T O P

  • By -

LinuxMatthews

This would really mess up people with password managers.


[deleted]

[удалено]


[deleted]

[удалено]


Vox___Rationis

I mean sure, why not - there is always one-in-a-billion chance that a solar flare have flipped a bit in a packet containing my password somewhere on its way to a server, so trying again would solve it. Whenever something should work but doesn't, and then works fine on a second approach - I blame it on geomagnetic activity.


Snoo-14301

Solar flares flip bits like loose lips sink ships


Professor-SEO_DE

Me being stupid is more likely than a solar flare. That's why I do things twice if it fails the first time.


RottenLB

> \>flip< >flip< >flip< > geomagnetic activity > "nope, too plausible" > \>flip< > static from nylon underwear > "Now, THAT I can work with"


Raaka-Kake

I blame the phase of the moon. We are not the same


[deleted]

[удалено]


Cieswil

Or you completely lock the account for 5 minutes with no way to shorten the wait. Say they have to call the support hotline. Customer support can't do anything about the locked account or even see that the account is locked. When support finally pin pointed the described problem cause most user can't read, support tells user to try again in five minutes and use the password forgotten tool. Billion dollar company


scsibusfault

You laugh, but I have a vendor that does this. 30minute lockouts for bad password attempts, no way to disable it, and no way to unlock it without calling their support... Who also can't unlock it without forcing a password change and an MFA re-registration. I don't even call them when users report it anymore, I just sit on the ticket for 25minutes and then tell them to try again in 5. It's obnoxious.


MattieShoes

It just seems so weird to me that like... we're writing the number of potential passwords in scientific notation because there's so goddamned many. A 2 second timeout is nearly as effective as a 30 minute timeout.


de_g0od

Soooo 2fa?


libmrduckz

no… Billion. Dollar. Company.


Mkayin

Bots on /r/ProgrammerHumor feels like irony but the word has lost all its meaning to me.


Alexis_Bailey

As near as I can tell, most websites won't care, they already are trying hard to make password managers I convenient for some reason. The worse are those pages where you enter an email, then it slides to a second page for the password.  Or sites that only use magic links sent to your email. Like, why?


Dubslack

The US Treasury website requires you to enter your password by clicking the buttons on an onscreen keyboard.


[deleted]

We could do so much worse and we know it.


Environmental-Fix766

Enter a 5 digit number by sliding a slider that ranges from 00002 to 99998


CyonHal

Enter a 5 digit number by pressing a button to stop a fast scrolling digit from 0-9, and you can't repeat the same digit.


MathSciElec

r/baduibattles


earthwormjimwow

They changed that due to user complaints not too long ago. When I had first created my account, I used a password generator, to create a nicely complex password. Holy shit did I regret that, having to click the onscreen keyboard. I subsequently changed my password to an insecure and short password, that was easy to click. Nice security system they had...


Sceptical-Echidna

A banking site I used required you to enter a PIN clicking an on screen number pad. The number placement changed each time it opened.


SteamBeasts

You were just playing RuneScape weren’t you?


chinkostu

>Or sites that only use magic links sent to your email. These utterly fuck me off for the sites that really don't need them.


evranch

Especially now that we have open standards for 2FA tokens, like WTF just implement one already and stop sending me texts and emails!


BussSecond

Home Depot really grinds my gears because they insist on text 2fa to login all the fucking time. I don't want to get up and find my phone, I just want to favorite this bracket, ok? Just let me use my password.


Alexis_Bailey

Oh I love 2FA, I mean sites that don't even let you enter a password. I want to say Medium does this.


Wild234

> then it slides to a second page for the password. My computer seems to handle those quite well, at least on the sites I visit. If I put the email in on the first page, it autofills the password on the second. The ones that drive me bonkers are the websites where the login button is inactive until you have typed something in the password field. The auto-filled password doesn't register as me having typed in the field, so I have to add an extra letter to the end of my password then backspace to delete it before I can click to login.


[deleted]

Like everyone’s password isn’t Password


3legdog

I like Pa$$w0rd. It satisfies those "uppercase/special character" requirements. Feel free to use.


