<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:dc="http://purl.org/dc/elements/1.1/">
  <channel>
    <title>Forem: William Weiner</title>
    <description>The latest articles on Forem by William Weiner (@wadco).</description>
    <link>https://forem.com/wadco</link>
    <image>
      <url>https://media2.dev.to/dynamic/image/width=90,height=90,fit=cover,gravity=auto,format=auto/https:%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fprofile_image%2F3858244%2Fda60f13a-4dd2-48af-9e2c-dbc2887679a4.png</url>
      <title>Forem: William Weiner</title>
      <link>https://forem.com/wadco</link>
    </image>
    <atom:link rel="self" type="application/rss+xml" href="https://forem.com/feed/wadco"/>
    <language>en</language>
    <item>
      <title>Tracking, Propagation Attacks, and What We Found in Real Email Traffic</title>
      <dc:creator>William Weiner</dc:creator>
      <pubDate>Thu, 09 Apr 2026 20:07:24 +0000</pubDate>
      <link>https://forem.com/wadco/tracking-propagation-attacks-and-what-we-found-in-real-traffic-4pc2</link>
      <guid>https://forem.com/wadco/tracking-propagation-attacks-and-what-we-found-in-real-traffic-4pc2</guid>
      <description>&lt;p&gt;A few weeks ago I posted about finding the same per-recipient identifier in three independent places inside a single marketing email -- pixel, click redirects, and technical headers -- and asked what other vectors people had seen.&lt;/p&gt;

&lt;p&gt;Surveying surfaced some good ones: CSS media queries, hidden data attributes, MIME boundary patterns. I went looking. Here is what I found in real production traffic, and what turned out to be harder to close than expected.&lt;/p&gt;




&lt;h2&gt;
  
  
  1. CSS Tracking Is Broader Than I Thought
&lt;/h2&gt;

&lt;p&gt;The original post focused on &lt;code&gt;&amp;lt;img src=&amp;gt;&lt;/code&gt; pixels and click-redirect wrappers. CSS-based tracking is a separate attack surface that image-blocking tools don't touch, and it is more varied than the obvious &lt;code&gt;background-image&lt;/code&gt; case.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;The obvious case (external stylesheet link):&lt;/strong&gt;&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight html"&gt;&lt;code&gt;&lt;span class="nt"&gt;&amp;lt;link&lt;/span&gt; &lt;span class="na"&gt;rel=&lt;/span&gt;&lt;span class="s"&gt;"stylesheet"&lt;/span&gt;
  &lt;span class="na"&gt;href=&lt;/span&gt;&lt;span class="s"&gt;"https://tracker.esp.com/open/PERRECIPIENTTOKEN.css"&lt;/span&gt;&lt;span class="nt"&gt;&amp;gt;&lt;/span&gt;
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;When the email client loads this stylesheet, the sender's server logs the open. The member never sees this. Apple Mail Privacy Protection pre-fetches images but not stylesheets, so this survives MPP.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;The less obvious cases:&lt;/strong&gt;&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight css"&gt;&lt;code&gt;&lt;span class="c"&gt;/* @import in a &amp;lt;style&amp;gt; block */&lt;/span&gt;
&lt;span class="k"&gt;@import&lt;/span&gt; &lt;span class="sx"&gt;url('https://tracker.esp.com/t/PERRECIPIENTTOKEN.css')&lt;/span&gt;&lt;span class="p"&gt;;&lt;/span&gt;

