this post was submitted on 07 Jan 2025
845 points (99.5% liked)

memes

10842 readers
4891 users here now

Community rules

1. Be civilNo trolling, bigotry or other insulting / annoying behaviour

2. No politicsThis is non-politics community. For political memes please go to [email protected]

3. No recent repostsCheck for reposts when posting a meme, you can only repost after 1 month

4. No botsNo bots without the express approval of the mods or the admins

5. No Spam/AdsNo advertisements or spam. This is an instance rule and the only way to live.

Sister communities

founded 2 years ago
MODERATORS
 
top 50 comments
sorted by: hot top controversial new old
[–] [email protected] 3 points 36 minutes ago (1 children)

I use "don't fuck with paste", a browser extension.

[–] [email protected] 2 points 18 minutes ago

Nice one, so do I now!

[–] udon 1 points 1 hour ago

"welcome" :)

[–] nucleative 9 points 6 hours ago (2 children)

My bank uses a TOTP and they not only block paste, they also block all typing. Instead they popup a modal with a 0-9 digit keypand and the location of each number changes every time.

Effing obnoxious.

[–] Shapillon 4 points 59 minutes ago* (last edited 58 minutes ago) (1 children)

That's a security standard preventing keyloggers from guessing your credentials.

[–] nucleative 1 points 38 minutes ago

The TOTP changes every time. For modern totp hashing I'm not sure how many sequential codes a keylogger would need but I'm guessing more than I will ever enter.

Edit, asked ai for an answer to that because I was curious (maybe it's right):

Start AI

That being said, if an attacker were able to collect a large number of TOTP codes, they might be able to launch a brute-force attack to try to guess the private key. However, this would require an enormous amount of computational power and time.

To give you an idea of the scale, let's consider the following:

Assume an attacker collects 1000 TOTP codes, each 6 digits long (a common length for TOTP codes).
Assume the private key is 128 bits long (a common length for cryptographic keys).
Assume the attacker uses a powerful computer that can perform 1 billion computations per second.

Using a brute-force attack, the attacker would need to try approximately 2^128 (3.4 x 10^38) possible private keys to guess the correct one. Even with a powerful computer, this would take an enormous amount of time - on the order of billions of years.

[–] [email protected] 4 points 6 hours ago (1 children)

Bank developer played too much RuneScape?

[–] cm0002 4 points 6 hours ago

Lmao I was just about to comment, their bank must have hired a UX designer from Jagex lol

[–] [email protected] 12 points 12 hours ago (4 children)

My impression from when I've encountered this is that it is an attempt to repel bots.

Speculating/knowing about the reason doesn't help when I'm confronted with having to input the password *6mA*P7CCuVyHo8kh%x34!63wm23&uhzSMY3Xy3$*8^%7j$VeH^7

[–] [email protected] 1 points 35 minutes ago

if you use keepasxc, what about autotype? I could never get it to work but idk.

[–] nucleative 8 points 6 hours ago

Bots don't paste. If it a selenium related bot it would inject the value or type out each keypress.

It only causes real users pain

[–] [email protected] 11 points 10 hours ago

My impression from when I’ve encountered this is that it is an attempt to repel bots.

hmm bots don't use keyboard or mouse copy & paste so I don't see how that makes sense?

my impression is this is just stupid product managers who don't understand why it's a bad idea to force all your users to manually type out their passwords or email addresses just because of the 0.1% of people who would copy and paste one with an error in.

[–] [email protected] 3 points 11 hours ago* (last edited 11 hours ago)

Weird, that's one character off from my Paramount+ password. I know from typing it on every fucking STB and console that I own and painstakingly quadruple-checking each character when it fails.

You'd think I'd just change to a passphrase but nah. Ain't nobody got time for that. Too busy ranting about user unfriendly problems that shouldn't exist in modern STB apps.

[–] [email protected] 10 points 12 hours ago (1 children)

Let's be real, though, it's not the dev we should be mad at but some suit who thinks they know security demanding it be done that way

[–] [email protected] 2 points 57 minutes ago

Most of the problems in the modern world could be solved if the front line people could to each other directly.

Suits are the bottleneck.

