That’s great, thanks!
But more than just Dropbox broke with that plug-in installed — Dropbox was just the one that came to mind. If every broken email has to be fixed by hand, then it doesn’t seem like a sustainable solution for a small team.
I won’t be reinstalling it because I can’t lose access to important email links.
Plus, if it’s able to rewrite URLs, that’s a huge security risk. I hadn’t thought about this before, but the security implications are serious. I know we’re all supposed to “not click” on links in email, but sometimes we have no choice. Dropbox shares, login verifications, password resets, Zoom invitations, etc. There’s no way to avoid using the links that are sent via email. In this case the URLs were rewritten to something that won’t resolve, but what if they were rewritten to phishing sites?
Since I can’t verify the code behind it (because I’m neither a coder nor a security expert), then how can I trust it? I don’t mean to suggest nefarious actions by the developers! But it’s a pretty ripe target for bad actors.
That said, perhaps the URLs cannot be rewritten in this manner. I don’t know enough about it, honestly. But the fact that they can be altered at all is alarming.