The Methods Used To Track People Via Text Messages And Phishing Emails (Disorder) Is A Disturbing Breach Of Personal Privacy And A Clear Violation Of Fundamental Rights

TRACKING A PERSON THROUGH SPAM EMAILS AND TEXT MESSAGES TYPICALLY INVOLVES MALICIOUS LINKS, EMBEDDED TRACKING CODE, OR SOCIAL ENGINEERING TACTICS. HERE’S HOW IT WORKS:

  1. Tracking via Email
    Tracking Pixels: A tiny invisible image (1×1 pixel) embedded in the email can alert the sender when you open the message, revealing your IP address, device type, and general location.

Malicious Links: Clicking a link in a spam email can:

Install malware (e.g., spyware or keyloggers)

Redirect you to a fake site to harvest personal information (phishing)

Trigger a background process that logs your location or network info

IP Logging: Some links log your IP and create a digital footprint tied to your device.

  1. Tracking via Text Messages (SMS)
    Malicious Links in SMS (Smishing): Clicking these can:

Install tracking software

Grant access to GPS, contacts, messages, or even your microphone/camera

Silent Ping Messages: Some advanced attackers or government agencies may use “silent” texts to check if a device is active and its location, although this is typically more sophisticated and not common in everyday spam.

???? What You Can Do:

  • Never click unknown links.
  • Use a VPN to obscure your IP address.
  • Disable image auto-loading in email settings to block tracking pixels.
  • Keep your phone and antivirus software updated.
  • Use spam filters and report suspicious messages.