this post was submitted on 07 Jan 2025
855 points (99.5% liked)

memes

10829 readers
4301 users here now

Community rules

1. Be civilNo trolling, bigotry or other insulting / annoying behaviour

2. No politicsThis is non-politics community. For political memes please go to !politicalmemes@lemmy.world

3. No recent repostsCheck for reposts when posting a meme, you can only repost after 1 month

4. No botsNo bots without the express approval of the mods or the admins

5. No Spam/AdsNo advertisements or spam. This is an instance rule and the only way to live.

Sister communities

founded 2 years ago
MODERATORS
 
top 50 comments
sorted by: hot top controversial new old
[–] Irelephant@lemm.ee 3 points 2 hours ago (1 children)

I use "don't fuck with paste", a browser extension.

[–] Hossenfeffer@feddit.uk 2 points 2 hours ago

Nice one, so do I now!

[–] udon@lemmy.world 1 points 3 hours ago

"welcome" :)

[–] nucleative@lemmy.world 10 points 8 hours ago (2 children)

My bank uses a TOTP and they not only block paste, they also block all typing. Instead they popup a modal with a 0-9 digit keypand and the location of each number changes every time.

Effing obnoxious.

[–] Shapillon@lemmy.world 5 points 2 hours ago* (last edited 2 hours ago) (1 children)

That's a security standard preventing keyloggers from guessing your credentials.

[–] nucleative@lemmy.world 2 points 2 hours ago

The TOTP changes every time. For modern totp hashing I'm not sure how many sequential codes a keylogger would need but I'm guessing more than I will ever enter.

Edit, asked ai for an answer to that because I was curious (maybe it's right):

Start AI

That being said, if an attacker were able to collect a large number of TOTP codes, they might be able to launch a brute-force attack to try to guess the private key. However, this would require an enormous amount of computational power and time.

To give you an idea of the scale, let's consider the following:

Assume an attacker collects 1000 TOTP codes, each 6 digits long (a common length for TOTP codes).
Assume the private key is 128 bits long (a common length for cryptographic keys).
Assume the attacker uses a powerful computer that can perform 1 billion computations per second.

Using a brute-force attack, the attacker would need to try approximately 2^128 (3.4 x 10^38) possible private keys to guess the correct one. Even with a powerful computer, this would take an enormous amount of time - on the order of billions of years.

[–] kungen@feddit.nu 4 points 8 hours ago (1 children)

Bank developer played too much RuneScape?

[–] cm0002@lemmy.world 4 points 7 hours ago

Lmao I was just about to comment, their bank must have hired a UX designer from Jagex lol

[–] laserjet@lemmy.dbzer0.com 12 points 13 hours ago (4 children)

My impression from when I've encountered this is that it is an attempt to repel bots.

Speculating/knowing about the reason doesn't help when I'm confronted with having to input the password *6mA*P7CCuVyHo8kh%x34!63wm23&uhzSMY3Xy3$*8^%7j$VeH^7

[–] Irelephant@lemm.ee 1 points 2 hours ago

if you use keepasxc, what about autotype? I could never get it to work but idk.

[–] nucleative@lemmy.world 8 points 8 hours ago

Bots don't paste. If it a selenium related bot it would inject the value or type out each keypress.

It only causes real users pain

[–] MouldyCat@feddit.uk 11 points 11 hours ago

My impression from when I’ve encountered this is that it is an attempt to repel bots.

hmm bots don't use keyboard or mouse copy & paste so I don't see how that makes sense?

my impression is this is just stupid product managers who don't understand why it's a bad idea to force all your users to manually type out their passwords or email addresses just because of the 0.1% of people who would copy and paste one with an error in.

[–] JasonDJ@lemmy.zip 3 points 12 hours ago* (last edited 12 hours ago)

Weird, that's one character off from my Paramount+ password. I know from typing it on every fucking STB and console that I own and painstakingly quadruple-checking each character when it fails.

You'd think I'd just change to a passphrase but nah. Ain't nobody got time for that. Too busy ranting about user unfriendly problems that shouldn't exist in modern STB apps.

[–] laurelraven@lemmy.zip 10 points 14 hours ago (1 children)

Let's be real, though, it's not the dev we should be mad at but some suit who thinks they know security demanding it be done that way

[–] Dagwood222@lemm.ee 2 points 2 hours ago

Most of the problems in the modern world could be solved if the front line people could to each other directly.

Suits are the bottleneck.

[–] big_fat_fluffy@leminal.space 5 points 14 hours ago (2 children)

On a similar note, by mobile lemmy client won't let me copy test. Can't even select it.