&lt;span class="c"&gt;/* Any property that accepts a URL, not just background-image */&lt;/span&gt;
&lt;span class="nt"&gt;li&lt;/span&gt; &lt;span class="p"&gt;{&lt;/span&gt; &lt;span class="nl"&gt;list-style-image&lt;/span&gt;&lt;span class="p"&gt;:&lt;/span&gt; &lt;span class="sx"&gt;url('https://tracker.esp.com/PERRECIPIENTTOKEN')&lt;/span&gt;&lt;span class="p"&gt;;&lt;/span&gt; &lt;span class="p"&gt;}&lt;/span&gt;
&lt;span class="nt"&gt;div&lt;/span&gt; &lt;span class="p"&gt;{&lt;/span&gt; &lt;span class="nl"&gt;border-image&lt;/span&gt;&lt;span class="p"&gt;:&lt;/span&gt; &lt;span class="sx"&gt;url('https://tracker.esp.com/PERRECIPIENTTOKEN')&lt;/span&gt;&lt;span class="p"&gt;;&lt;/span&gt; &lt;span class="p"&gt;}&lt;/span&gt;
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;&lt;strong&gt;The one I did not expect -- CSS custom property indirection:&lt;/strong&gt;&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight css"&gt;&lt;code&gt;&lt;span class="nd"&gt;:root&lt;/span&gt; &lt;span class="p"&gt;{&lt;/span&gt;
  &lt;span class="py"&gt;--emp-track&lt;/span&gt;&lt;span class="p"&gt;:&lt;/span&gt; &lt;span class="sx"&gt;url('https://tracker.esp.com/PERRECIPIENTTOKEN')&lt;/span&gt;&lt;span class="p"&gt;;&lt;/span&gt;
&lt;span class="p"&gt;}&lt;/span&gt;
&lt;span class="nt"&gt;p&lt;/span&gt;&lt;span class="nc"&gt;.hero&lt;/span&gt;&lt;span class="nd"&gt;::before&lt;/span&gt; &lt;span class="p"&gt;{&lt;/span&gt;
  &lt;span class="nl"&gt;content&lt;/span&gt;&lt;span class="p"&gt;:&lt;/span&gt; &lt;span class="n"&gt;var&lt;/span&gt;&lt;span class="p"&gt;(&lt;/span&gt;&lt;span class="n"&gt;--emp-track&lt;/span&gt;&lt;span class="p"&gt;);&lt;/span&gt;
&lt;span class="p"&gt;}&lt;/span&gt;
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;The tracking URL is stored in a custom property and referenced indirectly. A filter that looks for &lt;code&gt;url(&lt;/code&gt; in property values like &lt;code&gt;background-image&lt;/code&gt; will not find it here. The custom property declaration looks innocuous; only following the reference chain reveals the external URL.&lt;/p&gt;

&lt;p&gt;I have not yet seen this in a real email, but it is a documented evasion technique in 2025-2026 security research and straightforward to generate from a template.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Beyond CSS: HTML presentation attributes&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;These are not CSS at all, which is why they were a separate discovery. HTML has legacy presentation attributes that also trigger automatic network fetches:&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight html"&gt;&lt;code&gt;&lt;span class="c"&gt;&amp;lt;!-- table background attribute -- HTML4 era, still renders in many clients --&amp;gt;&lt;/span&gt;
&lt;span class="nt"&gt;&amp;lt;table&lt;/span&gt; &lt;span class="na"&gt;background=&lt;/span&gt;&lt;span class="s"&gt;"https://tracker.esp.com/PERRECIPIENTTOKEN"&lt;/span&gt;&lt;span class="nt"&gt;&amp;gt;&lt;/span&gt;

&lt;span class="c"&gt;&amp;lt;!-- video poster -- loads even if the user never plays the video --&amp;gt;&lt;/span&gt;
&lt;span class="nt"&gt;&amp;lt;video&lt;/span&gt; &lt;span class="na"&gt;poster=&lt;/span&gt;&lt;span class="s"&gt;"https://tracker.esp.com/PERRECIPIENTTOKEN"&lt;/span&gt; &lt;span class="na"&gt;src=&lt;/span&gt;&lt;span class="s"&gt;"..."&lt;/span&gt;&lt;span class="nt"&gt;&amp;gt;&lt;/span&gt;

&lt;span class="c"&gt;&amp;lt;!-- object/applet legacy attributes --&amp;gt;&lt;/span&gt;
&lt;span class="nt"&gt;&amp;lt;object&lt;/span&gt; &lt;span class="na"&gt;data=&lt;/span&gt;&lt;span class="s"&gt;"https://tracker.esp.com/PERRECIPIENTTOKEN"&lt;/span&gt;&lt;span class="nt"&gt;&amp;gt;&lt;/span&gt;
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;The &lt;code&gt;background=&lt;/code&gt; table attribute is the one I actually found in production email. It is visually identical to a background set via CSS, but the attribute lives outside any style block and is missed by a CSS-only filter pass.&lt;/p&gt;




