this post was submitted on 07 Jan 2025
923 points (99.6% liked)

memes

10854 readers
3586 users here now

Community rules

1. Be civilNo trolling, bigotry or other insulting / annoying behaviour

2. No politicsThis is non-politics community. For political memes please go to !politicalmemes@lemmy.world

3. No recent repostsCheck for reposts when posting a meme, you can only repost after 1 month

4. No botsNo bots without the express approval of the mods or the admins

5. No Spam/AdsNo advertisements or spam. This is an instance rule and the only way to live.

Sister communities

founded 2 years ago
MODERATORS
 
top 50 comments
sorted by: hot top controversial new old
[–] Irelephant@lemm.ee 11 points 1 day ago (2 children)

I use "don't fuck with paste", a browser extension.

[–] SkunkWorkz@lemmy.world 2 points 20 hours ago

Allow Right-Click

[–] Hossenfeffer@feddit.uk 5 points 1 day ago

Nice one, so do I now!

[–] nucleative@lemmy.world 17 points 1 day ago (2 children)

My bank uses a TOTP and they not only block paste, they also block all typing. Instead they popup a modal with a 0-9 digit keypand and the location of each number changes every time.

Effing obnoxious.

[–] Shapillon@lemmy.world 5 points 1 day ago* (last edited 1 day ago) (2 children)

That's a security standard preventing keyloggers from guessing your credentials.

[–] cm0002@lemmy.world 10 points 23 hours ago

That's ~~a~~ security ~~standard~~ theater pretending to prevent~~ing~~ keyloggers from guessing your credentials.

FTFY

[–] nucleative@lemmy.world 5 points 1 day ago

The TOTP changes every time. For modern totp hashing I'm not sure how many sequential codes a keylogger would need but I'm guessing more than I will ever enter.

Edit, asked ai for an answer to that because I was curious (maybe it's right):

Start AI

That being said, if an attacker were able to collect a large number of TOTP codes, they might be able to launch a brute-force attack to try to guess the private key. However, this would require an enormous amount of computational power and time.

To give you an idea of the scale, let's consider the following:

Assume an attacker collects 1000 TOTP codes, each 6 digits long (a common length for TOTP codes).
Assume the private key is 128 bits long (a common length for cryptographic keys).
Assume the attacker uses a powerful computer that can perform 1 billion computations per second.

Using a brute-force attack, the attacker would need to try approximately 2^128 (3.4 x 10^38) possible private keys to guess the correct one. Even with a powerful computer, this would take an enormous amount of time - on the order of billions of years.

[–] kungen@feddit.nu 4 points 1 day ago (1 children)

Bank developer played too much RuneScape?

[–] cm0002@lemmy.world 5 points 1 day ago

Lmao I was just about to comment, their bank must have hired a UX designer from Jagex lol

[–] laserjet@lemmy.dbzer0.com 14 points 1 day ago (4 children)

My impression from when I've encountered this is that it is an attempt to repel bots.

Speculating/knowing about the reason doesn't help when I'm confronted with having to input the password *6mA*P7CCuVyHo8kh%x34!63wm23&uhzSMY3Xy3$*8^%7j$VeH^7

[–] nucleative@lemmy.world 11 points 1 day ago

Bots don't paste. If it a selenium related bot it would inject the value or type out each keypress.

It only causes real users pain

[–] MouldyCat@feddit.uk 12 points 1 day ago

My impression from when I’ve encountered this is that it is an attempt to repel bots.

hmm bots don't use keyboard or mouse copy & paste so I don't see how that makes sense?

my impression is this is just stupid product managers who don't understand why it's a bad idea to force all your users to manually type out their passwords or email addresses just because of the 0.1% of people who would copy and paste one with an error in.

[–] Irelephant@lemm.ee 1 points 1 day ago

if you use keepasxc, what about autotype? I could never get it to work but idk.

