HTML email: Difference between revisions

Content deleted Content added
No edit summary
Tags: Reverted Visual edit Mobile edit Mobile web edit
m Reverted edits by 120.188.94.251 (talk) (HG) (3.4.12)
Line 20:
 
{| class="wikitable"
|+"Email standards project" ''Acid test'' comparison (as of January 2013)[http://www.email-standards.org/ ] {{Webarchive|url=https://web.archive.org/web/20171206060404/https://www.email-standards.org/ |date=6 December 2017 }}
|-
!Clients !! Result (as of)
Line 89:
Although the difference in download time between plain text and mixed message mail (which can be a factor of ten or more) was of concern in the 1990s (when most users were accessing email servers through slow [[modem]]s), on a modern connection the difference is negligible for most people, especially when compared to images, music files, or other common attachments.<ref>[http://www.georgedillon.com/web/html_email_is_evil_still.shtml HTML Email – Still Evil?]</ref>
 
== Security numbers) to a scammer.vulnerabilities ==
 
HTML allows a link to be displayed as arbitrary text, so that rather than displaying the full URL, a link may show only part of it or simply a user-friendly target name. This can be used in [[phishing]] attacks, in which users are fooled into believing that a link points to the website of an authoritative source (such as a bank), visiting it, and unintentionally revealing personal details (like bank account numbers) to a scammer.
 
If an email contains [[web bug]]s (inline content from an external server, such as a [[Digital image|picture]]), the server can alert a third party that the email has been opened. This is a potential [[email privacy|privacy]] risk, revealing that an email address is real (so that it can be targeted in the future) and revealing when the message was read.