&lt;h2&gt;
  
  
  2. The Reply Chain Attack: Propagation Tracking
&lt;/h2&gt;

&lt;p&gt;This one came up as I was working through the threat model and it is arguably more valuable to trackers than open tracking.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;The setup:&lt;/strong&gt; When a sender issues an email, their ESP assigns a Message-ID that typically contains per-send and per-recipient tokens:&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight email"&gt;&lt;code&gt;&lt;span class="nt"&gt;Message-ID&lt;/span&gt;&lt;span class="o"&gt;:&lt;/span&gt;&lt;span class="na"&gt; &amp;lt;campaign.abc123.recipient.def456@esp.example.com&amp;gt;&lt;/span&gt;
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;When a member replies to that email, their client includes the original Message-ID in the References header:&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight email"&gt;&lt;code&gt;&lt;span class="nt"&gt;References&lt;/span&gt;&lt;span class="o"&gt;:&lt;/span&gt;&lt;span class="na"&gt; &amp;lt;campaign.abc123.recipient.def456@esp.example.com&amp;gt;&lt;/span&gt;
&lt;span class="nt"&gt;In-Reply-To&lt;/span&gt;&lt;span class="o"&gt;:&lt;/span&gt;&lt;span class="na"&gt; &amp;lt;campaign.abc123.recipient.def456@esp.example.com&amp;gt;&lt;/span&gt;
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;If the sender has instrumented their receiving infrastructure to parse incoming References headers, they can:&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;Recognize their own campaign token (&lt;code&gt;campaign.abc123&lt;/code&gt;)&lt;/li&gt;
&lt;li&gt;Recover the per-recipient token (&lt;code&gt;recipient.def456&lt;/code&gt;)&lt;/li&gt;
&lt;li&gt;Link the reply back to the original send record&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;This maps who replied to whom. For a relay service like the one I run, the risk is amplified: if a member receives a tracked email through the relay and then replies, the relay's outbound message carries the original sender's Message-ID in the References chain. The original sender now knows the reply chain came through a relay and what user emails it came through.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;The fix&lt;/strong&gt; is to hash all sender-issued Message-IDs in the outbound References and In-Reply-To headers before delivery. The hash is irreversible (sender cannot recover the token), consistent (same input always produces the same output, so member-side threading still works), and emitted under your own namespace so it cannot be confused with any other IDs. This rewrite is valid to do since this code is for an email relay, not an email forwarding service.&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight email"&gt;&lt;code&gt;&lt;span class="nt"&gt;# Original References in outbound reply -- before fix
References&lt;/span&gt;&lt;span class="o"&gt;:&lt;/span&gt;&lt;span class="na"&gt; &amp;lt;campaign.abc123.recipient.def456@esp.example.com&amp;gt;&lt;/span&gt;

# After hashing
References: &amp;lt;emp-a3f9b2c1d4e5f678@emparrot.com&amp;gt;
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;Our delivery IDs pass through unchanged -- members thread on these and they contain no sender-controlled token.&lt;/p&gt;




&lt;h2&gt;
  
  
  3. Direct-Destination URL Tokens (No Redirect Needed)
&lt;/h2&gt;

&lt;p&gt;The original post covered click-redirect wrappers: links rewritten through a tracking server before reaching the real destination. There is a simpler variant that bypasses the redirect entirely.&lt;/p&gt;

&lt;p&gt;Real example from a Nextdoor email (April 2026), every link included:&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight plaintext"&gt;&lt;code&gt;https://nextdoor.com/news_feed/?ct=ABCDEF123&amp;amp;ec=GHIJ456&amp;amp;token=UNIQUE789&amp;amp;auto_token=XYZ012&amp;amp;link_source_user_id=345678
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;The destination is real (nextdoor.com). There is no redirect. But the per-recipient token is in the query string and fires on click. Class A redirect unwrapping does not catch this because there is nothing to unwrap -- the destination IS the URL.&lt;/p&gt;

