July 7th, 2020

Protecting Yourself from Email Web Beacons

Web Beacons (a.k.a Tracking Pixels) are images in HTML-formatted email messages that, when viewed, tell the sender of the message that you read it.  This mechanism of obtaining essentially covert confirmation that (a) your email address is valid, (b) the email got past your filters, and (c) you actually read the message, is pervasively used by Spammers to identify what addresses are reading their messages.  It is also used by email marketers to hep them measure the success of their email campaigns.

Why do spammers use Web Beacons?

Spammers send out to hundreds of thousands or millions of different email addresses in the hope that some small percentage of the recipients are “taken in” by whatever scheme they are using.  Using Web Beacons, Spammers can prune their lists down to the small fraction of people reading their email and target those people with many more spam messages of different kinds.  I.e., if you read a Spam message and are identified as a “good recipient” by a tracking pixel, then your email address just became a spam magnet!  This is bad for you but good for the Spammers — as a larger percentage of messages that they send make it to viable recipients.

How to Tell if Someone Read Your Email Message?

In general, there are very few ways to know if someone has read an email message that you sent to them.  The possibilities include:

  • Read Receipts: You add a “read receipt request”.  If the recipient is using an email program that supports read receipts and the recipient decides to allow the receipt to be sent when the message is opened, then you get an emailed notification back when the recipient has read the message.  Use of read receipts is very unreliable; while most email clients support them, most people have them turned off or they routinely decline to have the receipts sent back to the sender (I know I do!)
  • Message Pickup: In systems where you have to go to a web site portal to access your message content, like with SecureLine Escrow, the sender always knows if and when you have picked up the message.
  • Download Tracking: If the email message contains a link to some object (such as an image or file) on a web server somewhere and you download that object, then a record is made of that download in the web server’s logs. If that link contains information identifying you and the message, then the sender can look at the logs and determine:
    • That you read the message
    • When you read the message
    • The IP address of the computer you used when reading the message
    • Possibly more things

How Do Web Beacons Work?

Web Beacons use the Download Tracking mechanism.

The email sent contains HTML-formatted content.  When you view the HTML, images are downloaded from external web servers as part of the message content.  One or more of these images will contain tracking information identifying to whom the message was sent and which message was sent.

The tracking image(s) are typically small or inconspicuous.  It could be a tracking pixel (a very small transparent image), or anything else.

In order to be effective, Web Beacons require:

  • You to read the message
  • Your email program to be displaying HTML-formatted message parts
  • Your email program to be downloading and displaying any images in such message parts.

Many email programs, like Outlook, do all of this automatically.  Some programs, like Mozilla Thunderbird, now-a-days ask you before downloading and displaying images in messages to help protect you against this kind of tracking.

How to Protect Yourself Against Tracking

There are many things you can do to protect yourself from being tracked by Web Beacons.  By “protect yourself,” I mean that you should be able to read messages without Spammers knowing that you are doing so — and it should not be difficult!

  1. Filtering: The best way to protect yourself is to use server-side email filtering that auto-detects and auto-removes any Web Beacons in email messages, while leaving the rest of the images in the messages intact.
  2. A Good Email Program: Use a good email program, like Mozilla Thunderbird, which will hide images in messages until you ask for them or “allow list” the sender.  Using a “old style” plain-text-only email program will also work!
  3. A Good WebMail Program: Using a good WebMail program, like LuxSci’s WebMail, can help too. LuxSci’s WebMail allows:
    1. Previewing the message content in plain text before opening the message (no chance of triggering a Web Beacon or any other email threat when previewing a message in plain text).
    2. Display of the HTML content of messages if off by default and can be toggled on and off as needed (with a hot key or menu option).  You can thus view the entire message content and attachments without needing to display the HTML and expose yourself to tracking pixels or other HTML-based threats.
    3. Display of images in HTML is off by default and can be toggled on and off as needed (with a hot key or menu option).  I.e., you can view the full HTML and merely have all of the images blanked out — no chance of triggering a Web Beacon in this case either.

If you are caught by Web BEacons and get on the “spam me” lists, you may find yourself the target of increasing amounts of spam — even spam appearing to come from yourself or backscatter spam where your address was used to send spam to others.  If this is the case, you will either need to get some really good email filtering, or change your email address.

One Response to “Protecting Yourself from Email Web Beacons”

  1. Has Your Email Been Read? Read Receipts and Web Bugs | LuxSci FYI Says:

    […] the message; however, read receipts are not reliable.  Spammers use techniques such as HTML “web bug” tracking to see if you have read an email message and thus if your email address is valid […]

Leave a Comment


You must be connected or logged in to post a comment. This is to reduce spam comments.

If you have not previously commented, you can connect using existing social media account, or register with a new username and password.

LUXSCI