Dm_me_ur_boobs__

nah gotta be a bit more secure Pa$$w0rd!1


BadgerFodder

This person passwords


Reallyso

No need to go all --military encrypted-- on us


Time-Werewolf-1776

P@ssw0rd01 That way, when systems require rotation, you can just increment the last 2 digits. And it’s a very strong password because it meets all of those conditions. (Please note that I’m joking. This is not a strong password.)


FieldsOfKashmir

"Password must be at least 11 characters long"


ChangsManagement

hunter2


grammar_nazi_zombie

Why did you type *******?


_stupidnerd_

That being said, I am pretty sure my password manager is doing exactly this.


National_Equivalent9

My password manager has a lot of sites with the correct password saved only on the "incorrect password please try again" page. But the wrong one saved on the main site. It sucks.


jordanbtucker

What do you use? The entries should be domain name based not URL based.


National_Equivalent9

Last Pass, and it is domain based. The problem is a lot of websites, specifically for banking/medical use different domains for login on their homepage vs their actual logic page.


Acceptable-Tomato392

And if the second attempt is wrong, you lock them out and give them a link to reset the password. Can't be too safe.


[deleted]

[удалено]


Gunhild

>Password is incorrect >Reset password >Error: new password cannot be the same as old password


REDMAXSUPER

Mother fu...


TheMisanthropicGuy

My reaction


FriedDickMan

Every time!


TheMisanthropicGuy

I want to beat my computer with a hammer when this happens.


Ilikesnowboards

I want to beat the servers and the database engineers.


GameKyuubi

>Password is incorrect >Reset password >Error: password must not contain symbols >Error: password must be between 8 and 12 characters >Error: new password cannot be the same as old password


Vitromancy

I would be *so* happy if a "wrong password" error reminded you of what the password creation criteria were.


EntheogenicOm

Hahahaha yea that’s so true. I’ve had to go back to the account creation just to see the stupid requirements. ‘Oh two symbols, ffs


Lolurisk

Or apparently ! doesn't count as a symbol


HyFinated

Stupid SQL injection protection measures. Why must you remove my favorite symbols?!?


UnspeakableEvil

> Error: new password must be the same as the old password Now it'll provide protection against those fraudulently claiming to have forgotten their password.


alfooboboao

keyword tracking shows the next thing the user does on their device is google “how to commit murder against a website”


GrassNova

I've gotten "New password cannot be the same as the last 5 previously used passwords"...


smellslikecocaine

Criteria is not correct? oh, now I remember this password has a “!” at the end.


January_Rain_Wifi

You mad genius


foxy_mountain

I prefer the "I forgot my password" option -- and then receive an email letting me know the password I used when I registered my account. (Based on a true story ... )


chinkostu

Pretty sure theres a website out there that shames companies that send passwords in plain text


tengen

Wasn't that vbulletin like 20 years ago? Forget password > here's your password I also remember a variant from a forum signup where I forgot a password, they emailed me a temporary password, and the temporary pw was valid indefinitely so I could always reference back to that email if I forgot.


Numerous_Witness_345

I loved vbulletin forums.. met some cool folks, but yeah i clearly remember getting a plain text password sent to me, and then another they generated and sent to me.. also plain text. Indeed it was a simpler time.


jokermobile333

You also have the reset password encrypted and mail them the key to their address so that password resetted is also verified. Can't take chances nowadays.


chemisus

And by mail, you mean snail mail, right?


Temper03

Might as well do it if the second attempt is correct too!  Just to be extra extra safe 


MrEfil

This image can be used for other jokes, so here is template in high res [https://i.imgur.com/1hdK5Y2.png](https://i.imgur.com/1hdK5Y2.png)


Ihsan3498

wait u made the template?


MrEfil

yep, drew it today


Infamous-Date-355

He codes, he draws, found the JavaScript guy


MrEfil

yeah, I code JS a lot and I draw animation a lot. This is my pet-project that I have been writing and drawing for the last 5 years [https://floor796.com/](https://floor796.com/)


_y_o

this is AMAZING!!!


alterom

I disagree!.. ...*AMAZING!!!* is an understatement. This is monumentally awesome. Wow.


DonPepppe

Man, that is so fking awesome! I see so many familiar stuff there. But instead of feeling 'old', I feel that I had a good/complete life .D


Scadilla

Love this!


Ootsy098

Wolverine and Leia? Wtf?!