&lt;p&gt;The naive fix is a known-bad-parameter blocklist (&lt;code&gt;utm_*&lt;/code&gt;, &lt;code&gt;fbclid&lt;/code&gt;, etc.), but that loses the arms race: senders rename parameters or use unfamiliar ones. Nextdoor's &lt;code&gt;ct=&lt;/code&gt;, &lt;code&gt;ec=&lt;/code&gt;, &lt;code&gt;auto_token=&lt;/code&gt;, and &lt;code&gt;link_source_user_id=&lt;/code&gt; would not appear on most blocklists.&lt;/p&gt;

&lt;p&gt;The approach that works without needing to be right about every parameter: strip all query parameters from all links, and back up the original URLs in an attachment when non-&lt;code&gt;utm_*&lt;/code&gt; parameters were present. The stripped link is the primary path. The backup attachment is a recovery mechanism for action links (unsubscribe, confirm) where tokens may be functionally required.&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight plaintext"&gt;&lt;code&gt;# Link in email body after stripping
https://nextdoor.com/news_feed/

# emparrot-original-links.txt attachment
[View your feed] https://nextdoor.com/news_feed/?ct=ABCDEF123&amp;amp;ec=GHIJ456&amp;amp;...
[Unsubscribe]    https://nextdoor.com/email/unsubscribe/?token=UNIQUE789&amp;amp;...
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;The &lt;code&gt;utm_*&lt;/code&gt; parameters are stripped silently with no backup -- the destination always works without them.&lt;/p&gt;




&lt;h2&gt;
  
  
  4. Meta Tag Token Embedding
&lt;/h2&gt;

&lt;p&gt;Several other examples exploited data attributes. Meta tags turned out to be a closely related case worth separating out.&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight html"&gt;&lt;code&gt;&lt;span class="nt"&gt;&amp;lt;meta&lt;/span&gt; &lt;span class="na"&gt;name=&lt;/span&gt;&lt;span class="s"&gt;"x-em-id"&lt;/span&gt; &lt;span class="na"&gt;content=&lt;/span&gt;&lt;span class="s"&gt;"PERRECIPIENTTOKEN"&lt;/span&gt;&lt;span class="nt"&gt;&amp;gt;&lt;/span&gt;
&lt;span class="nt"&gt;&amp;lt;meta&lt;/span&gt; &lt;span class="na"&gt;name=&lt;/span&gt;&lt;span class="s"&gt;"campaign"&lt;/span&gt; &lt;span class="na"&gt;content=&lt;/span&gt;&lt;span class="s"&gt;"CAMPAIGN123/PERRECIPIENTTOKEN"&lt;/span&gt;&lt;span class="nt"&gt;&amp;gt;&lt;/span&gt;
&lt;span class="nt"&gt;&amp;lt;meta&lt;/span&gt; &lt;span class="na"&gt;name=&lt;/span&gt;&lt;span class="s"&gt;"list-id"&lt;/span&gt; &lt;span class="na"&gt;content=&lt;/span&gt;&lt;span class="s"&gt;"LIST456/MEMBER789"&lt;/span&gt;&lt;span class="nt"&gt;&amp;gt;&lt;/span&gt;
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;These do not trigger a network fetch. They are completely invisible to image-blocking tools and to users. But they survive into quoted reply content -- if a member replies and includes the original email body, the quoted section carries these meta tags forward.&lt;/p&gt;

&lt;p&gt;The threat model is the same as the References header case: the sender's receiving infrastructure can recognize their own tokens in the reply and reconstruct network information without ever seeing an address.&lt;/p&gt;

&lt;p&gt;The fix is a whitelist. The set of meta tags that have any legitimate function in email is small and stable: charset, viewport, http-equiv for content-type, format-detection, color-scheme, theme-color, description, author, generator, robots. Strip everything else.&lt;/p&gt;




&lt;h2&gt;
  