[–] JasonDJ@lemmy.zip 4 points 1 day ago* (last edited 1 day ago)

Weird, that's one character off from my Paramount+ password. I know from typing it on every fucking STB and console that I own and painstakingly quadruple-checking each character when it fails.

You'd think I'd just change to a passphrase but nah. Ain't nobody got time for that. Too busy ranting about user unfriendly problems that shouldn't exist in modern STB apps.

[–] laurelraven@lemmy.zip 11 points 1 day ago (1 children)

Let's be real, though, it's not the dev we should be mad at but some suit who thinks they know security demanding it be done that way

[–] Dagwood222@lemm.ee 3 points 1 day ago

Most of the problems in the modern world could be solved if the front line people could to each other directly.

Suits are the bottleneck.

[–] Anticorp@lemmy.world 29 points 1 day ago (2 children)

Especially for things like account numbers. No, you're not increasing security, you idiots, you're increasing human error!

load more comments (2 replies)
[–] BobTheDestroyer@lemm.ee 27 points 1 day ago (3 children)

It isn't right you need an extension for it, but here we are. Don't F*** With Paste

[–] hessenjunge@discuss.tchncs.de 13 points 1 day ago (1 children)

On Firefox it is some setting under about:config, no need for an extension.

[–] frosty@pawb.social 9 points 1 day ago (1 children)

dom.event.clipboardevents.enabled

load more comments (1 replies)
load more comments (2 replies)
[–] __init__@programming.dev 54 points 2 days ago (2 children)

I ran into this when trying to paste my generated password into the password field on some kind of financial site and I think it is still the most egregious case of security theater I’ve seen yet.

Anyway, you want the “don’t fuck with paste” extension, available on both chrome and firefox.

[–] maccentric@sh.itjust.works 44 points 2 days ago* (last edited 2 days ago) (4 children)

You don't need this - In about:config, set dom.event.clipboardevents.enabled to false. No Addon needed.

load more comments (4 replies)
load more comments (1 replies)
[–] otacon239@lemmy.world 128 points 2 days ago (4 children)

Just as evil are the pages that don’t let you select text or pictures for copying.

[–] Irelephant@lemm.ee 1 points 1 day ago

On ff, shift and right click works. Otherwise, the inspect element.

[–] Stovetop@lemmy.world 86 points 2 days ago (2 children)

You can't copy our JPEGs! That's stealing! If you want to look at these JPEGs whenever you want, you need to register for an account and tag your favorites so we can monitor your viewing habits and sell your personality profile to advertisers and government entities!

[–] Mac@mander.xyz 59 points 2 days ago (1 children)

Meanwhile:

Sure thing, pal! I'm just gonna take a peek at the HTML real quick...

[–] valkyre09@lemmy.world 31 points 2 days ago (1 children)

Or for the lazy, screenshot!

[–] Anivia@feddit.org 4 points 1 day ago (1 children)
[–] joelfromaus@aussie.zone 1 points 3 hours ago

The irony of the first panel living in jpeg hell before it even starts to degrade…

load more comments (1 replies)
load more comments (2 replies)
[–] udon@lemmy.world 1 points 1 day ago

"welcome" :)

[–] big_fat_fluffy@leminal.space 4 points 1 day ago (14 children)

On a similar note, by mobile lemmy client won't let me copy test. Can't even select it.

[–] A7thStone@lemmy.world 4 points 1 day ago (1 children)

If you are using Voyager you can hold down on the comment or hit the three dot button and you'll get a menu that gives you a "select text" option. I was annoyed by that until I found it.

[–] AnUnusualRelic@lemmy.world 3 points 1 day ago (1 children)

I eventually found it as well. I'm still a bit annoyed. It's not very convenient.

[–] TriflingToad@sh.itjust.works 1 points 1 day ago

I can do this on my phone and it's easier than the select text button


still annoying though

load more comments (13 replies)
load more comments
view more: next ›