Updated FAQ

This commit is contained in:
M66B 2020-11-23 10:56:10 +01:00
parent b1b7222b54
commit eab944f3e3
1 changed files with 4 additions and 3 deletions

7
FAQ.md
View File

@ -162,7 +162,7 @@ Fonts, sizes, colors, etc should be material design whenever possible.
* [(32) How can I check if reading email is really safe?](#user-content-faq32)
* [(33) Why are edited sender addresses not working?](#user-content-faq33)
* [(34) How are identities matched?](#user-content-faq34)
* [(35) Why should I be careful with viewing images, attachments, and the original message?](#user-content-faq35)
* [(35) Why should I be careful with viewing images, attachments, the original message, and opening links?](#user-content-faq35)
* [(36) How are settings files encrypted?](#user-content-faq36)
* [(37) How are passwords stored?](#user-content-faq37)
* [(39) How can I reduce the battery usage of FairEmail?](#user-content-faq39)
@ -1326,10 +1326,11 @@ Setting identity colors is a pro feature.
<br />
<a name="faq35"></a>
**(35) Why should I be careful with viewing images, attachments, and the original message?**
**(35) Why should I be careful with viewing images, attachments, the original message, and opening links?**
Viewing remotely stored images (see also [this FAQ](#user-content-faq27)) might not only tell the sender that you have seen the message,
Viewing remotely stored images (see also [this FAQ](#user-content-faq27)) and opening links might not only tell the sender that you have seen the message,
but will also leak your IP address.
See also this question: [Why email's link is more dangerous than web search's link?](https://security.stackexchange.com/questions/241139/why-emails-link-is-more-dangerous-than-web-searchs-link).
Opening attachments or viewing an original message might load remote content and execute scripts,
that might not only cause privacy sensitive information to leak, but can also be a security risk.