  
  5. What Turned Out to Be Hard
&lt;/h2&gt;

&lt;p&gt;&lt;strong&gt;CSS media query conditional loading&lt;/strong&gt; -- The vector is real:&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight css"&gt;&lt;code&gt;&lt;span class="k"&gt;@media&lt;/span&gt; &lt;span class="p"&gt;(&lt;/span&gt;&lt;span class="n"&gt;prefers-color-scheme&lt;/span&gt;&lt;span class="p"&gt;:&lt;/span&gt; &lt;span class="n"&gt;dark&lt;/span&gt;&lt;span class="p"&gt;)&lt;/span&gt; &lt;span class="p"&gt;{&lt;/span&gt;
  &lt;span class="nt"&gt;body&lt;/span&gt; &lt;span class="p"&gt;{&lt;/span&gt; &lt;span class="nl"&gt;background-image&lt;/span&gt;&lt;span class="p"&gt;:&lt;/span&gt; &lt;span class="sx"&gt;url('https://tracker.esp.com/dark/PERRECIPIENTTOKEN')&lt;/span&gt;&lt;span class="p"&gt;;&lt;/span&gt; &lt;span class="p"&gt;}&lt;/span&gt;
&lt;span class="p"&gt;}&lt;/span&gt;
&lt;span class="k"&gt;@media&lt;/span&gt; &lt;span class="p"&gt;(&lt;/span&gt;&lt;span class="n"&gt;prefers-color-scheme&lt;/span&gt;&lt;span class="p"&gt;:&lt;/span&gt; &lt;span class="n"&gt;light&lt;/span&gt;&lt;span class="p"&gt;)&lt;/span&gt; &lt;span class="p"&gt;{&lt;/span&gt;
  &lt;span class="nt"&gt;body&lt;/span&gt; &lt;span class="p"&gt;{&lt;/span&gt; &lt;span class="nl"&gt;background-image&lt;/span&gt;&lt;span class="p"&gt;:&lt;/span&gt; &lt;span class="sx"&gt;url('https://tracker.esp.com/light/PERRECIPIENTTOKEN')&lt;/span&gt;&lt;span class="p"&gt;;&lt;/span&gt; &lt;span class="p"&gt;}&lt;/span&gt;
&lt;span class="p"&gt;}&lt;/span&gt;
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;This leaks dark/light mode preference in addition to confirming the open. I have not seen this in a real email yet, but it is described in 2026 privacy research as an emerging pattern. The fix is the same (strip external URLs from all CSS properties) but the threat is worth naming: it is not just "did they open" but "what device profile are they using."&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Body structural fingerprinting&lt;/strong&gt; is the vector I cannot close without semantic understanding of the content. Unique per-recipient signals embedded in the body itself: specific inline color values, attribute ordering, whitespace patterns, synonym substitution. These survive into reply quotes and surface unexposed users when those replies propagate. Partially mitigated by hashing CSS class names (destroys class-based fingerprints in quoted content), but full removal is out of scope.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Class B opaque link IDs&lt;/strong&gt; (c.gle, click.mailchimp.com, and similar) cannot be resolved without fetching the tracking URL, which would itself be tracked. The right behavior is to flag these with a warning before the member clicks rather than attempting to unwrap them. Fetching to resolve is not an option.&lt;/p&gt;




&lt;h2&gt;
  
  
  What We Shipped
&lt;/h2&gt;

&lt;p&gt;For full disclosure: I built these fixes into the relay service EMail Parrot. The analysis above drove the release this month. The implementation handles all of sections 1-4. Body structural fingerprinting and Class B unwrapping remain open.&lt;/p&gt;

&lt;p&gt;A writeup of the release is at the EMail Parrot blog if that is useful context: &lt;a href="https://emparrot.com/blog/2026/04/08/pixels-were-just-the-beginning.html" rel="noopener noreferrer"&gt;Pixels Were Just the Beginning&lt;/a&gt;&lt;/p&gt;




&lt;h2&gt;
  
  
  New Questions for the Community
&lt;/h2&gt;

