Anyone Else Access Your Gmail Account Through MS Outlook?

tlucier

Well-Known Member
Joined
Jun 3, 2007
Location
Mebane, NC
I have a gmail account and I use Outlook. Today I opened Outlook and I got a pop up window with the Google logo and it said “One Account. All of Google” and on another line it said, “One Google Account for everything Google.” The only option available is to sign in to my Google account. Once I sign in I get a window that says, “Microsoft apps & services wants to access your Google Account. This allows Microsoft apps & services to:
Read, compose, send, and permanently delete all your email from Gmail.
Associate you with your personal info on Google.
See your personal info, including any personal info you’ve made publicly available.
See your primary Google Account email address.”

There are two options, Deny or Allow. The disclaimer says, “By clicking allow you allow this app and Google to use your information in accordance with their respective privacy policies. You can change this and other Account Permissions at any time.”

I clicked Deny and got a message that said, “You have denied Office access to Google - IMAP. Please grant Office access to Google - IMAP and try again. I don’t get any new email through Outlook now, but I have no problems getting email on my iPhone & iPad.

Anyone else run into this? I can access my email directly through Gmail, but I prefer the Outlook interface. On the other hand, I’m 54 years old and resistant to change. Get off my lawn! :laughing:
 
FWIW I haven’t seen anything but I access mine through my phone on the gmail app. No hiccups here. Not that it answers your question but just a data point to eliminate it being a gmail wide type of thing.
 
I use outlook for work, and it has never made me enter a Google account.
 
I use outlook for work, and it has never made me enter a Google account.
The deal is my email account is gmail and I access it through Outlook. So I have to link my gmail account to my Microsoft account so Outlook can see the email in my gmail account. This is a piss poor description of what’s going on because I’m not a computer guy. I know how to use them but I cannot describe the what and how of what goes on behind the scenes between Outlook and Gmail.
 
The deal is my email account is gmail and I access it through Outlook. So I have to link my gmail account to my Microsoft account so Outlook can see the email in my gmail account. This is a piss poor description of what’s going on because I’m not a computer guy. I know how to use them but I cannot describe the what and how of what goes on behind the scenes between Outlook and Gmail.
It makes sense to me in both of your descriptions. Sounds like an attempt by Googosoft to further erode your privacy.
 
It makes sense to me in both of your descriptions. Sounds like an attempt by Googosoft to further erode your privacy.
He's using Google for his email. That ship has sailed.

Microsoft needs permission to access his Google account. He denied access, now can't get his email. That's exactly how it's supposed to work. If you want to check Gmail with Outlook, you need to grant it permission.
 
He's using Google for his email. That ship has sailed.

Microsoft needs permission to access his Google account. He denied access, now can't get his email. That's exactly how it's supposed to work. If you want to check Gmail with Outlook, you need to grant it permission.
Thanks for your arrogant reply. I can still access my email through gmail so no skin off my ass.
 
Thanks for your arrogant reply. I can still access my email through gmail so no skin off my ass.
Snark aside….this is a new security measure. An third party apps accessing gmail have to have permission.
Nothing you typed is new.
If you want to use outlook just click allow and all is well.

I think you are worried about the “permanently delete” part…if so - that permission is required so that if you click the trash can in outlook - google allows outlook to delete the email from the gmail “server”…
 
Snark aside….this is a new security measure. An third party apps accessing gmail have to have permission.
Nothing you typed is new.
If you want to use outlook just click allow and all is well.

I think you are worried about the “permanently delete” part…if so - that permission is required so that if you click the trash can in outlook - google allows outlook to delete the email from the gmail “server”…
This. Thinking back when I was in the service we used a “gov’t version” of outlook and at one point you could link your Microsoft based emails (nothing Apple cause it was bad lol) but you had to acknowledge that outlook was the master program and would have control of any other email you linked to it. It was a nightmare. Later they cut all of it out and it was gov outlook only. A few years later the .mil went away from the crapberry phones and adopted iPhone and iPads but you could never link your outloook again due to security reasons.
 
Snark aside….this is a new security measure. An third party apps accessing gmail have to have permission.
Nothing you typed is new.
If you want to use outlook just click allow and all is well.

I think you are worried about the “permanently delete” part…if so - that permission is required so that if you click the trash can in outlook - google allows outlook to delete the email from the gmail “server”…
Thank you, Ron. Appreciate the info.
 
This. Thinking back when I was in the service we used a “gov’t version” of outlook and at one point you could link your Microsoft based emails (nothing Apple cause it was bad lol) but you had to acknowledge that outlook was the master program and would have control of any other email you linked to it. It was a nightmare. Later they cut all of it out and it was gov outlook only. A few years later the .mil went away from the crapberry phones and adopted iPhone and iPads but you could never link your outloook again due to security reasons.
The conversion to the Army.mil domain under DISA fucked everything up, forcing everything to be exclusive to their servers. Now its all 365 based and even worse.
 
