When enabled, "Microsoft Defender for Office 365" uses a feature called "Safe Link" to replace links in emails with URLs that go through Microsoft's servers. I consider this an invasion of my privacy.
The Firefox addon detects when you open a "Safe Link" and, instead of sending your data to Microsoft, it directly opens the original URL.
View on the 🦊 Firefox extension directory
After cloning the repository, you can use the test-page.html
file for testing the add-on.
The page contains easy-to-follow steps on how to debug the redirects.
- Install
web-ext
(see their GitHub README) - From your checkout, run the following:
web-ext build --ignore-files \
"icons/*.sh" \
"icons/*.svg" \
"test-page.html" \
"CHANGELOG.md"
- Did you use any build tools? No.
- Does your package include source code for any private repositories or frameworks used in your add-on? All of the code is open source. It does not contain any frameworks.
- Operation system used for the build: macOS 11.1
- Details of any specific versions of tools or utilities needed: There are none. A simple text editor will suffice.
- Links to any tools or utilities that need to be downloaded: n/a
- Guidance for installing any downloaded tools and utilities, for example, links to online instructions: n/a
- instructions for building your add-on code or details of any scripts provided: n/a
- Does your package include your build script? I do not have a build script. The instructions on how to build are part of this README.
The icon is taken from the Google Material Design iconset, and is used under the terms of the Creative Commons Attribution-ShareAlike license.
This addon is published under the Mozilla Public License, version 2.0.