Skip to content

tunguf

My feedback

4 results found

  1. 4 votes
    Vote

    We're glad you're here

    Please sign in to leave feedback

    Signed in as (Sign out)
    You have left! (?) (thinking…)
    How important is this to you?

    We're glad you're here

    Please sign in to leave feedback

    Signed in as (Sign out)
    tunguf supported this idea  · 
    tunguf shared this idea  · 
  2. 1 vote
    Vote

    We're glad you're here

    Please sign in to leave feedback

    Signed in as (Sign out)
    You have left! (?) (thinking…)
    How important is this to you?

    We're glad you're here

    Please sign in to leave feedback

    Signed in as (Sign out)
    tunguf shared this idea  · 
  3. 2 votes
    Vote

    We're glad you're here

    Please sign in to leave feedback

    Signed in as (Sign out)
    You have left! (?) (thinking…)
    How important is this to you?

    We're glad you're here

    Please sign in to leave feedback

    Signed in as (Sign out)
    tunguf shared this idea  · 
  4. 12 votes
    Vote

    We're glad you're here

    Please sign in to leave feedback

    Signed in as (Sign out)
    You have left! (?) (thinking…)
    How important is this to you?

    We're glad you're here

    Please sign in to leave feedback

    Signed in as (Sign out)
    An error occurred while saving the comment
    tunguf commented  · 

    Please disable automatic loading of remote images in the SPAM folder.
    It makes no sense that it shows images from spam/porn/phishing-attempts/whatever, and should be disabled

    Or at least give the option to disable it for the spam folder next to the "Auto show remote images" option in settings.
    But it should not be enabled by default.

    Who knows what kinds of tricks spamsenders use to identify that you opened the email etc. with their remote images.. (methods that Proton are not thinking of)
    It's not always just a simple url identifier like domain.com/image.jpg?userid=qmp123mx
    They can easily hide the tracking in a unique filename itself and even mask it as a folder with mod_rewrite, like so:
    domain.com/folders/qmp123mx/image.jpg

    tunguf supported this idea  · 
    An error occurred while saving the comment
    tunguf commented  · 

    This is critical and should be implemented ASAP!
    Who knows what kinds of tricks spamsenders use to identify that you opened the email etc. with their remote images..
    It's not always just a simple domain.com/image.jpg?=userid=qmp123mx url.
    They can easily hide the tracking in a unique filename itself and even mask it as a folder with mod_rewrite
    For example: domain.com/images/qmp123mx/image.jpg

Feedback and Knowledge Base