1/23/2026 at 2:07:13 PM
>Microsoft's Autodiscover service misconfiguration can be confirmed via curl -v -u "email@example.com:password" "https://prod.autodetect.outlook.cloud.microsoft/autodetect/d...":Hold up, does this mean outlook sends your full credentials to Microsoft when you try to set up an outlook account? I'm sure they pinky promise they keep your credentials secure, but this feels like it breaks all sorts of security/privacy expectations.
by gruez
1/23/2026 at 3:07:46 PM
> Hold up, does this mean outlook sends your full credentials to Microsoft when you try to set up an outlook account?Not just an “outlook account” - any account in outlook, with default settings at least.
I run a mail server, mainly for me but a couple of friends have accounts on there too, and a while ago one friend reported apparently being locked out and it turned out that it was due to them switching Outlook versions and it was connecting via a completely different address to those that my whitelists expected sometimes at times when they weren't even actively using Outlook. Not only were active connections due to their interactive activity being proxied, but the IMAP credentials were stored so the MS server could login to check things whenever it wanted (I assume the intended value-add there is being able to send new mail notifications on phones/desktops even when not actively using mail?).
> but this feels like it breaks all sorts of security/privacy expectations.
It most certainly does. The behaviour can be tamed somewhat, but (unless there have been recent changes) is fully enabled by default in newer Outlook variants.
The above-mentioned friend migrated his mail to some other service in a huf as I refused to open my whitelist to “any old host run by MS” and he didn't want to dig in to how to return behaviour back to the previous “local connections only, not sending credentials off elsewhere where they might be stored”.
by dspillett
1/26/2026 at 1:53:10 PM
I might be misremembering but i think it even copies all of your mails to their servers.by Grisu_FTP
1/23/2026 at 2:44:12 PM
Not just that, the new outlook app makes Microsoft a complete man-in-the-middle for your email account.https://www.xda-developers.com/privacy-implications-new-micr...
by brulx126
1/23/2026 at 7:35:37 PM
I am so glad people are finally noticing and complaining about this. It's the same reason I won't use Spark or Superhuman. Those are neat services, but I can't abide storing the creds to perhaps the most security-sensitive service I use to a cloud provider. If they get hacked, then the attacker can access my email account, send phishing emails to my contacts, read and respond to password reset requests they make to other online services, etc. It would be disastrous.No, I'll keep my credentials stored and used locally, thanks.
by kstrauser
1/23/2026 at 5:01:45 PM
They store passwords and proxy everything at the same time they’re pushing OAuth, authenticators, passkeys, etc. for their own services. Everyone should have revolted when they bought Acompli and started doing this kind of thing.by donmcronald
1/23/2026 at 4:36:33 PM
This seems like it would completely break any attempt to track access from unauthorized users or devices — any IT department using a backend other than Microsoft’s would need to pretend that all access from MS’s servers is safe.by amluto
1/24/2026 at 10:52:05 AM
In response to discovering this any competent IT department would immediately move to ban the use of any offending apps and blacklist the MS servers from the relevant backends. Also I guess rather than drop the connections ideally you would want to accept the initial request, record the provided credentials, and then lock said account because the credentials have clearly been compromised and the user is now known to be making use of a banned app.by fc417fc802
1/24/2026 at 7:30:04 PM
It’s also the case that, of the major cloud providers, one of them is quite notably poor at securing its own systems. If I were a company that cared about security, I would not want Microsoft holding credentials to my system.by amluto
1/23/2026 at 9:35:25 PM
So like Cloudflare for email.by encom
1/23/2026 at 2:50:57 PM
And? Do you think Gmail is end to end encrypted?by koakuma-chan
1/23/2026 at 2:55:36 PM
My bank isn't end to end encrypted either, but that doesn't mean it's suddenly ok for Microsoft (or any other company) to suddenly start MITMing my online banking connections.by gruez
1/23/2026 at 2:55:16 PM
I am talking about the fact that the new default email client on Windows will hand over all your email credentials to Microsoft. This has nothing to do with Gmail.by brulx126
1/23/2026 at 2:58:02 PM
Oh you mean even if you don't use Microsoft's email? Now I get it.by koakuma-chan
1/23/2026 at 3:32:00 PM
I think the concern is that it copies the emails of your non-Microsoft accounts that you added to the Outlook app, over to Microsoft serversby delfinom
1/23/2026 at 3:02:21 PM
Adding a bunch of middlemen that also see the data increases the risk.by AlexandrB
1/23/2026 at 2:46:00 PM
Basically everything microsoft makes that touches http will send your username and your password to any server that asks for Basic Authentication.It looks like Microsoft Edge had the _ability to disable_ this added in 2020 or 2021, but it isn't currently the default and the Group Policy unintuitively only applies to unencrypted HTTP Connections.
by butvacuum
1/23/2026 at 2:58:04 PM
>Basically everything microsoft makes that touches http will send your username and your password to any server that asks for Basic Authentication.Are you talking about NTLM hashes? It's a weak hash, but not the same as "sending your password". The biggest difference is that even a weak hash can't be reversed if the password has high enough entropy.
by gruez
1/23/2026 at 4:58:52 PM
yes, I meant to type hash. Not that it matters as even 10yr old integrated GPUs are enough to brute force 8 or 9 character NTLM(or any variant) passwords in a few hours. Not that you need to with Pass The Hash.by butvacuum
1/23/2026 at 3:35:40 PM
Not necessarily, the server can say it only supports basic auth and….by lazide
1/23/2026 at 5:18:00 PM
I don't think there's any evidence that windows sends cleartext passwords. The whole reason why NTLM is a thing is to avoid sending cleartext passwords.by gruez
1/23/2026 at 5:37:37 PM
Outlook appears to beby lazide
1/23/2026 at 5:42:17 PM
The 'https://' disagrees with your 'sending clear text passwords' statement.by p_ing
1/23/2026 at 9:03:11 PM
It’s clear text to the receiving server, which is what we’re talking about, not one way hashed.by lazide
1/23/2026 at 2:18:20 PM
It's more common than you might think. I know of at least one popular email client that stores your credentials on their servers to enable features like multi-account sync and scheduled sending.by thedanbob
1/23/2026 at 3:02:39 PM
I bought a hardware password manager a while back and the bulk load tool sent all your creds to a cloud service. I have not used it since, and sent the manufacturer a nasty note.It was the Ethernom Beamu, company now defunct.
by RajT88
1/23/2026 at 2:28:09 PM
Do you mean Spark? I get why they need to do it that way but I also hate that they have to do it that way because it sucks for privacy.by tom1337
1/25/2026 at 3:24:04 AM
Yeah, Spark. Shame because I really liked their client, but I refused to use it anymore after I realized what they were doing.by thedanbob
1/23/2026 at 2:25:48 PM
I would expect such a feature to use end-to-end encryption for the data, so that only the user can see the credentials. It does, right? Right?by spiffyk
1/23/2026 at 2:27:42 PM
>>multi-account sync and scheduled sending>I would expect such a feature to use end-to-end encryption for the data
How would "end-to-end encryption" when such features by definition require the server to have access to the credentials to perform the required operations? If by "end to end" you actually mean it's encrypted all the way to the server, that's just "encryption in transit".
by gruez
1/23/2026 at 3:25:15 PM
> If by "end to end" you actually mean it's encrypted all the way to the server, that's just "encryption in transit".This is what Zoom claimed was e2ee for a little while before getting in trouble for it.
by treyd
1/23/2026 at 11:31:59 PM
This is what Google also claims as end to end encrypted in their Gmail end to end thing. Many people including me mentioned this in the comments.https://news.ycombinator.com/item?id=45458482
Its entirely their end to their end encrypted. You don't get any privacy.
by kingstnap
1/24/2026 at 11:06:22 AM
Use our new open source (modification and redistribution not permitted) app to exchange end-to-end encrypted (from your client to our server) messages with your friends! Having all your data on our service protects your data sovereignty (we do not provide for export or interop) by guaranteeing that you always have access to your full history! Usage also protects your privacy (we analyze your data for marketing purposes) by preventing unscrupulous third parties from analyzing your data for marketing purposes.If we had competent regulators this sort of blatant willful negligence would constitute false advertising.
by fc417fc802
1/23/2026 at 2:37:01 PM
Most likely, and nobody cares.Already many years ago I remember installing a firewall on my phone and noticing in surprise that Outlook was not connecting at all to my private mail server, but instead only sending my credentials to their cloud and downloading messages from there.
The only Android mail client not making random calls to cloud servers was (back then) K-9 Mail.
by tga
1/23/2026 at 2:34:33 PM
I think outlook is pretty much a saas product these days.by dec0dedab0de
1/24/2026 at 5:48:49 AM
What gave it away, the intrusive ads in your free inbox the last ten years,or the “See Plans and Pricing” on the homepage?
Christ, my poor grandmother…
by DANmode
1/23/2026 at 4:36:43 PM
I think the curl -u switch just requires the password field to be filled, there obviously isn't a legit user account test@example.com with a password of password either at microsoft or at the Japanese imap server.by Neil44
1/23/2026 at 5:17:05 PM
>I think the curl -u switch just requires the password field to be filledYeah you're right, if you don't specify the password (eg. -u user), it prompts you for it
>there obviously isn't a legit user account test@example.com with a password of password either at microsoft or at the Japanese imap server.
But presumably the fact it's there at all suggests it's a required parameter? Maybe "password" is just a placeholder, but it's unclear based on the command line transcript alone.
by gruez
1/23/2026 at 2:43:43 PM
Yeah since the Windows 11 2023h2 update.by nhinck2
1/24/2026 at 5:11:48 AM
See also: Windows 11 telemetryby DANmode
1/23/2026 at 4:16:57 PM
Always has been.by 1718627440