Is Apple’s Mail Privacy Protection A Death Knell For Newsletters? – Analytics India Magazine

Last week, Apple introduced Mail Privacy Protection in iOS 15, iPadOS 15, macOS Monterey, and watchOS 8. The new privacy feature will limit the amount of data an email sender can collect about you. 

In other words, this could create barriers for email marketers, advertisers and newsletter creators extensively relying on mails to track users’ geolocations, build databases, carry out targeted marketing, generate leads, develop content strategies and more.

According to the content marketing institute, 31% of B2B marketers claimed email newsletter is the most critical aspect in their content marketing strategy. The top 3 types of content B2B marketers use include social media content (95%), blog posts/short articles (89%), and email newsletters (81%). In another study, 59% of respondents said marketing emails influence their purchase decisions.

What’s Apple upto

“In the Mail app, Mail Privacy Protection stops senders from using invisible pixels to collect information about the user. The new feature helps users prevent senders from knowing when they open an email and masks their IP address so it can’t be linked to other online activity or used to determine their location,” Apple said in a blog post, 

Since 2013, Google has served all images through its proxy servers, which hides users location from at least some tracking applications. In addition, extensions like Ugly Mail and PixelBlock could be used to block trackers on Chrome and Firefox.

How advertisers track your email activity

Typically, a person who sends an email can never know who opened the email or when or if anyone did. But, if the person has a picture attached, it has to be downloaded from the original server. When the user opens it, the mail app queries the server to download that file. Once downloaded, the sender can monitor their server and know if the user has opened the mail. 

This is where Apple’s latest email privacy feature comes into the picture. It prevents services like Mailchimp, Moosend, SendInBlue, HubSpot and others from knowing if an email was opened.

Nathan Barry, the founder and CEO of email marketing platform ConvertKit said you should ‘periodically remove inactive subscribers.’ “But, the primary way to track engagement is open rates. If Apple sends an open event for every email, then they will be preventing creators from knowing who should be removed,” he added. 

TTBlOexGl2VuNj9s6btK8ALj0C35k7OILXFYGXiBdVlEqhhDEDp5AT3ATW75eq3SGacNex YerC YPlQF0D0Dtv019dIhOUR84N8UFJWuWROY1HEyvD9Ki3F6XkQr dG0yL6dHQQ ProxyEgg Is Apple's Mail Privacy Protection A Death Knell For Newsletters? - Analytics India Magazine
(Source: Twitter)

So, when you update your iPhone to iOS 15, you’ll see a screen at launch that invites you to select its latest mail service, which lets you hide IP addresses and privately load all remote content.

The feature comes as a default, as noted by iOS 15 beta testers. It also has some limitations. For instance, based on Apple’s demonstration, it only appears to work when you use Safari Mail with your iCloud email address.

Apple vs marketers 

As part of a larger privacy push, Apple recently had rolled out App Tracking Transparency in iOS 14.5. The feature requires all apps to obtain permission before tracking users. 

The move drew flak from heavily ad-dependent companies like Facebook.

Nearly 96% of users in the US declined tracking permissions in iOS 14.5. Apple’s privacy feature is choking the $189 billion mobile advertising market worldwide. 

Check out a few comments on Tim Cook’s Twitter post.

ioLDw0oSaHdlhhVF1NmyA12MT5wz2Ofqij1owbEtJPtSDTZW3czXdK1Vvj41ONeZRndfTm6qnY3vOjyg1eMaWD5gjfEYJxLpCDV5JxYYhMMZyePwTdK gv2GbAQuno1psyb1oIb8 ProxyEgg Is Apple's Mail Privacy Protection A Death Knell For Newsletters? - Analytics India Magazine

Newsletter

The latest privacy move from Apple comes when media companies, including Facebook, Twitter etc are investing heavily in newsletter-based strategies. 

Recently, Twitter said it is looking to introduce a newsletter feature directly to the user profile. The goal is to help newsletter writers leverage their existing Twitter followers to grow their subscriber base.

Interestingly, Twitter acquired a subscription newsletter service, Revue, in January 2021. Writers can use the Revue account (substack) to generate free or paid subscription newsletters. Twitter takes a 5 percent cut off each paid subscription. But Apple’s Mail Protection Privacy can pose a threat to Twitter’s newsletter ambition. 

“This is another sign that Apple’s war upon targeted advertising is not just about screwing Facebook,” wrote Joshua Benton, director of the Nieman Journalism Lab at Harvard University, “They are also coming for your substack.” 

Wrapping up 

From a users’ perspective, the privacy push is a positive step. Often, people tend to misuse users’ information/data and flood them with spams and ads with or without their knowledge. 

Besides Apple, Google is also leaning towards privacy. The search giant has launched multiple privacy-focused features at Google I/O. 

Barry said he is a huge fan of more privacy controls for consumers, but highlighted the need for a better solution for ethical creators to maintain clean lists and follow best practices. “I hope that Apple, Google, and others will make these tools available so we can all follow their guidelines,” he said.  

#wpdevar_comment_1 span,#wpdevar_comment_1 iframe{width:100% !important;} #wpdevar_comment_1 iframe{max-height: 100% !important;}


Join Our Telegram Group. Be part of an engaging online community. Join Here.