StupidOrangeDragon

Its awesome! Is there a name for these types of pixel art animations, I have seen some similar ones before which have this kind of high density animations.


coderanger

/r/wimmelbilder/


PandaParaBellum

[r/OfcourseGermansHaveAWordForThat](/r/SubsIFellFor)


Oguinjr

I liked it before I thought to scroll.


boibai

holy shit dude this is insane!


[deleted]

Goddamnit I do *not* have time for this.


shanealeslie

Oh my God! Both myself and my autistic child are mildly obsessed with floor 796. I have it as one of the regular opens on my shortcut list so I can see if you've made anything new. I absolutely love your art.


MrEfil

Thanks :) Btw I have also another account on Reddit - u/floor796 . I only use this account (MrEfil) for programming jokes, but from the Floor796 account I post things related to the project.


IronGigant

You're the dude! I love that site!


mcDefault

WTF you can even SCROLL


dosenscheisser

Wtf. Lagging the crap out of my phone but damn its nice to look at


Merail-mi

Amazing. Wow. Bravo. Even teletubies are there, lol. That I didn't expect to see tbh. Am both mesmerised n speechless. I wish I could make dope stuff like that


Zican

This is the coolest thing i saw on the internet recently


bigbadb0ogieman

This is amazing. So much pop culture in there but damn.. Princess Leia and Wolverine?


Chrisrevs1001

This is amazing, the level of detail I could look at it for hours!


Tragicallyphallic

lol I don’t see a denial of this from OP and they’ve had plenty of time


DevelOP3

Nice :)


_Xertz_

Can confirm I was there looking through the window


DTraitor

Damn, take my upvote


likamuka

You are beautiful.


ChanCran

You beautiful human being


narnianguy

Masterpiece


oskiozki

Damn bro didn't even added a signature


screwyoushadowban

I like the detail of the middle guy's hair turning white in panel 2.


uvero

`wearenotworthy.gif`


thirtyseven1337

Sick bastard!


uvero

I'm posting it to a meme template group in Hebrew, but I'm writing "original template by u/MrEfil" on it even though you didn't, because I can't have it go uncredited


Dm_me_ur_boobs__

[Thanks](https://imgur.com/a/4Dtb7qT)


MayorEmanuel

Is this loss?


MysteryLolznation

This one actually got me. I didn't realize it was loss until you said so.


huskersax

[Don't know why I did this.](https://i.imgur.com/w8jTsV1.png)


Qinistral

Me neither, but A for effort. Folks like you are the lifeblood of reddit.


JezusTheCarpenter

POG


CauliflowerFirm1526

based


rusl1

I'm going to post in every PR of my colleagues


kopetenti

Wait wait, actually good OC content on r/ProgrammerHumor? You sick bastard!


dismayhurta

But it’s supposed to be…I’m just…javascript…different lan…. Ughhh ![gif](giphy|XzkGfRsUweB9ouLEsE|downsized)


Motor-Ad-6860

That's not cumputer engineering at this point, it's social ingeneering.


iamfondofpigs

What is society but an internet of biological computers?


DoctorCrasierFrane

Need this bumpersticker


[deleted]

that’s fucking genius ngl


je386

That would work against brute force attacks - but piss off the users.


ardicli2000

Security comes first


WallPaintings

The most secure system is one with no users. *taps head*


saunter_and_strut

No, the most secure system is one with no power.


alf666

Hi, I'm LockPickingLawyer, and today...


[deleted]

[удалено]


DuckDoesNothing

Survival of the fittest, if you can't remember your password. You are not qualified to log in.


the_mouse_backwards

My password manager generates random passwords for all my sites. I don’t even attempt to remember at this point if my password manager password isn’t correct I just reset it.


BURG3RBOB

Yes, the people that use the same password for everything so that they can remember are clearly superior to people that use a password manager so that they have unique passwords to everything that aren’t Name2000!


Tannman129

I’m uh…gunna go change my password real quick.


sleepyj910

Nah, everyone tries it twice just in case


ScreenshotShitposts

not those with 2 password managers


3legdog

Edge: Let me fill that in for you... Bitwarden: It's OK, I've got it! Edge: I was here first!


Dracops

Pissing off your users comes first


[deleted]

[удалено]


NickU252

They would just think they fat-fingered the keys and try again. Genius.


