Your email is a critical chokepoint for sensitive communications—commonly used to reset account passwords, to document purchases you’ve made, to remind you of appointments, and to verify your identity.Your email is a critical chokepoint for sensitive communications—commonly used to reset account passwords, to document purchases you’ve made, to remind you of appointments, and to verify your identity.

Email Security: What You Should and Shouldn't Be Doing

2025/10/04 04:34

The Gentle January series shares one practical privacy tip a day from a Markup staffer who actually uses the advice in their own life.

\ It’s somehow taken until the end of Gentle January to talk about email. Your email is a critical chokepoint for sensitive communications—commonly used to reset account passwords, to document purchases you’ve made, to remind you of appointments, and to verify your identity.

\ The old fashioned among us, like me, still even use it to talk to friends and family.

\ So it should not come as a surprise that email has been a major theme of the privacy tips readers have generously been providing to us all month via… email, of course.

\ Many correspondents worried about their emails being electronically examined, like Philip (who gave us permission to include his last name):

\ The company best known for scanning email is Google, which supported its free email service Gmail by automatically scanning mail to target users with personalized ads. Google stopped this practice in 2017 but continued to scan email for other purposes, such as hiding spam and providing features like Smart Reply, inbox tabs, and features in other Google products like Google Maps—unless users opted out. The company also faced (and responded to) controversy over Gmail data shared to third-party apps selected by users.

\ Philip wasn’t the only reader to mention ProtonMail, a service whose privacy features have been touted by Consumer Reports and others. Reader Gert included among a list of tips, “Don’t use gmail, I use Proton mail.” Another correspondent, Annie, also touted ProtonMail as an alternative to big tech, concluding: “Free is good, paid is better, but it’s all way better than Google.”

Two other readers raised an important point: How you personally interact with email can be as—or more—important to your security than who receives it for you. One who wanted simply to be known as Anonymous wrote:

\ Another reader, RobD, echoed this advice, writing, “never click on any link in a strange email or text message.”

\ The risks from clicking the wrong links in the wrong emails are well documented, and experts routinely advise people to be wary of clicking on anything in an unexpected email, as Anonymous and RobD suggest. Turning off image loading in email, meanwhile, can help thwart various forms of tracking.

Thanks for Reading!

This brings us to the end of January—and with it, Gentle January comes to a close. Thank you to everyone for reading and to those who mailed in ideas. We hope you enjoyed the posts as a gentle way into the new year and discovered privacy tips that will help you in the rest of 2024 and beyond. If you missed any installments in this series, you can visit our new compilation page here. Stay safe!


Credits

  • Markup Readers
  • Ryan Tate, Deputy Editor

Design and Graphics

  • Gabriel Hongsdusit

Engagement

  • Maria Puertas

Editiing

  • Michael Reilly

\ Also published here

\ Photo by Stephen Phillips - Hostreviews.co.uk on Unsplash

Disclaimer: The articles reposted on this site are sourced from public platforms and are provided for informational purposes only. They do not necessarily reflect the views of MEXC. All rights remain with the original authors. If you believe any content infringes on third-party rights, please contact service@support.mexc.com for removal. MEXC makes no guarantees regarding the accuracy, completeness, or timeliness of the content and is not responsible for any actions taken based on the information provided. The content does not constitute financial, legal, or other professional advice, nor should it be considered a recommendation or endorsement by MEXC.

You May Also Like

Aave DAO to Shut Down 50% of L2s While Doubling Down on GHO

Aave DAO to Shut Down 50% of L2s While Doubling Down on GHO

The post Aave DAO to Shut Down 50% of L2s While Doubling Down on GHO appeared on BitcoinEthereumNews.com. Aave DAO is gearing up for a significant overhaul by shutting down over 50% of underperforming L2 instances. It is also restructuring its governance framework and deploying over $100 million to boost GHO. This could be a pivotal moment that propels Aave back to the forefront of on-chain lending or sparks unprecedented controversy within the DeFi community. Sponsored Sponsored ACI Proposes Shutting Down 50% of L2s The “State of the Union” report by the Aave Chan Initiative (ACI) paints a candid picture. After a turbulent period in the DeFi market and internal challenges, Aave (AAVE) now leads in key metrics: TVL, revenue, market share, and borrowing volume. Aave’s annual revenue of $130 million surpasses the combined cash reserves of its competitors. Tokenomics improvements and the AAVE token buyback program have also contributed to the ecosystem’s growth. Aave global metrics. Source: Aave However, the ACI’s report also highlights several pain points. First, regarding the Layer-2 (L2) strategy. While Aave’s L2 strategy was once a key driver of success, it is no longer fit for purpose. Over half of Aave’s instances on L2s and alt-L1s are not economically viable. Based on year-to-date data, over 86.6% of Aave’s revenue comes from the mainnet, indicating that everything else is a side quest. On this basis, ACI proposes closing underperforming networks. The DAO should invest in key networks with significant differentiators. Second, ACI is pushing for a complete overhaul of the “friendly fork” framework, as most have been unimpressive regarding TVL and revenue. In some cases, attackers have exploited them to Aave’s detriment, as seen with Spark. Sponsored Sponsored “The friendly fork model had a good intention but bad execution where the DAO was too friendly towards these forks, allowing the DAO only little upside,” the report states. Third, the instance model, once a smart…
Share
BitcoinEthereumNews2025/09/18 02:28
Xinjiang Mining Shutdown Sparks Network Security Concerns

Xinjiang Mining Shutdown Sparks Network Security Concerns

The post Xinjiang Mining Shutdown Sparks Network Security Concerns appeared on BitcoinEthereumNews.com. Bitcoin Hashrate Plummets 8%: Xinjiang Mining Shutdown Sparks
Share
BitcoinEthereumNews2025/12/15 16:50