The conversion to the Army.mil domain under DISA fucked everything up, forcing everything to be exclusive to their servers. Now its all 365 based and even worse.
Yeah I was leaving as they were “transitioning” to that gay shit. 95% of Bragg crashed during the handover. Average was 2 weeks with no email capabilities if you didn’t have a certain rank or higher to rate a trouble ticket to have it fixed.
 
Did you click that allow button yet?
 
That's only in your head.
Nah - it was definitely the perceived undertone of your reply. Whether intentional or oblivious it doesn’t make it any less real. But it’s part of your charm, I suppose.
 
Ron is 100% correct. Its just getting permission to fully act as the mediator as if you were using the webmail client. move, delete, compose, send, etc.

You can create a MS account manually and force pop usage. I prefer this as a i get a hard copy of the email on my computer that gmail doesnt have the ability to retract. Or i run out of gmail space i can delete everything but still have all those emails remain on the MS client. With IMAP your getting a mirror copy (requires internet connection) of what is on the web. What you do in the client reflects on the web, and vice versa.

Regarding the privacy comments. In my opinion there is not a single *true* secure email service available today. The last one i was aware of died quite a few years back. Unless you are the origin of that service, with your server running on ram only (no hdd) with zero logs, and accessing via a tokenized VPN, where the server only data exchanges with other similar users - at some point your data gets compromised. Either when it enters or when it exits "the onion". The only true benefit that can be achieved with alot of these setups, in my opinion, is the exit is so random, its "harder" to associate with its origin. But nonetheless it still exits. Im by no means an expert, but if *end to end encryption* is not happening, its just fly paper. @Wes iirc was also involved in an arena that relied on "secure comms" and probably can attest to the statement in bold and its significance. Our walkies were the simpliest form of this that I know of. When you email a rando John Doe at XYZ Brown, for a pallet order of ammo. He is not on the same service you are, and the end to end encryption doesnt happen...

The caveat is, you can have the most badass end to end encryption in the world. None of that stops a man in the middle attack, or even someone just simply hacking your computer in real time and reading what you received with you. I remember from COMSEC training, the scenario of a end to end encryption program, where instead of trying to hack the encyrption, they just hacked the computers at each end which had nothing better than windows firewall...

If i truly need to discuss something that truly needs to not be overheard, then there is not a single electronic in sight. Otherwise i truly dont give a shittake mushroom, if google and the ABCs can read my emails concerning my onlyfans subscriptions, and costco membership reminders
 
Ron is 100% correct. Its just getting permission to fully act as the mediator as if you were using the webmail client. move, delete, compose, send, etc.

You can create a MS account manually and force pop usage. I prefer this as a i get a hard copy of the email on my computer that gmail doesnt have the ability to retract. Or i run out of gmail space i can delete everything but still have all those emails remain on the MS client. With IMAP your getting a mirror copy (requires internet connection) of what is on the web. What you do in the client reflects on the web, and vice versa.

Regarding the privacy comments. In my opinion there is not a single *true* secure email service available today. The last one i was aware of died quite a few years back. Unless you are the origin of that service, with your server running on ram only (no hdd) with zero logs, and accessing via a tokenized VPN, where the server only data exchanges with other similar users - at some point your data gets compromised. Either when it enters or when it exits "the onion". The only true benefit that can be achieved with alot of these setups, in my opinion, is the exit is so random, its "harder" to associate with its origin. But nonetheless it still exits. Im by no means an expert, but if *end to end encryption* is not happening, its just fly paper. @Wes iirc was also involved in an arena that relied on "secure comms" and probably can attest to the statement in bold and its significance. Our walkies were the simpliest form of this that I know of. When you email a rando John Doe at XYZ Brown, for a pallet order of ammo. He is not on the same service you are, and the end to end encryption doesnt happen...

The caveat is, you can have the most badass end to end encryption in the world. None of that stops a man in the middle attack, or even someone just simply hacking your computer in real time and reading what you received with you. I remember from COMSEC training, the scenario of a end to end encryption program, where instead of trying to hack the encyrption, they just hacked the computers at each end which had nothing better than windows firewall...

If i truly need to discuss something that truly needs to not be overheard, then there is not a single electronic in sight. Otherwise i truly dont give a shittake mushroom, if google and the ABCs can read my emails concerning my onlyfans subscriptions, and costco membership reminders
Correct. We had red side and green side. In order to communicate through red, it had to be an encrypted/secure hard drive that users on both ends had. You had to shut down the computer, swap hard drives, flip a switch, then fire it back up. Then there were 47 layers of crap to send an email. The other end had to do the same to receive it. The unsecured/green side was maybe a step up from what you have at home. Tons of restrictions, but email scams can still slip through. As far as voice, we had “secure/encrypted “ sat phones, encrypted radio fills, voice over IP, the list goes on.
 
Ron is 100% correct. Its just getting permission to fully act as the mediator as if you were using the webmail client. move, delete, compose, send, etc.

