A little app that takes the mangled URLs generated by Microsoft 365’s Safelinks link checking service and decodes them to recover the original target.
Just pop the Safelinks redirect URL in this widget and press enter or click the button. Then copy the retrieved URL and use it wherever you need it.
Why create this?
We use Microsoft 365, so links in all the emails we receive are passed through a link-checking service called Safelinks to check that the endpoint is not malicious. Which is great, but …
In the process, link URLs are transformed into something like this:
Content authors are often under great time pressure to publish, and will simply copy links from an email to publish on the web. This can be problematic, because:
- Safelinks redirects may not work for everyone
- The URLs are too long for some older browsers to handle
- They are not human-readable, so hide the ultimate destination
- They mess with analytics data
- They are served over http, not https, so
- potentially vulnerable to interception
- could harm search ranking if we have too many links to insecure resources
- If you look closely, there’s an email address in there (I’ve changed it to xxxxx.xxxxxx@ in the example) which is going to be available for anyone on the web to harvest
So, on the web, it’s best to decode Safelinks URLs and use the original target for your hrefs instead.
I'm a service designer in Scottish Enterprise's unsurprisingly-named service design team. I've been a content designer, editor, UX designer and giant haystacks developer on the web for (gulp) over 25 years.