&lt;p&gt;The original post asked about CSS media queries, hidden data attributes, and MIME boundary patterns. The first two turned out to be real and addressed above. MIME boundary patterns remain on the list.&lt;/p&gt;

&lt;p&gt;A few things I am still thinking about:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;strong&gt;MIME boundary reuse&lt;/strong&gt;: Is there evidence of ESPs using predictable MIME boundaries that encode per-recipient data? I have not seen it in real traffic but it seems plausible. Our relay rebuilds the email from scratch and replaces all MIME boundaries so this threat is architecturally not present for EMail Parrot.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Quoted-printable encoding patterns&lt;/strong&gt;: Can per-recipient tokens be embedded through deliberate encoding choices (encoding specific characters to &lt;code&gt;=XX&lt;/code&gt; form or not) that survive relay and appear in quoted content?&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;cid: Content-ID attributes&lt;/strong&gt;: MIME attachment Content-IDs are sender-chosen. I am treating this as low risk but would be interested in evidence either way.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;plain-text URL tracking&lt;/strong&gt;: Class A redirect URLs appearing in plain-text body parts rather than HTML hrefs. Lower priority since plain text is less common in tracked email, but not zero.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;Has anyone seen these in the wild? And are there vectors I have missed entirely?&lt;/p&gt;




&lt;p&gt;&lt;em&gt;Cross-posted from the EMail Parrot engineering blog. I am the sole developer of the service and this work grew directly out of the threat analysis in the original post.&lt;/em&gt;&lt;/p&gt;

</description>
      <category>privacy</category>
      <category>security</category>
      <category>webdev</category>
    </item>
    <item>
      <title>Beyond Pixels: How Modern Emails Embed the Same Identifier Everywhere</title>
      <dc:creator>William Weiner</dc:creator>
      <pubDate>Thu, 02 Apr 2026 19:58:01 +0000</pubDate>
      <link>https://forem.com/wadco/beyond-pixels-how-modern-emails-embed-the-same-identifier-everywhere-4228</link>
      <guid>https://forem.com/wadco/beyond-pixels-how-modern-emails-embed-the-same-identifier-everywhere-4228</guid>
      <description>&lt;p&gt;A few days ago I received a promotional-style email asking for lobbying help on upcoming state regulations on email privacy of all things. Instead of clicking through, I opened the raw source and found something interesting.&lt;/p&gt;

&lt;p&gt;The same unique tracking identifier (tied to me as the recipient) appeared in three completely different places inside that single message:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;A classic invisible tracking pixel (the 1x1 image that phones home when the email loads).&lt;/li&gt;
&lt;li&gt;Every clickable link, rewritten through a tracking redirect with long, unique tokens.&lt;/li&gt;
&lt;li&gt;Technical email headers that would survive even if the message was forwarded or relayed.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;This wasn't an isolated case. I had just finished analyzing a different marketing email that showed the exact same pattern. It looks like the email tracking arms race has quietly entered a new phase.&lt;/p&gt;

&lt;h2&gt;
  
  
  The Old Way: Just a Pixel
&lt;/h2&gt;

&lt;p&gt;For decades, open tracking relied almost entirely on the humble tracking pixel: a tiny invisible image hosted on the sender's server. When your email client loads remote images, the server logs the open, your approximate location (via IP), device, and timestamp.&lt;/p&gt;

&lt;p&gt;Privacy features have made that method much less reliable:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Apple’s Mail Privacy Protection pre-fetches images through proxies.&lt;/li&gt;
&lt;li&gt;Many users and organizations disable remote image loading by default.&lt;/li&gt;
&lt;li&gt;Gmail and other clients now warn about or limit external content.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;So senders adapted.&lt;/p&gt;

&lt;h2&gt;
  
  
  The New Pattern: One Identifier, Multiple Vectors
&lt;/h2&gt;

&lt;p&gt;Instead of depending on a single fragile signal, modern templating systems now embed &lt;strong&gt;the same per-recipient identifier&lt;/strong&gt; across several independent channels. The goal is redundancy: if one vector gets blocked, others still report back.&lt;/p&gt;

