TIP #9: DON’T LEAK YOUR LOCATION

TB_Swiss_V10_T-9

Tracking pixels, along with cookies, are just another method to track your location for the purposes of ad targeting. Tracking pixels are embedded in images. When you open an email, you automatically download that image, and that image request immediately lets the server know that you’ve opened it, along with other information like device, browser, and potentially location. Using a VPN or Tor will also help you stay anonymous from tracking pixels.

Make sure that image loading is turned off when you check your email on your laptop and phone. There are services that will notify the sender of an email when you open a message and sometimes even from where.

displayimagesThese services work by sending an invisible pixel that loads just like an image would. You may want to test some of these services (such as ToutApp or Yesware) to see what kinds of information they make available about people.

To turn off images in Gmail, click on the Gear icon, and then go to Settings->General->External Content. There’ll be a button that says “ask before displaying external content.” You can choose to allow or block images from specific senders.

location3It’s not just image loading that can give away your location, though. Checking into places on social media or registering publicly for events can do that as well. Eventbrite, Meetup, and other places may publish their guest lists publicly or make that information available to other members. Both Facebook and Twitter allow you to post your location as well, so double-check your settings. (Facebook’s Privacy Checkup can give you all sorts of information about what you’ve shared and are sharing.) You may feel comfortable publicizing this information. Just make sure you’re doing it deliberately and not signaling that your home is empty to thieves.

Check out more digital hygiene tips:

  1. Removing public data
  2. Privacy protection on domain names
  3. Https everywhere
  4. Anonymous “Tor” cloak or VPN
  5. Prepare for a DDos attack
  6. Two-step verification
  7. Privacy plug-ins/cookies
  8. Third-party permissions
  9. Image “hidden pixels”
  10. Links and attachments
  11. Install patches and updates
  12. Use a password manager/strong password
  13. Strengthen security questions
  14. Encrypt hard drive/backup data
  15. Click to play
  16. Use end-to-end encryption

Published by michelleferrier

Executive Director, Media Innovation Collaboratory; Founder, Troll-Busters.com | Online Pest Control for Women Writers and Journalists;

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out /  Change )

Google photo

You are commenting using your Google account. Log Out /  Change )

Twitter picture

You are commenting using your Twitter account. Log Out /  Change )

Facebook photo

You are commenting using your Facebook account. Log Out /  Change )

Connecting to %s

%d bloggers like this: