How Safe are (or Tiny URL) Links?
Posted: Tuesday, May 30
How Safe are (or Tiny URL) Links?

i 3 Table of Contents

How Safe are (or Tiny URL) Links?

What are shortened or tiny URLs?

In the world of shortcuts, how could URLs stay behind. With domain names getting stranger and web links getting obnoxiously longer, tiny URLs come to the rescue. These are like capsule covers that make medicines easy to digest. Usually web addresses are attached with a lot of information (called query string) that helps a web page fetch the right information. These links are hard to memorise and cumbersome to distribute through messages. Shortened URLs mask these long strings into much shorter and consumable links.

How and where do they work?

Services like, or provide URL shortening. You take a web address that is too long and feed it to one of these service providers. Using internal algorithms, they will convert it to a small, readable, and unique link. You may copy this link and distribute it through various media channels like instant messaging, social media, or emails.

What are their pros and cons?

A big plus is that shortened URLs are easy to remember and distribute. They make your content look prettier by taking being shorter (less than one line) instead of otherwise long links that may run more than four lines; which can be deterring.
A major trouble with shortened URLs is that you do not know what information they hide. After shortening, the link resembles nothing to the original one. It is impossible to just look at a link and know whether it is genuine or not.

How can I be safe with tiny URLs?

Unfortunately, there is no easy way out here. The first step when you see a shortened URL is STOP. “Do not click” on the URL is the best policy here. So how do I see the content? Well, you’ll need to copy the URL (even if it is on your mobile phone) and verify its authenticity on one of the URL checker websites. Shortened URLs also have a preview feature that allows you to view the original source.

Um, like how?

Using preview:

Some popular URL shorteners are TinyURL, Bitly,, and now discontinued These names will be part of the links that you will receive.

  1. TinyURL: If your shortened URL looks something like –, you may copy this link and paste it in your browser window along with a prefix – “preview.”. Thus your resulting link will be Once you hit enter, the original link will be displayed and you can now see its source, which in this case is
  2. If your shortened URL is something like –, adding a “+” at the end  ( will reveal the original link; in this case –

Using URL checkers

You may copy + paste the shortened URL in one of the following websites that verify if a link is safe.
1. Norton’s Safe Web –
2. Google Transparency Report –

In conclusion, short links are readable and friendly. But they can also be used to disguise malicious web addresses and phishing links. So just STOP. LOOK. GO!

Karissa Breen
Karissa Breen, crowned a LinkedIn ‘Top Voice in Technology’, is more commonly known as KB. A serial Entrepreneur that Co-Founded the TMFE Group, a holding company and consortium of several businesses all relating to cybersecurity including, an industry-leading media platform, a marketing agency, a content production studio, and the executive headhunting firm, MercSec. KBI.Media is an independent and agnostic global cyber security media company led by KB at the helm of the journalism division. As a Cybersecurity Investigative Journalist, KB hosts her flagship podcast, KBKast, interviewing cybersecurity practitioners around the globe on security and the problems business executives face. It has been downloaded in 65 countries with more than 300K downloads globally, influencing billions in cyber budgets. KB asks hard questions and gets real answers from her guests, providing a unique, uncoloured position on the always evolving landscape of cybersecurity. As a Producer and Host of the streaming show,, she sits down with experts to demystify the world of cybersecurity and provide genuine insight to businesses executives on the downstream impacts cybersecurity advancement and events have on our wider world.
Share This