Subscribe to our Newsletter

Get the latest updates and relevant offers by sharing your email.
Source of this news: https://analyticsindiamag.com/is-apples-mail-privacy-protection-a-death-knell-for-newsletters/

Related posts:

'Tortilla' Wraps Exchange Servers inside of ProxyShell Attacks - Threatpost
A new administrator of your personal hard drive will be Threatpost, Inc., 700 Unicorn Park, Woburn, MA 01801. Detailed information on a new processing of personal data come in the privacy polic...
top Service Proxy Projects Caused from CNCF - Container Mag
Standardizing needs between various apps not to mention servers is paramount inside your world of connected software. To look after traffic in a scalable ways, software systems typically use a se...
Choose Know About The Pirate School proxy Bay - Programming Insider
There are many sites set up for less than different domain names and can be accessible from different regions of the planet. Furthermore, all the original posts available from the Pirate Fres...
Hackers Trick Microsoft Into Deciding upon Netfilter Driver Loaded With Rootkit Malware - The Hacker...
Microsoft on the topic of Friday said it's investigating an incident wherein a good driver signed by the service} turned out to be a malicious Computers rootkit that was observed communicating ...
An Overview of Website Reinfection Vectors - Security Boulevard
The website security landscape is as complicated as it is treacherous. We often deal with clients who become reinfected over and over again. Once the attackers establish a foothold in an environmen...
All You Need to Know About Craigslist Proxies - Robotics and Automation Ideas
All You Need to Know About Craigslist ads Proxies if ( 0 === window. location. hash. indexOf( '#comment-' ) ) // window.loc...
Just how can Marketers Benefit From Using a VPN? - TechGenyz
In today’s marketing worldwide, everyone is competing to get found and attract the right regulars.   Although it’s imperative to keep up with the market, not obtaining your brand’s privacy...
Fix Linux mint 20 - Cannot add PPA: ''This PPA does not support focal''. - H2S Media
If you are adding PPA repo in Linux mint 20.02 and getting an error  Cannot add PPA: ”This PPA does not support focal”.  Then follow the simple command given in the article that wi...
Government Internet Shutdowns Are Changing. How Should Citizens and Democracies Respond? - Carnegie ...
SummaryGovernments worldwide continue to deploy internet shutdowns and network disruptions to quell mass protests, forestall election losses, reinforce military coups, or cut off conflict areas from ...
Military Seeks Cloud-Based Platform you can Simulate Cyberattacks - MeriTalk
The Ough. S. Army is searching for a cloud-based community that it can use to copy a real-world attacker punching the Department of Defense Guidance Network (DoDIN). In a request for informat...
Inflation Nightmare Keeps Getting Worse: Producer Prices Break Out. Inflationary Mindset Rules - WOL...
Services PPI and Core PPI spike. By Wolf Richter for WOLF STREET. The Producer Price Index for Final Demand spiked by 1.4% in March from February, and by 11.2% from a year ago, both t...
The Vatican's Copyright Infringement Suit; Art Infringement - The National Law Review
Friday, June 18, 2021 Street artist Alessia Babrow has sued the Vatican, alleging that the Philatelic and Numismatic Office of the Vatican City State copied her artwork without her permission ...
Dallas Invents: 134 Patents Granted for Week of Feb. 9 » Dallas Innovates - dallasinnovates.com
Dallas Invents is a weekly look at U.S. patents granted with a connection to the Dallas-Fort Worth-Arlington metro area. Listings include patents granted to local assignees and/or those with a N...
Deposit - proxy utility by just STASH NETWORKS LIMITED instant AppAdvice
Put is a rule-based proxy program with multiple proxy method support. tutorial Handle TCP / UDP / ICMP traffic and simply forward to any proxy - Native UI dash to display HTTP / HTTPS / TCP re...
Make Your WordPress Site Fast & Unhackable: 7 Key Tips - Search Engine Journal
Ready to build your first website? Are you shopping for affordable WordPress web hosting?There are multiple types of web hosting solutions to choose from: shared hosting, dedicated hosting, cloud hos...
Rockwell Automation CIP Security Proxy - Automation World
With high-profile cyberattacks growing in frequency, industry has become all too aware of the potential dark side of internet-connected devices. While plant-floor networks were once air-gapped to sep...
HTTP vs SOCKS Proxies: The Main Differences - Business MattersBusiness Matters
@media screen and (min-width: 1201px) { .tjimr60eb17d9d25c5 { display: none; } } @media screen and (min-width: 993px) and (max-width: 1200px) { .tjimr60eb17d9d25c5 { display: none; } } @media screen...
Fix Office Errors 0-1011, 3088-1015, 30183-1011 or 0-1005 - TWCN Tech News
In this post, we will show you how to fix Microsoft Office error codes 0-1011, 3088-1015, 30183-1011, or 0-1005 when installing Office in Windows 11/10. Although Microsoft Office is a popular ap...

IP Rotating Proxy Onsale

SPECIAL LIMITED TIME OFFER

00
Months
00
Days
00
Hours
00
Minutes
00
Seconds
First month free with coupon code FREE30