Hi, [email protected] a tapoté le 27/11/2020 15:00: > I think the main issue with remote images in emails is that they can > include unique image URLs in each email they send, even if the emails > otherwise appear identical (e.g. advertising offers), so they know that > you've opened the copy they sent to you. So it is a good idea to block > them by default, so that you don't reveal anything just by opening the > email (spammers can use the same trick to work out which addresses are > actually being read and opened, to target with more spam). But the same > applies to the link to open the email in the browser - it will probably > include a unique ID, so they know it was opened from the email they sent > to you, as opposed to anyone else.
It's why it's often say to never open spam-mail to avoid this. Sometime I open them (without load any remote content) to see the progression of spammers. If you want to check if it spam or not look at the source of the mail (Ctrl u) and copy an URL like this to a text-application like notepad, mousepad ... : http://someurl.example/blahbfbqsldbqshdkdjzecjg2654135416 Remove all strings after / and if it spam often there's nothing on : http://someurl.example/ http or https. In this case https is not a protection. The "blahbfbqsldbqshdkdjzecjg2654135416" is a key to match your mail adress and the program say "yes sold this real mail send it more and more spam!" and after it load an image or other remote content (CSS, ...). -- Stéphane Sorry for possible mistakes in English! _______________________________________________ support-seamonkey mailing list [email protected] https://lists.mozilla.org/listinfo/support-seamonkey