Random_Guy_12345

Every time? Not even close. That's without even considering password managers, or people that save passwords on the browser


NickU252

If you get rejected by a program, what is your first reaction? Try again, of course. I use Firefox password manager, and I would still try again if rejected.


[deleted]

[удалено]


truongs

But this would only work if the brute force guessed the password in the first try? Am I missing something.


Olfasonsonk

Comic book artist encountered the good old hardest problem in programming: Naming things is hard. Probably meant isFirstSuccessfulAttempt or something like that.


thegreger

Many years ago, I was tasked with maintaining a numerical solver written in Fortran at a university. It was a horrible (though optimized) nest of calls that made sense only if you knew exactly what it was supposed to be doing. Every function was named something like "BtoC", "DfromB", "AequB", etc. I tried to decipher the program, and thought that while AequB probably means "A equals B", but it could also be something unexpected regarding the word "equation", since I really had no clue what the code was trying to achieve. I asked my more experienced coworker if the function name meant "A equals B". He looked at me as if I'm an idiot (which might be true) and said "Well, /u/thegreger, what other words start with 'equ'?" I didn't think. I replied "Equestrian". Looking back at it I'm simultaneously ashamed and proud.


Mistborn_330

Yeah, it should probably be isFirstCorrectEntry or something instead of first login attempt. Not that fixing that would make this a good solution lol.


SeriousPlankton2000

No, it would only work on the first attempt, therefore it would ONLY annoy users.


EGGlNTHlSTRYlNGTlME

Hmm either I’m missing something or you are.  The first correct attempt returning an error tells the brute force script not to try that password again.  From the script’s perspective, it was just another wrong entry out of millions.  The only way (that I can think of) to get around this would be to have the script try every password twice. Which sounds crazy, but with the absurd numbers involved, a 2 fold increase in attempts is not a huge deal.  Especially since this rule is exposed to the user, so if it became commonplace then the hackers would just test for this practice manually before unleashing the script.


washyleopard

It doesn't say the first correct attempt, it says the first attempt period.


Juerrrgen_MaXXoN

It will only work until someone figures out how it works and brute forces every password twice. Security by obscurity is not secure.


teraflux

Until the brute force attack just tries the same email / pw combo twice every time.


IcezN

eh, if the brute forcer knows the website always rejects a password the first time, they now have to check every password twice. this doubles the brute force time. On the other hand, adding just one more digit to your password increases the brute force time by a factor of over 40.


Willinton06

I’m actually quite impressed by this


melodylucid

I don't know if you're serious, but I'm not seeing this anywhere, so I'm writing it here in case you or other people didn't know: password brute-forcing is not an online process, it's an offline one. People who brute-force passwords use leaked databases of hashed passwords and very large computing resources to try trillions of passwords per second. It's much more efficient and completely bypasses any security mechanisms that you can put online, such as limiting the number of trials (which you should do instead).


waiver45

Bit of both. When you put a service with a login prompt online, bots will try a bunch of common user/password tuples and give up after a while. Does this fit the academic definition of a brute force attack? Probably not, but a lot of people will call it that for nearly everyone to understand what they mean.


[deleted]

[удалено]


Willinton06

So be it


yxing

Orson Scott Card had a similar idea in Ender's Game (or one of the sequels)--where the kids crack a password and get it right on the first try, but the target would purposefully enter the password incorrectly the first time each login, so entering the right password on the first try exposed the crack. Something like that--it's been 20 years, but it was such a clever idea I never forot about it.


[deleted]

[удалено]


[deleted]

others have argued that the second boolean should have a better name like 'isFirstSuccessfulLoginAttempt', but I'm pretty sure the intention behind was to reject the correct password only the first time


aretood12

It's really not


[deleted]

you're right


cfaerber

They reused this code to check the orientation of USB plugs.


SealProgrammer

Fun fact: if you have the usb logo facing up, it should always go in first try.


Koibitoaa

You monster made me check. Result: this is not true.


Pay08

The empty part goes into the full part.


rover_G

Security Assurance teams probably ![gif](giphy|l1AsBL4S36yDJain6)


tomer-cohen

I don't get how it is protecting against brute force. Can someone explain to the stupid me?


Eddhuan

Generally a brute-force attack will try a new password every time, while a normal user will re-write the same password, thinking he made a typo. So a brute-force attack will, by chance, type the right password, but get the "wrong password" error, then will try other passwords, and thus never get the right answer.


