Make sure that image loading is turned off when you check your email on your laptop and phone. There are services that will notify the sender of an email when you open a message and sometimes even from where.

displayimagesThese services work by sending an invisible pixel that loads just like an image would. You may want to test some of these services (such as ToutApp or Yesware) to see what kinds of information they make available about people.

To turn off images in Gmail, click on the Gear icon, and then go to Settings->General->External Content. There’ll be a button that says “ask before displaying external content.” You can choose to allow or block images from specific senders.

location3It’s not just image loading that can give away your location, though. Checking into places on social media or registering publicly for events can do that as well. Eventbrite, Meetup, and other places may publish their guest lists publicly or make that information available to other members. Both Facebook and Twitter allow you to post your location as well, so double-check your settings. (Facebook’s Privacy Checkup can give you all sorts of information about what you’ve shared and are sharing.) You may feel comfortable publicizing this information. Just make sure you’re doing it deliberately and not signaling that your home is empty to thieves.

Yael Grauer is a freelance tech journalist covering online privacy and surveillance for WIRED, Forbes, Slate, and other publications. Find her at http://yaelwrites.com or on Twitter @yaelwrites, and check out her free ebook on staying safer online at https://yaelwrites.com/saferonline.pdf.

Check out more digital hygiene tips:

  1. Removing public data
  2. Privacy protection on domain names
  3. Https everywhere
  4. Anonymous “Tor” cloak or VPN
  5. Prepare for a DDos attack
  6. Two-step verification
  7. Privacy plug-ins/cookies
  8. Third-party permissions
  9. Image “hidden pixels”
  10. Links and attachments
  11. Install patches and updates
  12. Use a password manager/strong password
  13. Strengthen security questions
  14. Encrypt hard drive/backup data
  15. Click to play
  16. Use end-to-end encryption

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out /  Change )

Google photo

You are commenting using your Google account. Log Out /  Change )

Twitter picture

You are commenting using your Twitter account. Log Out /  Change )

Facebook photo

You are commenting using your Facebook account. Log Out /  Change )

Connecting to %s