The vast majority of links I click are from Outlook or Teams, and are "obfuscated" safelinks.
It looks to me that they can be reverse engineered and reconstructed from the parameters in the actual link without actually following the link. At least the first part of the url.
It would be a great improvement to show the actual link behind the safelink and trigger rules based on the link behind the safelink, not the ever present "https://outlook.office.com" of the safelink.
Note: I suppose this functionality could possibly be expanded to work for all kinds of link shorteners, but that would require following the link to get the actual url for a list of link shortening services.
The vast majority of links I click are from Outlook or Teams, and are "obfuscated" safelinks.
It looks to me that they can be reverse engineered and reconstructed from the parameters in the actual link without actually following the link. At least the first part of the url.
It would be a great improvement to show the actual link behind the safelink and trigger rules based on the link behind the safelink, not the ever present "https://outlook.office.com" of the safelink.
Note: I suppose this functionality could possibly be expanded to work for all kinds of link shorteners, but that would require following the link to get the actual url for a list of link shortening services.