diff --git a/FAQ.md b/FAQ.md index 4996ae7c58..d02c492d30 100644 --- a/FAQ.md +++ b/FAQ.md @@ -162,7 +162,7 @@ Fonts, sizes, colors, etc should be material design whenever possible. * [(32) How can I check if reading email is really safe?](#user-content-faq32) * [(33) Why are edited sender addresses not working?](#user-content-faq33) * [(34) How are identities matched?](#user-content-faq34) -* [(35) Why should I be careful with viewing images, attachments, and the original message?](#user-content-faq35) +* [(35) Why should I be careful with viewing images, attachments, the original message, and opening links?](#user-content-faq35) * [(36) How are settings files encrypted?](#user-content-faq36) * [(37) How are passwords stored?](#user-content-faq37) * [(39) How can I reduce the battery usage of FairEmail?](#user-content-faq39) @@ -1326,10 +1326,11 @@ Setting identity colors is a pro feature.
-**(35) Why should I be careful with viewing images, attachments, and the original message?** +**(35) Why should I be careful with viewing images, attachments, the original message, and opening links?** -Viewing remotely stored images (see also [this FAQ](#user-content-faq27)) might not only tell the sender that you have seen the message, +Viewing remotely stored images (see also [this FAQ](#user-content-faq27)) and opening links might not only tell the sender that you have seen the message, but will also leak your IP address. +See also this question: [Why email's link is more dangerous than web search's link?](https://security.stackexchange.com/questions/241139/why-emails-link-is-more-dangerous-than-web-searchs-link). Opening attachments or viewing an original message might load remote content and execute scripts, that might not only cause privacy sensitive information to leak, but can also be a security risk.