this post was submitted on 25 Jul 2023
309 points (92.8% liked)

Mildly Infuriating

35441 readers
1357 users here now

Home to all things "Mildly Infuriating" Not infuriating, not enraging. Mildly Infuriating. All posts should reflect that.

I want my day mildly ruined, not completely ruined. Please remember to refrain from reposting old content. If you post a post from reddit it is good practice to include a link and credit the OP. I'm not about stealing content!

It's just good to get something in this website for casual viewing whilst refreshing original content is added overtime.


Rules:

1. Be Respectful


Refrain from using harmful language pertaining to a protected characteristic: e.g. race, gender, sexuality, disability or religion.

Refrain from being argumentative when responding or commenting to posts/replies. Personal attacks are not welcome here.

...


2. No Illegal Content


Content that violates the law. Any post/comment found to be in breach of common law will be removed and given to the authorities if required.

That means: -No promoting violence/threats against any individuals

-No CSA content or Revenge Porn

-No sharing private/personal information (Doxxing)

...


3. No Spam


Posting the same post, no matter the intent is against the rules.

-If you have posted content, please refrain from re-posting said content within this community.

-Do not spam posts with intent to harass, annoy, bully, advertise, scam or harm this community.

-No posting Scams/Advertisements/Phishing Links/IP Grabbers

-No Bots, Bots will be banned from the community.

...


4. No Porn/ExplicitContent


-Do not post explicit content. Lemmy.World is not the instance for NSFW content.

-Do not post Gore or Shock Content.

...


5. No Enciting Harassment,Brigading, Doxxing or Witch Hunts


-Do not Brigade other Communities

-No calls to action against other communities/users within Lemmy or outside of Lemmy.

-No Witch Hunts against users/communities.

-No content that harasses members within or outside of the community.

...


6. NSFW should be behind NSFW tags.


-Content that is NSFW should be behind NSFW tags.

-Content that might be distressing should be kept behind NSFW tags.

...


7. Content should match the theme of this community.


-Content should be Mildly infuriating.

-At this time we permit content that is infuriating until an infuriating community is made available.

...


8. Reposting of Reddit content is permitted, try to credit the OC.


-Please consider crediting the OC when reposting content. A name of the user or a link to the original post is sufficient.

...

...


Also check out:

Partnered Communities:

1.Lemmy Review

2.Lemmy Be Wholesome

3.Lemmy Shitpost

4.No Stupid Questions

5.You Should Know

6.Credible Defense


Reach out to LillianVS for inclusion on the sidebar.

All communities included on the sidebar are to be made in compliance with the instance rules.

founded 1 year ago
MODERATORS
 
top 50 comments
sorted by: hot top controversial new old
[–] hth@lemmy.world 84 points 1 year ago* (last edited 1 year ago) (8 children)

Anytime you see a password length cap you know they are not following current security standards. If they aren't following them for something so simple and visible, you'd better believe it's a rat infested pile of hot garbage under the hood, as evidenced here.

[–] Primarily0617@kbin.social 51 points 1 year ago (1 children)

you have to limit it somewhere or you're opening yourself up for a DoS attack

password hashing algorithms are literally designed to be resource intensive

[–] confusedbytheBasics@lemmy.world 4 points 1 year ago (7 children)

Half right. Designed to be resource intensive to reverse not to calculate. The goal is minimum resources to turn input into a hash and maximum resources to get from hash back to input.

[–] Primarily0617@kbin.social 11 points 1 year ago* (last edited 1 year ago) (4 children)

Incorrect.

They're designed to be resource intensive to calculate to make them harder to brute force, and impossible to reverse.

Some literally have a parameter which acts as a sliding scale for how difficult they are to calculate, so that you can increase security as hardware power advances.

load more comments (4 replies)

See "Password Hashing" here: https://en.m.wikipedia.org/wiki/Key_derivation_function

It is actually important to have a controlled cost to calculate in the forward direction too.

