this post was submitted on 07 Jan 2025
913 points (99.6% liked)

memes

10848 readers
3893 users here now

Community rules

1. Be civilNo trolling, bigotry or other insulting / annoying behaviour

2. No politicsThis is non-politics community. For political memes please go to !politicalmemes@lemmy.world

3. No recent repostsCheck for reposts when posting a meme, you can only repost after 1 month

4. No botsNo bots without the express approval of the mods or the admins

5. No Spam/AdsNo advertisements or spam. This is an instance rule and the only way to live.

Sister communities

founded 2 years ago
MODERATORS
 
top 50 comments
sorted by: hot top controversial new old
[–] Irelephant@lemm.ee 11 points 10 hours ago (2 children)

I use "don't fuck with paste", a browser extension.

[–] SkunkWorkz@lemmy.world 1 points 4 hours ago

Allow Right-Click

[–] Hossenfeffer@feddit.uk 5 points 10 hours ago

Nice one, so do I now!

[–] nucleative@lemmy.world 16 points 16 hours ago (2 children)

My bank uses a TOTP and they not only block paste, they also block all typing. Instead they popup a modal with a 0-9 digit keypand and the location of each number changes every time.

Effing obnoxious.

[–] Shapillon@lemmy.world 5 points 10 hours ago* (last edited 10 hours ago) (2 children)

That's a security standard preventing keyloggers from guessing your credentials.

[–] cm0002@lemmy.world 10 points 7 hours ago

That's ~~a~~ security ~~standard~~ theater pretending to prevent~~ing~~ keyloggers from guessing your credentials.

FTFY

[–] nucleative@lemmy.world 5 points 10 hours ago

The TOTP changes every time. For modern totp hashing I'm not sure how many sequential codes a keylogger would need but I'm guessing more than I will ever enter.

Edit, asked ai for an answer to that because I was curious (maybe it's right):

Start AI

That being said, if an attacker were able to collect a large number of TOTP codes, they might be able to launch a brute-force attack to try to guess the private key. However, this would require an enormous amount of computational power and time.

To give you an idea of the scale, let's consider the following:

Assume an attacker collects 1000 TOTP codes, each 6 digits long (a common length for TOTP codes).
Assume the private key is 128 bits long (a common length for cryptographic keys).
Assume the attacker uses a powerful computer that can perform 1 billion computations per second.

Using a brute-force attack, the attacker would need to try approximately 2^128 (3.4 x 10^38) possible private keys to guess the correct one. Even with a powerful computer, this would take an enormous amount of time - on the order of billions of years.

[–] kungen@feddit.nu 4 points 16 hours ago (1 children)

Bank developer played too much RuneScape?

[–] cm0002@lemmy.world 5 points 16 hours ago

Lmao I was just about to comment, their bank must have hired a UX designer from Jagex lol

[–] udon@lemmy.world 1 points 11 hours ago

"welcome" :)

[–] laserjet@lemmy.dbzer0.com 14 points 22 hours ago (4 children)

My impression from when I've encountered this is that it is an attempt to repel bots.

Speculating/knowing about the reason doesn't help when I'm confronted with having to input the password *6mA*P7CCuVyHo8kh%x34!63wm23&uhzSMY3Xy3$*8^%7j$VeH^7

[–] nucleative@lemmy.world 10 points 16 hours ago

Bots don't paste. If it a selenium related bot it would inject the value or type out each keypress.

It only causes real users pain

[–] Irelephant@lemm.ee 1 points 10 hours ago

if you use keepasxc, what about autotype? I could never get it to work but idk.

[–] MouldyCat@feddit.uk 12 points 20 hours ago

My impression from when I’ve encountered this is that it is an attempt to repel bots.

hmm bots don't use keyboard or mouse copy & paste so I don't see how that makes sense?

my impression is this is just stupid product managers who don't understand why it's a bad idea to force all your users to manually type out their passwords or email addresses just because of the 0.1% of people who would copy and paste one with an error in.

[–] JasonDJ@lemmy.zip 4 points 21 hours ago* (last edited 21 hours ago)

Weird, that's one character off from my Paramount+ password. I know from typing it on every fucking STB and console that I own and painstakingly quadruple-checking each character when it fails.

You'd think I'd just change to a passphrase but nah. Ain't nobody got time for that. Too busy ranting about user unfriendly problems that shouldn't exist in modern STB apps.

[–] laurelraven@lemmy.zip 11 points 22 hours ago (1 children)

Let's be real, though, it's not the dev we should be mad at but some suit who thinks they know security demanding it be done that way

[–] Dagwood222@lemm.ee 3 points 10 hours ago

Most of the problems in the modern world could be solved if the front line people could to each other directly.

Suits are the bottleneck.

[–] Anticorp@lemmy.world 29 points 1 day ago (1 children)

Especially for things like account numbers. No, you're not increasing security, you idiots, you're increasing human error!

[–] JasonDJ@lemmy.zip 2 points 21 hours ago (1 children)

Yep. It's always when I'm adding a payment method to like a credit card or something.

The ones that are web-based and block password vault auto fill...on desktop...those really grind my gears.

Also, is it me, or is android really bad about detecting when something is a username/password field and the vault auto fill should be suggested

load more comments (1 replies)
[–] BobTheDestroyer@lemm.ee 27 points 1 day ago (2 children)

It isn't right you need an extension for it, but here we are. Don't F*** With Paste

[–] hessenjunge@discuss.tchncs.de 13 points 1 day ago (1 children)

On Firefox it is some setting under about:config, no need for an extension.

[–] frosty@pawb.social 9 points 23 hours ago (1 children)

dom.event.clipboardevents.enabled

[–] MouldyCat@feddit.uk 2 points 20 hours ago

Sadly this doesn't work reliably - an increasing number of sites still manage to block it. Also it prevents other sites from working properly.

[–] rimjob_rainer@discuss.tchncs.de 3 points 23 hours ago (1 children)

using chrome in the first place

[–] JasonDJ@lemmy.zip 3 points 20 hours ago

using characters that need to be escaped in your plugins name

[–] big_fat_fluffy@leminal.space 4 points 23 hours ago (14 children)

On a similar note, by mobile lemmy client won't let me copy test. Can't even select it.

[–] A7thStone@lemmy.world 4 points 22 hours ago (1 children)

If you are using Voyager you can hold down on the comment or hit the three dot button and you'll get a menu that gives you a "select text" option. I was annoyed by that until I found it.

[–] AnUnusualRelic@lemmy.world 3 points 11 hours ago (1 children)

I eventually found it as well. I'm still a bit annoyed. It's not very convenient.

[–] TriflingToad@sh.itjust.works 1 points 10 hours ago

I can do this on my phone and it's easier than the select text button


still annoying though

load more comments (13 replies)
[–] __init__@programming.dev 54 points 1 day ago (2 children)

I ran into this when trying to paste my generated password into the password field on some kind of financial site and I think it is still the most egregious case of security theater I’ve seen yet.

Anyway, you want the “don’t fuck with paste” extension, available on both chrome and firefox.

[–] maccentric@sh.itjust.works 44 points 1 day ago* (last edited 1 day ago) (4 children)

You don't need this - In about:config, set dom.event.clipboardevents.enabled to false. No Addon needed.

load more comments (4 replies)
load more comments (1 replies)
load more comments
view more: next ›