[–] [email protected] 5 points 13 hours ago (2 children)

On a similar note, by mobile lemmy client won't let me copy test. Can't even select it.

[–] A7thStone 4 points 12 hours ago (1 children)

If you are using Voyager you can hold down on the comment or hit the three dot button and you'll get a menu that gives you a "select text" option. I was annoyed by that until I found it.

[–] AnUnusualRelic 2 points 1 hour ago (1 children)

I eventually found it as well. I'm still a bit annoyed. It's not very convenient.

[–] [email protected] 1 points 35 minutes ago

I can do this on my phone and it's easier than the select text button


still annoying though

[–] [email protected] 2 points 12 hours ago (2 children)
[–] [email protected] 1 points 8 hours ago (1 children)
[–] [email protected] 2 points 7 hours ago* (last edited 6 hours ago) (2 children)

You actually have multiple options. They all work for posts and comments.

  • ⋮ / View Source
  • Reply (above the text field, the source of the parent post/comment is visible and selectable)
  • ⋮ / Copy / Copy Comment Text (for a copy-all operation, obviously; you caan also copy permalinks, post titles and URLs)

How did you not notice? Also, it's expected behavior that you can't just copy text from the comment view, and making ot work with rendered Markdown would be difficult.

[–] [email protected] 1 points 1 hour ago

Those are rather awkward options. Standard functionaliy is preferable, even with loss of markdown.

I think it's a detail that the dev just hasn't yet addressed.

[–] victorz 1 points 6 hours ago (1 children)
[–] [email protected] 2 points 6 hours ago (1 children)

They might be new to Lemmy, the account is less than 2 weeks old... but I always snoop around the options of apps soon after I install them. My phone can't send an ICBM launch order so it's usually fine but I don't know about theirs.

[–] victorz 1 points 2 hours ago

I always snoop around the options of apps soon after I install them

I'm the same. Always looking to get the full experience out of stuff I use.

My phone can't send an ICBM launch order so it's usually fine but I don't know about theirs.

lol what, is this a thing?

[–] victorz 1 points 12 hours ago (1 children)
[–] [email protected] 2 points 8 hours ago
[–] Anticorp 28 points 21 hours ago (1 children)

Especially for things like account numbers. No, you're not increasing security, you idiots, you're increasing human error!

[–] [email protected] 2 points 11 hours ago (1 children)

Yep. It's always when I'm adding a payment method to like a credit card or something.

The ones that are web-based and block password vault auto fill...on desktop...those really grind my gears.

Also, is it me, or is android really bad about detecting when something is a username/password field and the vault auto fill should be suggested

[–] Anticorp 1 points 10 hours ago* (last edited 10 hours ago)

It's pretty bad. I get the pop-up for a lot of incorrect fields.

[–] [email protected] 26 points 21 hours ago (2 children)

It isn't right you need an extension for it, but here we are. Don't F*** With Paste

[–] [email protected] 3 points 13 hours ago (1 children)

using chrome in the first place

[–] [email protected] 3 points 10 hours ago

using characters that need to be escaped in your plugins name

[–] [email protected] 13 points 19 hours ago (1 children)

On Firefox it is some setting under about:config, no need for an extension.

[–] [email protected] 9 points 13 hours ago (1 children)

dom.event.clipboardevents.enabled

[–] [email protected] 1 points 10 hours ago

Sadly this doesn't work reliably - an increasing number of sites still manage to block it. Also it prevents other sites from working properly.

[–] [email protected] 54 points 1 day ago (2 children)

I ran into this when trying to paste my generated password into the password field on some kind of financial site and I think it is still the most egregious case of security theater I’ve seen yet.

Anyway, you want the “don’t fuck with paste” extension, available on both chrome and firefox.

[–] [email protected] 44 points 1 day ago* (last edited 1 day ago) (4 children)

You don't need this - In about:config, set dom.event.clipboardevents.enabled to false. No Addon needed.

load more comments (4 replies)
load more comments (1 replies)
[–] [email protected] 7 points 22 hours ago (1 children)

no, thats another layer down. hell + ultra

load more comments (1 replies)
load more comments
view more: next ›