These invisible images let companies spy on your email — here’s how to stop them

These invisible images let companies spy on your email — here’s how to stop them
(Image credit: Shutterstock)

Your emails are spying on you. Out of the gazillion emails that hit our inboxes every day, most of them have hidden trackers capable of informing the recipient when you open them, where you open them, how many times you’ve read them, and much more — a privacy nightmare many call “endemic.” Fortunately, there are ways you can protect yourself and your inbox. 

Advertisers and marketing companies, especially, equip their promotional emails with tracking pixels to keep tabs on their mass campaigns. Based on how people interact with them, senders can learn which subject lines are the most “clickable,” and which of their targets can be potential customers.

Though this is useful from an analytics perspective, it’s also often done covertly and without consent. Not a fan of this invasion of privacy? There’s an easy way to turn off email tracking. , For a better look at what these intrusive little pixels are and how to put an end to them, read on.

What are email tracking pixels?

The email tracking pixel is a surprisingly simple concept that allows anyone to secretly gather loads of information on you as soon as you interact with their messages. 

When someone wants to track whether you’ve read their email, they embed a tiny 1 pixel by 1 pixel image inside it. Once you open the email, it pings the server where the image is stored and logs the interaction. Not only does the sender trace whether you have clicked their email and how many times it's been clicked on, it can also tell your location by checking where that network ping was launched and which sort of device was used.

(Image credit: Shutterstock)

There are two reasons why you  never actually see that tracking graphic. One, it’s minuscule. Two, it’s in the GIF or PNG format, which allows the company to keep it transparent and invisible to the naked eye. Oftentimes, a sender will also hide this in their signature. Therefore, that fancy font or the flashing company logo you find at the bottom of a commercial email might be more than a harmless, cosmetic presence. 

More importantly, studies have found that it’s possible for advertisers and other malicious actors to link your email activities with your browser cookies by matching your location and device specifications. This opens an alarming can of worms since it enables them to identify you wherever you go online, connect your email address to your browser history, and much more. 

“The results belie the claim of 'anonymous' web tracking," one study warned.

Find out which emails are spying on you

If email tracking pixels are invisible, how do you spot them? Most email clients like Gmail and Outlook don’t have a built-in mechanism for this, but you can turn to third-party tools. 

(Image credit: Laptop Mag)

For Gmail, we suggest a Chrome and Firefox extension called Ugly Email. It adds a little “eyeball” icon next to the emails that are loaded with tracking pixels and then blocks them from spying on you. Alternatively, if you’re a Yahoo or Outlook user, you can try Trocker, which similarly marks emails with trackers on their websites. 

These extensions, though, are limited to your computers. To detect email trackers on your phone, you’ll need to subscribe to a premium email client like HEY.  

How to block email tracking pixels

Tune your existing inbox

Since email trackers rely on hidden media attachments, they’re fairly straightforward to block. The easiest method is to simply prevent your email apps from loading any images by default and only do it manually for the emails you trust or when there’s an attachment you’d like to download. 

(Image credit: Laptop Mag)

On Gmail, the option to block external images is available under Settings > Images > Ask Before Displaying External Images on the web and mobile apps. On Outlook apps, it’s found under Options > Block External Images on mobile and Options > Trust Center > Automatic Download on desktop.

Though Apple Mail also lets you accomplish this from Preferences > Viewing > Load remote content in messages, you can directly block trackers on it as long as you’re on macOS Monterey. Head over to Mail > Preferences > Privacy and check the “Protect Mail Activity” box. 

Get a private relay email address

The problem with the methods we’ve discussed so far is that they block the tracking pixels after the email has already landed in your inbox — they don’t strip the email of them. For ensuring you never accidentally open an email with trackers, you’ll need a proxy address that pats down your messages and removes any contraband before they arrive in your inbox. Another benefit of this is that it allows you to keep your personal email address private and only hand out a relay ID to websites, newsletters, and others. 

(Image credit: Laptop Mag)

There are plenty of free services that offer a proxy email address. We recommend DuckDuckGo’s Email Protection. It lets you create a new custom relay address, which, before forwarding your mail to your personal inbox, secures them by booting the trackers and encrypting any unsecured links in the body. 

At the top of forwarded emails, DuckDuckGo also adds a little section that tells you whether it found any trackers in it and if it did, which companies were responsible for it. 

On an Android phone or iPhone, go to Settings > Email Protection on the DuckDuckGo app to sign up. On a desktop, you can get started with the DuckDuckGo browser extension or its browser for Mac. 

Shubham Agarwal is a freelance technology journalist from Ahmedabad, India. His work has previously appeared in Business Insider, Fast Company, HuffPost, and more. You can reach out to him on Twitter

Read more
Apple HomePod
Amazon's Alexa privacy U-turn just made this Apple rumor all the more exciting
Screenshots showing Windows Recall in use.
Life with Microsoft Recall: I spent weeks testing Windows 11’s most controversial feature
An illustration of a man's silhouette and the top of his head is open like a lid as a slew of app icons float out into the air. The illustration is on a flat orange background.
I found an app that connects all my apps — without trying to replace them. It's a life-changer.
DeepSeek whale logo in the style of the TikTok logo.
The DeepSeek mania proves it's finally — finally! — time to talk about AI privacy
Messages app in iOS icon
Apple is tantalizingly close to killing green bubbles
A VPN screen on an open laptop
Best VPN services in 2025: 5 VPNs I recommend, including a free option
Latest in Antivirus & Cyber-security
TP-Link routers targeted by Chinese state-sponsored cyber attacks
TP-Link routers may face nationwide ban after 'significantly alarming' link to US cyberattacks
What is a VPN kill switch — and why you should use one
You need a VPN for school, here are 3 services we recommend
The AMD Ryzen and NVIDIA RTX stickers on the Acer Nitro 17
'You basically have to throw your computer away': Researchers explain AMD 'Sinkclose' vulnerability, but do you need to worry?
Google Search
This malware is posing as Google Authenticator using Google ads — here's how to protect yourself
Windows 10 BSOD saying "It's not you, it's me."
Microsoft reveals CrowdStrike outage could have a surprising long-term impact on everyday users
MANILA, PHILIPPINES - JULY 19: Long queues of passengers form at the check-in counters at Ninoy Aquino International Airport, amid a global IT disruption caused by a Microsoft outage and a Crowdstrike IT problem, on July 19, 2024 in Manila, Philippines. A significant global outage affecting Microsoft services, particularly Microsoft 365, has caused widespread disruptions across various sectors, including airlines, banks, and health systems. The outage was attributed to a glitch in CrowdStrike's "Falcon Sensor" software, which impacted Windows systems, leading to thousands of flight cancellations and operational chaos in multiple industries. Microsoft has reported that the underlying cause of the outage has been fixed, but residual effects continue to impact some users as the company works on full recovery. (Photo by Ezra Acayan/Getty Images)
The CrowdStrike outage spotlights major vulnerabilities in the global information ecosystem
Latest in How-To
illustration of laptop with tower speakers on either side.
How I turned my office into a personal concert hall with tower speakers and a MacBook
Acer Predator Triton Neo 16 gaming and content creation laptop
3 critical tips and tricks for maximizing performance on your gaming laptop
Samsung Galaxy Chromebook Plus
How to restart a Chromebook
how to use copilot voice
Copilot Voice: Here's how you can chat with Microsoft's new AI companion
Screenshots of iPhone mirroring using iOS 18 and macOS Sequoia
iPhone Mirroring changed how I use my MacBook and iPhone — here's how it works
The iPhone 16's camera control button
How to use the iPhone 16's new Camera Control button to become a phone photography pro