&lt;p&gt;Here’s what I’ve been seeing in real emails:&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;Header-based identifiers: Custom or structured headers (such as Feedback-ID, patterned Message-ID values, or other metadata) contain campaign or recipient tokens. These live outside the visible body and often survive forwarding, relays, and even some stripping tools.&lt;/li&gt;
&lt;li&gt;Click-tracking links: Every (or nearly every) link gets wrapped through a redirect service. The URLs contain long, seemingly random character strings or encoded parameters that uniquely identify the recipient and the specific link clicked. Even if images are completely blocked, a click still phones home.&lt;/li&gt;
&lt;li&gt;The traditional pixel: Still present as a fallback — usually a 1x1 image with its own unique token in the URL.&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;In the examples I examined, the same underlying identifier (or closely derived values) appeared in all three locations. That means the sender can correlate:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Whether the email was opened (pixel or header signal)&lt;/li&gt;
&lt;li&gt;Which links were clicked (redirect tracking)&lt;/li&gt;
&lt;li&gt;And tie everything back to the original send record, even across forwarded or relayed copies.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;This layered approach makes passive tracking much more resilient.&lt;/p&gt;

&lt;h2&gt;
  
  
  Why This Matters
&lt;/h2&gt;

&lt;p&gt;Many people assume “I just disable images and I’m safe.” That no longer holds when the identifier lives in headers and link wrappers too.&lt;/p&gt;

&lt;p&gt;These techniques show up not just in obvious marketing blasts, but in other unsolicited commercial or advocacy emails as well. The infrastructure is baked into popular email service platforms and marketing tools, so even senders who aren’t deeply technical may be using it by default.&lt;/p&gt;

&lt;h2&gt;
  
  
  How to Spot It Yourself
&lt;/h2&gt;

&lt;ol&gt;
&lt;li&gt;In Gmail: Three dots → “Show original”&lt;/li&gt;
&lt;li&gt;In most other clients: Look for “View message source” or “Raw message”&lt;/li&gt;
&lt;li&gt;Search for:&lt;/li&gt;
&lt;li&gt;Long random-looking strings in Feedback-ID, Message-ID, or other X- headers&lt;/li&gt;
&lt;li&gt;&amp;lt;img src= pointing to external domains with query parameters&lt;/li&gt;
&lt;li&gt;href= values that go through known redirect domains or contain long encoded segments instead of clean destination URLs&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;If you see matching or closely related tokens across headers, pixel URLs, and link wrappers, you’re looking at this multi-vector pattern.&lt;/p&gt;

&lt;h2&gt;
  
  
  The Bigger Picture
&lt;/h2&gt;

&lt;p&gt;Email senders face real pressure: privacy features are reducing the reliability of traditional metrics, while regulators continue to tighten rules around tracking and consent. The response has been to spread the same identifier across more places so the signal doesn’t die when one vector is defeated.&lt;/p&gt;

&lt;p&gt;This arms race is likely to continue. As clients and privacy tools get better at blocking one method, new or hybrid vectors will appear.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Full disclosure:&lt;/strong&gt; I’m the developer of a privacy-focused email service that rebuilds messages to reduce tracking exposure. This analysis grew out of work on improving detection and removal of these hidden vectors. The observations here are based on raw email inspection and stand independently of any product.&lt;/p&gt;

&lt;h2&gt;
  
  
  What Do You Think?
&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;Have you noticed similar multi-vector tracking in everyday emails (marketing, transactional, or otherwise)?&lt;/li&gt;
&lt;li&gt;Are there other subtle techniques (CSS media queries, hidden data attributes, MIME boundary patterns, etc.) you’ve seen that aren’t covered above?&lt;/li&gt;
&lt;li&gt;How aggressively should email clients or privacy tools try to neutralize header-based and link-wrapper tracking?&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;I’d love to hear examples or counterpoints in the comments. If there’s interest, I can share more sanitized raw-source snippets or dive deeper into specific vectors.&lt;/p&gt;

</description>
      <category>privacy</category>
    </item>
  </channel>
</rss>