You can create a MS account manually and force pop usage. I prefer this as a i get a hard copy of the email on my computer that gmail doesnt have the ability to retract. Or i run out of gmail space i can delete everything but still have all those emails remain on the MS client. With IMAP your getting a mirror copy (requires internet connection) of what is on the web. What you do in the client reflects on the web, and vice versa.

Regarding the privacy comments. In my opinion there is not a single *true* secure email service available today. The last one i was aware of died quite a few years back. Unless you are the origin of that service, with your server running on ram only (no hdd) with zero logs, and accessing via a tokenized VPN, where the server only data exchanges with other similar users - at some point your data gets compromised. Either when it enters or when it exits "the onion". The only true benefit that can be achieved with alot of these setups, in my opinion, is the exit is so random, its "harder" to associate with its origin. But nonetheless it still exits. Im by no means an expert, but if *end to end encryption* is not happening, its just fly paper. @Wes iirc was also involved in an arena that relied on "secure comms" and probably can attest to the statement in bold and its significance. Our walkies were the simpliest form of this that I know of. When you email a rando John Doe at XYZ Brown, for a pallet order of ammo. He is not on the same service you are, and the end to end encryption doesnt happen...

The caveat is, you can have the most badass end to end encryption in the world. None of that stops a man in the middle attack, or even someone just simply hacking your computer in real time and reading what you received with you. I remember from COMSEC training, the scenario of a end to end encryption program, where instead of trying to hack the encyrption, they just hacked the computers at each end which had nothing better than windows firewall...

If i truly need to discuss something that truly needs to not be overheard, then there is not a single electronic in sight. Otherwise i truly dont give a shittake mushroom, if google and the ABCs can read my emails concerning my onlyfans subscriptions, and costco membership reminders
What are your thoughts on proton?
 
What are your thoughts on proton?

I use it all the time to contact other proton users, for submitting recreational purchase orders that are grey area legal.
The caveat is: It uses PGP, so your subject lines are never encrypted, or the to/from addresses. So keep that in mind. Additionally with how outdated PGP is, the context imho is that youre really only hiding from the Eagle Eye program from auto flags. And presuming youre accessing from an alternate device that hopefully is never discovered to be in association with you, then presumably if the spotlight ever came on you they wouldnt know to look for it. If the "secure communication" still results in a physical item mailed to your real address, it was all a waste. This doesnt safe guard however if the spotlight comes on your recipient, and in the course of prosecution your contact becomes part of a list to track down. PGP is is considered in the private sector to not be strong enough against sophisticated attacks [in the private sector]. So we can presume uncle sam would have more in the arsenal.

Additionally protonmail has already collaborated with law enforcement in the past to reveal the real IP addresses of its users to flesh out a french activists. I dont care about the ethics of whether a service provider will or wont, i care that they *cant* collaborate with law enforcement because there is no data to share.
I previously brought up end to end encryption. This is your private tunnel to your 'friend'. But there is also whats called encryption at rest. This means the data that sits on the server (your inbox). For this protonmail is actually the key holder for this encryption. So in reality your keys are no more secure than gmail. Proton can be hacked and keys stolen, or proton can be forced by LE to reveal/use the key to share your data.

My requirements for an email service provider where i would feel comfortable making illegal discussions (lets say black market medicine for a family that cant afford health care):

-Email server runs on ram only with no logs
-Zero server data storage. The message is on your device when you read it. If you do not save it to your device, its gone forever.
-Hybrid AES/RSA encryption system. RSA to encrypt the keys, AES to encrypt the data
-I only access this email from a third party device that is not associated with me, so if captured, hacked, or on the run - 'they' do not know it exists as a form of communication that i use because its not on a confiscated home computer or personal cell etc.

There used to be a swiss company that offered this. But shortly after the IRS debacle with bullying foreign countries to share their banking information (under international trademark principle on the FRN), and the resulting onslaught followed by the mass expulsion of US customers by companies, the service provider shortly thereafter disappeared.

Its been an idea on the shelf for a few years to build a app like this. A text only version of snapchat with the above parameters, and messages always delete after viewing. You can make the app prevent screenshots as well.

In my honest opinion, postal mail is a more "encrypted" option of communication these days than anything electronic. Carbon copy paper wrapped around a letter makes xray OTP useless. I have a pma mail box under an alias. I can receive mail to there. This service will fwd the mail to any address. This can be forwarded to "hold for pickup" at fedex addressed to another alias. Fedex employee doesnt look for fake ID. The mail service is coordinated with a google phone number attached to a burner phone that has never been connected to a cell service, which only ever uses wifi hotspots adjoined to very large parking lots (the mall for example). Its been almost a decade since Ive used all this, since back when i ran my privacy and asset management business. You can read a book by JJ Luna, How to be invisible. Stuff above is what one would get taught by his Tier1 paid service etc.

Anywho. Theres not a electronic service "i personally" feel comfortable with, currently. Thats just my opinion. I dont have the most experiences, and certainly not an expert.
 
Back
Top