[–] A7thStone@lemmy.world 4 points 13 hours ago (1 children)

If you are using Voyager you can hold down on the comment or hit the three dot button and you'll get a menu that gives you a "select text" option. I was annoyed by that until I found it.

[–] AnUnusualRelic@lemmy.world 2 points 3 hours ago (1 children)

I eventually found it as well. I'm still a bit annoyed. It's not very convenient.

[–] TriflingToad@sh.itjust.works 1 points 2 hours ago

I can do this on my phone and it's easier than the select text button


still annoying though

[–] ChaoticNeutralCzech@feddit.org 2 points 13 hours ago (2 children)
[–] big_fat_fluffy@leminal.space 1 points 9 hours ago (1 children)
[–] ChaoticNeutralCzech@feddit.org 2 points 9 hours ago* (last edited 8 hours ago) (2 children)

You actually have multiple options. They all work for posts and comments.

  • ⋮ / View Source
  • Reply (above the text field, the source of the parent post/comment is visible and selectable)
  • ⋮ / Copy / Copy Comment Text (for a copy-all operation, obviously; you caan also copy permalinks, post titles and URLs)

How did you not notice? Also, it's expected behavior that you can't just copy text from the comment view, and making ot work with rendered Markdown would be difficult.

[–] big_fat_fluffy@leminal.space 1 points 2 hours ago (1 children)

Those are rather awkward options. Standard functionaliy is preferable, even with loss of markdown.

I think it's a detail that the dev just hasn't yet addressed.

[–] ChaoticNeutralCzech@feddit.org 1 points 7 minutes ago

This is not standard functionality, dude. Very few Android apps make comments etc. selectable in the default view.

Most people prefer swipe gestures and hold-for-context-menu, and Markdown rendering is important. Have you tried to follow a table in non-rendered MD?

[–] victorz@lemmy.world 1 points 8 hours ago (1 children)
[–] ChaoticNeutralCzech@feddit.org 2 points 8 hours ago (1 children)

They might be new to Lemmy, the account is less than 2 weeks old... but I always snoop around the options of apps soon after I install them. My phone can't send an ICBM launch order so it's usually fine but I don't know about theirs.

[–] victorz@lemmy.world 1 points 3 hours ago

I always snoop around the options of apps soon after I install them

I'm the same. Always looking to get the full experience out of stuff I use.

My phone can't send an ICBM launch order so it's usually fine but I don't know about theirs.

lol what, is this a thing?

[–] victorz@lemmy.world 1 points 13 hours ago (1 children)
[–] Anticorp@lemmy.world 28 points 23 hours ago (1 children)

Especially for things like account numbers. No, you're not increasing security, you idiots, you're increasing human error!

[–] JasonDJ@lemmy.zip 2 points 12 hours ago (1 children)

Yep. It's always when I'm adding a payment method to like a credit card or something.

The ones that are web-based and block password vault auto fill...on desktop...those really grind my gears.

Also, is it me, or is android really bad about detecting when something is a username/password field and the vault auto fill should be suggested

[–] Anticorp@lemmy.world 1 points 12 hours ago* (last edited 12 hours ago)

It's pretty bad. I get the pop-up for a lot of incorrect fields.

[–] BobTheDestroyer@lemm.ee 26 points 23 hours ago (2 children)

It isn't right you need an extension for it, but here we are. Don't F*** With Paste

[–] rimjob_rainer@discuss.tchncs.de 3 points 14 hours ago (1 children)

using chrome in the first place

[–] JasonDJ@lemmy.zip 3 points 12 hours ago

using characters that need to be escaped in your plugins name

[–] hessenjunge@discuss.tchncs.de 13 points 20 hours ago (1 children)

On Firefox it is some setting under about:config, no need for an extension.

[–] frosty@pawb.social 9 points 15 hours ago (1 children)

dom.event.clipboardevents.enabled

[–] MouldyCat@feddit.uk 1 points 11 hours ago

Sadly this doesn't work reliably - an increasing number of sites still manage to block it. Also it prevents other sites from working properly.

[–] __init__@programming.dev 54 points 1 day ago (2 children)

I ran into this when trying to paste my generated password into the password field on some kind of financial site and I think it is still the most egregious case of security theater I’ve seen yet.

Anyway, you want the “don’t fuck with paste” extension, available on both chrome and firefox.

[–] maccentric@sh.itjust.works 44 points 1 day ago* (last edited 1 day ago) (4 children)

You don't need this - In about:config, set dom.event.clipboardevents.enabled to false. No Addon needed.

load more comments (4 replies)
load more comments (1 replies)
[–] urheber@discuss.tchncs.de 7 points 23 hours ago (1 children)

no, thats another layer down. hell + ultra

load more comments (1 replies)
load more comments
view more: next ›