[–] adambowles@lemmy.world 5 points 1 year ago (2 children)

Hashes are one way functions. You can’t get from hash back to input

[–] taipan_snake@lemmy.world 5 points 1 year ago

Only if the hash function is designed well

load more comments (1 replies)
load more comments (4 replies)
[–] crunchyoutside@kbin.social 50 points 1 year ago

Are you saying that any site which does not allow a 27 yobibyte long password is not following current security standards?
I think a 128 character cap is a very reasonable compromise between security and sanity.

[–] Mrduckrocks@lemmy.world 36 points 1 year ago (1 children)

Atleast this is reasonable, I have seen some website don't allow more than 6 character.

load more comments (1 replies)
[–] Saneless@lemmy.world 20 points 1 year ago (2 children)

At least it's 128

I had a phone carrier that changed from a pin to a "password" but it couldn't be more than 4 characters

load more comments (2 replies)
[–] intensely_human@lemm.ee 16 points 1 year ago (2 children)

At my job they just forced me to use a minimum 15-character password. Apparently my password got compromised, or at least that was someone’s speculation because apparently not everyone is required to have a 15-char password.

My job is retail, and I type my password about 50 times a day in the open, while customers and coworkers and security cameras are watching me.

I honestly don’t know how I’m expected to keep my password secure in these circumstances. We should have physical keys or biometrics for this. Passwords are only useful when you enter them in private.

Yeah you should have a key card. Like not even from a security perspective but from an efficiency one. Tap a keycard somewhere that would be easily seen if an unauthorized person were to even touch or even swipe it if need be. I’m sick and tired of passwords at workplaces when they can be helped

[–] smokie12@feddit.de 5 points 1 year ago (1 children)

Ask your boss to get you a yubikey

load more comments (1 replies)
[–] tdawg@lemmy.world 8 points 1 year ago (2 children)

In theory yes. But in practice the DB will almost always have some cap on the field length. They could just be exposing that all the way forward. Especially depending on their infastructure it could very well be that whatever modeling system they use is tightly integrated with their form generation too. So the dev (junior or otherwise) thought it would be a good idea to be explicit about the requirement

That said, you are right that this is still wrong. They should use something with a large enough cap that it doesn't matter and also remove the copy telling the use what that cap is

[–] TheButtonJustSpins@infosec.pub 21 points 1 year ago (2 children)

Hashing will make every password the same length.

[–] tdawg@lemmy.world 6 points 1 year ago

yup yup. Forgot we were talking about a protected field and not just raw data

[–] intensely_human@lemm.ee 4 points 1 year ago (2 children)

Right but that puts a limit on the hash algorithm’s input length. After a certain length you can’t guarantee a lack of collisions.

Of course the probability stays low, but at a certain point it becomes possible.

Collisions have always been a low concern. If, for arguments sake, I.hate.password. had a collision with another random password like kag63!gskfh-$93+"ja the odds of the collision password being cracked would be virtually non-existent. It's not a statistically probable occurrence to be worried about.

load more comments (1 replies)
[–] BorgDrone@lemmy.one 14 points 1 year ago (1 children)

You misunderstand the issue. The length of the password should not have any effect on the size of the database field. The fact that it apparently does is a huge red flag. You hash the password and store the hash in the db. For example, a sha256 hash is always 32 bytes long, no matter how much data you feed into it (btw, don’t use sha256 to hash passwords, it was just an example. It’s not a suitable password hashing algorithm as it’s not slow enough).

[–] tdawg@lemmy.world 4 points 1 year ago

ur absolutely right. Idk why I was thinking about it like a normal text/char field

load more comments (2 replies)
[–] baseless_discourse@mander.xyz 35 points 1 year ago (2 children)

I know this a a joke, but please use a password manager, it is such a game changer.

Bitwarden is free and E2E encrypted and if you want additonal feature, they only cost 10 bucks pre year. You can even use it with anonaddy to hide your email, which is also totally free and open source.

