this post was submitted on 13 Mar 2026
1157 points (98.2% liked)

Programmer Humor

30343 readers
1041 users here now

Welcome to Programmer Humor!

This is a place where you can post jokes, memes, humor, etc. related to programming!

For sharing awful code theres also Programming Horror.

Rules

founded 2 years ago
MODERATORS
top 50 comments
sorted by: hot top controversial new old
[–] kandoh@reddthat.com 3 points 3 hours ago (1 children)

Very few things on the internet and computer actually need accounts. Everything requiring a login is a cancer.

[–] teaHead74@programming.dev 2 points 1 hour ago

Yes and no in most cases it is used to limit misuse somewhat but i absolutely agree that its taking over hand. God bless trashmails.

[–] sanbdra@lemmy.world 4 points 5 hours ago

Password manager users living life on easy mode.

[–] JasonDJ@lemmy.zip 20 points 8 hours ago* (last edited 8 hours ago)

And then...

The password manager can't fill the form. You've got to change your 10-word, unique passphrase because it's 3 months old. And you have to verify with a text.

Oh and then you have to type it in on your TV with a remote and on-screen keyboard.

[–] Routhinator@startrek.website 12 points 9 hours ago (1 children)

Magic link is lazy 2fa.

Implement TOTP support, you lazy fucks.

[–] moseschrute@lemmy.world 1 points 39 minutes ago

What’s the 2nd factor? Email and what else?

[–] brbposting@sh.itjust.works 5 points 8 hours ago

But you know what’s the safest way for us to keep your password safe? Not asking for one to begin with. By not creating a password with us you have no risk of it leaking, and we don’t have to deal with the responsibility of keeping it secure. The sign in link is going to your email, which presumably is protected with two-factor authentication, if you have it set up (which you should!).

https://www.404media.co/we-dont-want-your-password-3/

They had a follow up later too (paywall)

[–] Korne127@lemmy.world 4 points 10 hours ago (4 children)

Magic link only is the wirst kind of login systems. However, I don’t know any big real companies that use this.
If you don’t like passwords, just use passkeys.

[–] ApertureUA@lemmy.today 6 points 9 hours ago

Slack (except when with SSO). You have to go out of your way to find the settings page outside of the client to set a password.

[–] lambalicious@lemmy.sdf.org 9 points 10 hours ago (2 children)

Wasn't passkeys basically "passwords, but Google has control of them"?

[–] SirEDCaLot@lemmy.today 2 points 5 hours ago

Not even close.

Passkey is a generic technology not specific to any vendor. While there are a few versions of it, the long story short is it uses an encryption key you have to authenticate you rather than a password. This makes phishing extremely difficult if not impossible.

There's lots of passkey implementations. All the major browsers have one built in with their included password managers. Most good password managers like BitWarden or 1Password also support pass keys. And if you want to be extra secure, the passkey can be an actual hardware token like a YubiKey.

So yeah you see Google pushing passkeys a lot, and if you use Google password manager it will store your pass keys. But you also see Apple pushing it, and Microsoft also.

[–] nibbler@discuss.tchncs.de 7 points 9 hours ago (2 children)

dont think so. what i gatherd passkeys is a public/private key scheme, much like pubkey auth in ssh logins.

[–] BCsven@lemmy.ca 1 points 9 hours ago (2 children)

Its still just a single factor if some body steals your private key.

[–] nibbler@discuss.tchncs.de 1 points 6 hours ago (1 children)

Its never transmitted, can be stored in HSMs. Anything that's handled wrong is unsafe

[–] BCsven@lemmy.ca 1 points 5 hours ago

Steals it from your system I meant. Which has even happened to security pros.

[–] Gt5@lemmy.zip 2 points 8 hours ago (1 children)

Yes, buts it’s not something that can be easily guessed or found on a post it on the monitor

[–] BCsven@lemmy.ca 1 points 6 hours ago

True dat. But if they compromise your computer the first thing the look for is key files.

Like my ssh keys are in a root permission file. Protected from general sight, but if somebody compromises my PC with a CVE on then goodbye keys.

At least with hardware key it is removable and requires a button press.

So accessing becomes physical access or quantum computer cracking

[–] tribut 3 points 10 hours ago

Booking.com (at least in Germany) only useagic links for some time now. I hate it.

[–] resting_parrot@sh.itjust.works 1 points 10 hours ago

Home depot does

[–] TheObviousSolution@lemmy.ca 4 points 13 hours ago* (last edited 13 hours ago) (6 children)

On the other end, there is an excessive use of 2FA with systems for whom the concept of SSO seems to be a foreign thing. It's also sort of funny that 2FA can just mean using a TOTP capable password manager, reverting it back to one factor.

[–] Fiery@lemmy.dbzer0.com 14 points 10 hours ago (2 children)

It's not actually reduced to one factor, just a single point of failure. If their password manager gets taken it's a problem, however the generated TOTP is worthless in 1 min. So this will protect the login from cases where the password is known like a compromised website or a reused password.

[–] TheObviousSolution@lemmy.ca 2 points 7 hours ago* (last edited 7 hours ago) (1 children)

If the site is compromised, then the hackers could have stolen the TOTP secrets as well as the passwords. How do you think the site verifies TOTP codes? If you reuse passwords while using a password manager, you are asking for it, though.

[–] Fiery@lemmy.dbzer0.com 1 points 7 hours ago* (last edited 7 hours ago) (1 children)

A full hack of every part of the service is not the only way a user's password could get known to an attacker. Could be MiTM, could be typo-squatted, etc

If a site is that compromised no measure of auth is gonna help, so little use worrying about it.

[–] TheObviousSolution@lemmy.ca 1 points 7 hours ago* (last edited 6 hours ago)

A lot of the technology you use to connect over VPNs or over the Internet already addresses MitM. If it's typo-squatted, you are sort of using password managers wrong. You do have the option of setting up TOTP elsewhere like on your phone authenticator so the point of failure isn't on your side, I just think it's sort of funny how easily you can make it be one.

[–] Coleslaw4145@lemmy.world 1 points 10 hours ago* (last edited 10 hours ago) (2 children)

But if a password manager is compromised then doesn't the attacker also get the TOTP key which is what generates the codes in the first place?

It wouldn't matter if it expires in one minute because they'll have the token to generate the next code, as well as now knowing the password.

[–] Fiery@lemmy.dbzer0.com 7 points 9 hours ago (1 children)

That makes it a single point of failure yes, and the rest of the comment you're replying to goes into detail on what it does protect from even if both passwd and TOTP are in the password manager

[–] Coleslaw4145@lemmy.world 3 points 9 hours ago

Sorry i misunderstood what you were saying. I thought you were saying that if the password manager was compromised then the attackers would have only 1 minute to make use of the tokens before they change.

[–] JcbAzPx@lemmy.world 1 points 6 hours ago

That depends on the manager. Good ones won't have access to your stuff outside of an encrypted blob. Still, it's generally better to use a separate authenticator.

load more comments (5 replies)
load more comments
view more: next ›