this post was submitted on 07 Jan 2025
911 points (99.6% liked)

memes

10851 readers
5388 users here now

Community rules

1. Be civilNo trolling, bigotry or other insulting / annoying behaviour

2. No politicsThis is non-politics community. For political memes please go to [email protected]

3. No recent repostsCheck for reposts when posting a meme, you can only repost after 1 month

4. No botsNo bots without the express approval of the mods or the admins

5. No Spam/AdsNo advertisements or spam. This is an instance rule and the only way to live.

Sister communities

founded 2 years ago
MODERATORS
 
top 50 comments
sorted by: hot top controversial new old
[–] [email protected] 11 points 9 hours ago (2 children)

I use "don't fuck with paste", a browser extension.

[–] SkunkWorkz 1 points 3 hours ago

Allow Right-Click

[–] [email protected] 5 points 9 hours ago

Nice one, so do I now!

[–] nucleative 16 points 15 hours ago (2 children)

My bank uses a TOTP and they not only block paste, they also block all typing. Instead they popup a modal with a 0-9 digit keypand and the location of each number changes every time.

Effing obnoxious.

[–] Shapillon 5 points 9 hours ago* (last edited 9 hours ago) (2 children)

That's a security standard preventing keyloggers from guessing your credentials.

[–] cm0002 10 points 6 hours ago

That's ~~a~~ security ~~standard~~ theater pretending to prevent~~ing~~ keyloggers from guessing your credentials.

FTFY

[–] nucleative 5 points 9 hours ago

The TOTP changes every time. For modern totp hashing I'm not sure how many sequential codes a keylogger would need but I'm guessing more than I will ever enter.

Edit, asked ai for an answer to that because I was curious (maybe it's right):

Start AI

That being said, if an attacker were able to collect a large number of TOTP codes, they might be able to launch a brute-force attack to try to guess the private key. However, this would require an enormous amount of computational power and time.

To give you an idea of the scale, let's consider the following:

Assume an attacker collects 1000 TOTP codes, each 6 digits long (a common length for TOTP codes).
Assume the private key is 128 bits long (a common length for cryptographic keys).
Assume the attacker uses a powerful computer that can perform 1 billion computations per second.

Using a brute-force attack, the attacker would need to try approximately 2^128 (3.4 x 10^38) possible private keys to guess the correct one. Even with a powerful computer, this would take an enormous amount of time - on the order of billions of years.

[–] [email protected] 4 points 15 hours ago (1 children)

Bank developer played too much RuneScape?

[–] cm0002 5 points 14 hours ago

Lmao I was just about to comment, their bank must have hired a UX designer from Jagex lol

[–] udon 1 points 10 hours ago

"welcome" :)

[–] [email protected] 14 points 20 hours ago (4 children)

My impression from when I've encountered this is that it is an attempt to repel bots.

Speculating/knowing about the reason doesn't help when I'm confronted with having to input the password *6mA*P7CCuVyHo8kh%x34!63wm23&uhzSMY3Xy3$*8^%7j$VeH^7

[–] nucleative 10 points 15 hours ago

Bots don't paste. If it a selenium related bot it would inject the value or type out each keypress.

It only causes real users pain

[–] [email protected] 1 points 9 hours ago

if you use keepasxc, what about autotype? I could never get it to work but idk.

[–] [email protected] 12 points 19 hours ago

My impression from when I’ve encountered this is that it is an attempt to repel bots.

hmm bots don't use keyboard or mouse copy & paste so I don't see how that makes sense?

my impression is this is just stupid product managers who don't understand why it's a bad idea to force all your users to manually type out their passwords or email addresses just because of the 0.1% of people who would copy and paste one with an error in.

[–] [email protected] 4 points 19 hours ago* (last edited 19 hours ago)

Weird, that's one character off from my Paramount+ password. I know from typing it on every fucking STB and console that I own and painstakingly quadruple-checking each character when it fails.

You'd think I'd just change to a passphrase but nah. Ain't nobody got time for that. Too busy ranting about user unfriendly problems that shouldn't exist in modern STB apps.

[–] [email protected] 11 points 21 hours ago (1 children)

Let's be real, though, it's not the dev we should be mad at but some suit who thinks they know security demanding it be done that way

[–] [email protected] 3 points 9 hours ago

Most of the problems in the modern world could be solved if the front line people could to each other directly.

Suits are the bottleneck.

[–] Anticorp 29 points 1 day ago (1 children)

Especially for things like account numbers. No, you're not increasing security, you idiots, you're increasing human error!

[–] [email protected] 2 points 19 hours ago (1 children)

Yep. It's always when I'm adding a payment method to like a credit card or something.

The ones that are web-based and block password vault auto fill...on desktop...those really grind my gears.

Also, is it me, or is android really bad about detecting when something is a username/password field and the vault auto fill should be suggested

load more comments (1 replies)
[–] [email protected] 27 points 1 day ago (2 children)

It isn't right you need an extension for it, but here we are. Don't F*** With Paste

[–] [email protected] 13 points 1 day ago (1 children)

On Firefox it is some setting under about:config, no need for an extension.

[–] [email protected] 9 points 22 hours ago (1 children)

dom.event.clipboardevents.enabled

[–] [email protected] 2 points 19 hours ago

Sadly this doesn't work reliably - an increasing number of sites still manage to block it. Also it prevents other sites from working properly.

[–] [email protected] 3 points 21 hours ago (1 children)

using chrome in the first place

[–] [email protected] 3 points 19 hours ago

using characters that need to be escaped in your plugins name

[–] [email protected] 4 points 21 hours ago (14 children)

On a similar note, by mobile lemmy client won't let me copy test. Can't even select it.

[–] A7thStone 4 points 20 hours ago (1 children)

If you are using Voyager you can hold down on the comment or hit the three dot button and you'll get a menu that gives you a "select text" option. I was annoyed by that until I found it.

[–] AnUnusualRelic 3 points 10 hours ago (1 children)

I eventually found it as well. I'm still a bit annoyed. It's not very convenient.

[–] [email protected] 1 points 9 hours ago

I can do this on my phone and it's easier than the select text button


still annoying though

load more comments (13 replies)
[–] [email protected] 54 points 1 day ago (2 children)

I ran into this when trying to paste my generated password into the password field on some kind of financial site and I think it is still the most egregious case of security theater I’ve seen yet.

Anyway, you want the “don’t fuck with paste” extension, available on both chrome and firefox.

[–] [email protected] 44 points 1 day ago* (last edited 1 day ago) (4 children)

You don't need this - In about:config, set dom.event.clipboardevents.enabled to false. No Addon needed.

load more comments (4 replies)
load more comments (1 replies)
load more comments
view more: next ›