you, often including your machine name.