[–] nodiet@feddit.de 6 points 1 year ago (3 children)

What are those premium features? I never felt like I was missing something from the free bitwarden

[–] TheButtonJustSpins@infosec.pub 6 points 1 year ago (1 children)

You can have it generate 2FA TOTP.

2FA one time code was the reason I got premium (and obviously support FOSS project). It is a slight security downgrade, but a whole lot of QOL upgrade.

I also imagine hardware key support like yubikey would be very appealing for many.

[–] lea@mlem.lea.moe 5 points 1 year ago

yubikey/fido2 support is what I'd probably consider premium for

One of them is password sharing if I remember well.

[–] qaz@lemmy.world 6 points 1 year ago (1 children)

I’m already using Bitwarden but I hadn’t heard about anonaddy, thanks for the tip!

They work like a miracle together https://bitwarden.com/blog/add-privacy-and-security-using-email-aliases-with-bitwarden/

What is even more surprising is that even the free tire is perfectly usable, but consider to paying if you have the money to support them.

[–] justlookingfordragon@lemmy.world 23 points 1 year ago (3 children)

I know it's annoying that the password "doesn't match", but ... a 128 character limit?! I'd like to see THAT fully utilized lol.

(PS: the sentence above is exactly 128 characters, just for a comparison.)

...and I bet once you want to change it you get the "your new password can not be the old password" error message just because.

[–] Super_Stone@feddit.de 14 points 1 year ago (2 children)

An acquaintance of mine has a 36 characters long passcode for his tablet that he manually puts in every time he wants to use it.

And you can use password managers to make secure passwords without ever having to input them yourself.

[–] muzzle@lemmy.world 17 points 1 year ago (1 children)

That is a very good idea if you want to disincentivise yourself from using your tablet

[–] Super_Stone@feddit.de 6 points 1 year ago

He doesnt use it outside of school stuff and even then prefers to write things on paper, I dont think that he has to make disincentives.

I mean there is bitwarden, which literally can generate you strong random unique passwords for each site. Not really hard these days, I personally have unique one for every site but cap mine around 36 characters when generating passwords. Depends on the website tho.

[–] ThePantser@lemmy.world 3 points 1 year ago

My favorite was when I changed my password and they allowed different restrictions on the change password screen than they did when logging in. I changed my password to a 24 character one but log in screen only allows for max 16. I think they were truncating somewhere but I could not figure it out. Also could not change it again as it said it was incorrect.

[–] turbulentMagma@lemm.ee 21 points 1 year ago

One is clearly uppercase 'i' and the other lowercase 'L'

Those are L.hate… and i.hate…, am I seeing that correctly?

[–] Kolanaki@yiffit.net 12 points 1 year ago

This is even more infuriating than getting "password incorrect" going in and getting a recovery password, then trying to change passwords to the one you initially used and getting "new password can't be the same as old password."

[–] douglasg14b@lemmy.world 6 points 1 year ago (1 children)

Yikes.... This thread is a wasteland of misinformation and mininformers arguing with other mininformers about who's misinformation is less ill informed.

This thread is:

  • 50% technology illiteracy
  • 25% Dunning Kruger valley
  • 10% Actual knowledge
  • Everyone else just here for the ride
[–] Faulty@lemm.ee 9 points 1 year ago

This comment could just be copy-pasted to so many threads

[–] Snipe_AT@lemmy.atay.dev 5 points 1 year ago (1 children)
load more comments (1 replies)
[–] CanadaPlus@lemmy.sdf.org 4 points 1 year ago (2 children)

Is there a software gore community yet?

[–] Mannivu@feddit.it 4 points 1 year ago (1 children)
[–] CommunityLinkFixer@lemmings.world 6 points 1 year ago (1 children)

Hi there! Looks like you linked to a Lemmy community using a URL instead of its name, which doesn't work well for people on different instances. Try fixing it like this: !softwaregore@lemmy.world

[–] koinu@lemmy.world 3 points 1 year ago (4 children)

On the connect for lemmy app, it thinks it's a user lol.

load more comments (4 replies)
load more comments (1 replies)
load more comments
view more: next ›