this post was submitted on 11 Jul 2023
83 points (100.0% liked)

No Stupid Questions

35843 readers
1199 users here now

No such thing. Ask away!

!nostupidquestions is a community dedicated to being helpful and answering each others' questions on various topics.

The rules for posting and commenting, besides the rules defined here for lemmy.world, are as follows:

Rules (interactive)


Rule 1- All posts must be legitimate questions. All post titles must include a question.

All posts must be legitimate questions, and all post titles must include a question. Questions that are joke or trolling questions, memes, song lyrics as title, etc. are not allowed here. See Rule 6 for all exceptions.



Rule 2- Your question subject cannot be illegal or NSFW material.

Your question subject cannot be illegal or NSFW material. You will be warned first, banned second.



Rule 3- Do not seek mental, medical and professional help here.

Do not seek mental, medical and professional help here. Breaking this rule will not get you or your post removed, but it will put you at risk, and possibly in danger.



Rule 4- No self promotion or upvote-farming of any kind.

That's it.



Rule 5- No baiting or sealioning or promoting an agenda.

Questions which, instead of being of an innocuous nature, are specifically intended (based on reports and in the opinion of our crack moderation team) to bait users into ideological wars on charged political topics will be removed and the authors warned - or banned - depending on severity.



Rule 6- Regarding META posts and joke questions.

Provided it is about the community itself, you may post non-question posts using the [META] tag on your post title.

On fridays, you are allowed to post meme and troll questions, on the condition that it's in text format only, and conforms with our other rules. These posts MUST include the [NSQ Friday] tag in their title.

If you post a serious question on friday and are looking only for legitimate answers, then please include the [Serious] tag on your post. Irrelevant replies will then be removed by moderators.



Rule 7- You can't intentionally annoy, mock, or harass other members.

If you intentionally annoy, mock, harass, or discriminate against any individual member, you will be removed.

Likewise, if you are a member, sympathiser or a resemblant of a movement that is known to largely hate, mock, discriminate against, and/or want to take lives of a group of people, and you were provably vocal about your hate, then you will be banned on sight.



Rule 8- All comments should try to stay relevant to their parent content.



Rule 9- Reposts from other platforms are not allowed.

Let everyone have their own content.



Rule 10- Majority of bots aren't allowed to participate here.



Credits

Our breathtaking icon was bestowed upon us by @Cevilia!

The greatest banner of all time: by @TheOneWithTheHair!

founded 1 year ago
MODERATORS
 

Basic cyber security says that passwords should be encrypted and hashed, so that even the company storing them doesn't know what the password is. (When you log in, the site performs the same encrypting and hashing steps and compares the results) Otherwise if they are hacked, the attackers get access to all the passwords.

I've noticed a few companies ask for specific characters of my password to prove who I am (eg enter the 2nd and 9th character)

Is there any secure way that this could be happening? Or are the companies storing my password in plain text?

you are viewing a single comment's thread
view the rest of the comments
[–] eating3645@lemmy.world 5 points 1 year ago (2 children)

I always figured they checked the plaintext locally before hashing and sending it to their server, but I don't really know.

[–] snorkbubs@fedia.io 3 points 1 year ago (1 children)

This is it.

It seems a lot of people have trouble distinguishing between what's simply happening in their browser, and what's being sent back to the server. I mean, I get it; it's confusing, even to the people creating the tech, let alone a casual netizen. It's a good question, and you can't fault anyone for wondering what's what.

[–] eating3645@lemmy.world 3 points 1 year ago* (last edited 1 year ago) (1 children)

Yes, asking these questions is a fantastic thing.

Speaking of questions - I imagine there is a day to use the built in dev tools in the browser to verify that the particular site does this, but I don't know how. Do you happen to know how I might?

I remember signing up for a site a few years ago and they emailed me my confirmation, with my password, in plaintext. I was absolutely shocked

[–] snorkbubs@fedia.io 1 points 1 year ago* (last edited 1 year ago)

Just a heads-up, your comment is posted twice.

Not sure if there are any browser dev tools that do what you're specifically asking. It's more that you need to know what to look for in the source code, and the tools just aid in finding/editing/testing things. Even if you learn a dozen coding languages, and know what to look for, they may be sending the password as plain text and then doing the dirty work server-side. Maybe they send a single-use key to your browser, hash and send the password with that, then re-hash it on the server, with a private key. There are numerous ways to accomplish the task, and I'm glad I didn't start any arguments with my simplistic "this is it" statement.

All of that said, I've been out of practice for quite a while, and I was never a wizard anyhow. So, maybe someone else can offer a catch-all solution, but I really doubt it. Regardless, being aware and vigilant puts you way ahead of the pack, so nice work there.

[–] Primarily0617@kbin.social 1 points 1 year ago (1 children)

that doesn't explain the scenario described in the post

[–] eating3645@lemmy.world 1 points 1 year ago (1 children)

You're right, I misread the post. What sites have done that? I've been fortunate to never encounter any.

[–] Primarily0617@kbin.social 1 points 1 year ago (1 children)
[–] eating3645@lemmy.world 1 points 1 year ago (1 children)

Might be time to switch banks...

[–] Primarily0617@kbin.social 1 points 1 year ago* (last edited 1 year ago) (1 children)

They all do it. It's perfectly secure if you don't implement it in a naive way.

No, they aren't storing your password in plaintext.

[–] eating3645@lemmy.world 1 points 1 year ago (1 children)
[–] Primarily0617@kbin.social 1 points 1 year ago

There's a security stack exchange on this exact question here.

Storing your credentials in plaintext would be insane, illegal, and would never pass any kind of audit.