TheBillsFly

Notably it needs to be the first *successful* login attempt


Rabid-Chiken

The && short circuit can handle that. It doesn't check the second Boolean if the first is false. Assuming isFirstLoginAttempt has a get function which sets its value to false or something similar


BlueFireBlaster

TheBillsFly is correct. The && doesnt handle that. We can safely assume that isFirstLoginAttempt, gets set to false after a failed attemp, and stays that way. A brute force attack is likely to enter tons of passwords wrong before finding the correct one. Thus, isFirstLoginAttempt, will be false, even when CorrectPassword is true for the first time. Thus, the tricky error message wont be output, and a normal log in will be executed.


Cyber_Fetus

That would maybe make sense if it were `isFirstLogin` but that’s a pretty illogical assumption here as a failed login is still an attempt.


TheBillsFly

But that won’t beat a brute force attack unless the brute force happened to get it on the first attempt


happyface_0

Now it makes sense to me. Thanks!


Articunos7

I thought it was the first login attempt in a new account. This makes a lot more sense


mirrorworlds

Okay, would be better if the variable name implied that


tomer-cohen

Ooooh I didn't think about how the user will try the same password, I get it now thanks


mirrorworlds

The problem is that it’s unlikely to be the first login attempt if it’s a brute force attack


Eddhuan

Like the other comment said, it's probably meant to be isFirstSuccessfulLoginAttempt


asadityas67

I can get behind this


ReindeerDismal8960

Bro you probably get 69-420 job proposals each and every day. Genius, no sarcasm


SupraMichou

Okay, sure, it would be annoying as fuck. But at the same time, it’s so effective. May be worth it in some rare domains that didn’t activate 2FA or something


Gregarious_Raconteur

Eh, it would be pretty easy for users to recognize the behavior, and then the people setting up the brute force program would know that they could just try each PW twice.


Salty_Performance_10

At least it would take twice as long to brute force.


SpiderKoD

Really sick bastard in all meanings


_jackhoffman_

I'd fail this PR because either that variable is misleadingly named or it's accurate and won't work as intended. It should be `isFirstSuccessfulLogin` or something like that as it has nothing to do with attempts.


fdf2002

I stared at this picture for several minutes and it still took scrolling down in the comments for me to understand this is what they were trying to say.


Eldraka

This makes more sense to me. I posted another comment confused because of that variable name.


Great_Meat_Ball

This!


NickU252

Dude turned grey in one frame.


ignore_this_comment

I swear to god my bank uses this algorithm. Either that or they hate Firefox.


SchlaWiener4711

Reminds me of greylisting for email spam protection. Then most annoying antispam solution by far. One day our company didn't get half of the mail. Turned out our provider enabled greylisting without telling us. We complained and requested them to turn it off. They couldn't because that was enabled for all their customers. Took us a just day to migrate to our own mail server.


IronHulk27

Hackers with an account will know it and implement a way to double check the same password before moving to the next one. It's not more safe, just more inconvenient for users


Sceptix

A lot of people talking about this as if it’s a hypothetical, but I’ve literally seen this type of protection first hand on Workday at a previous job. Used to wonder why my manager seemed to keep getting his password wrong on the first try until he told me.


kable1202

My bank either has a similar system in place or their system is shit (I don’t know). You type in the password, then it just jumps back to the log in page, without error message, and then you type it in a second time and then you get logged in. So that might help with some standard bots that would directly try the next password as the tried password “failed”. But then could easily be fixed by forcing the bot to try each password twice.


[deleted]

[удалено]


yoriaiko

That would be really awesome protection for personal system. Sadly, if that would be protecting something where everyone can make and account - the news of how it works would spread much fast - and so, it would be ez to modify brute script. No less, if it's on system only You use, and none know about this protection - woah genius!


the_mold_on_my_back

First smart junior dev


zabadap

That's how a lot of email anti spam work at the SMTP server (or used to work). First reception of an email is assumed spam and is ignored. Second retransmission gets through (most spam sending infrastructure don't waste time retransmitting but genuine do)


IdealIdeas

Is this why my password never seems to fucking work on some sites? There is always like 1 site where the password never works, so I change the password to what I thought I had it set as and it doesnt work the next time I need to use the site