- cross-posted to:
- programmerhumor@lemmy.ml
- cross-posted to:
- programmerhumor@lemmy.ml
no factor authentication
They were called scriptkiddies back in the day
At least they had real intelligence, doing stuff like this is basically so stupid you’d be clinically braindead
Has the general discourse settled on a proper epithet for this new version?
“vibe coders” doesn’t feel derogatory enough.
Agreed, they’re getting off light. I’ve worked with people who felt the code, but werent always able to communicate their ideas. I’d say theyd fit the idea of vibe coding without ai.
The concept is taken, and doesn’t describe the intent well. How about “pseudocoders”.
“vibe coding” was supposed to be derogatory?
Yes. The original post that coined the term was using “vibe coding” to indicate how problematic it is to build software by generating code based on vague prompts.
But a lot of people didn’t read the entire post and just thought the term sounded cool and used it as if it was positive thing.
Now we’re seeing the negative impacts of vibe coding, just as the original post predicted. So it started as derogatory, somehow became something positive, but it’s going back to being derogatory again.
My point entirely. It’ll probably stick though. Ah well, I’m sure script kiddies were called far more derogatory things that didn’t stick either.
I will be honest, it took me a good while to figure out what’s wrong
Me too, but I woke up… Checks watch … 25 minutes ago, and I’m still pretty out of it.
Same. And I came here to comment exactly that.
I figured it out immediately. I came here to say that.
i’m ashamed to say that took me a while to figure out what was wrong mostly because i didn’t think someone would be that dumb.
You’re absolutely right! It doesn’t make sense to show the user the 2fa code! removes 2fa completely
Oh, I get it! You still want 2fa, you just don’t want the code to be shown! colors the text white
No, no, make it ultra secure and display none it, every website will be a database of important information, you just have to put everything into a hidden table!!
*Includes it in the URL
Font size 0
Oh you want the code not rendered into html!
Drops the code in javascript when it is received from the backend.Imagine breaking someone’s scraper with that change.
This could be vibe coding, or just an intern “doing the web site”.
Neither should have write access to production code.
i mean either one of those fucked up but it’s also on the qa/testing team and the deployment team that they let it GET to production.
O saved the ass of the company I worked for at software QA multiple times 🤭
Most of the time, it was just miscommunication between decision makers and devs and I had to explain to both why it is not working how it is now and that none of them is clearly to blame for the situation.
I still work for that company, but manage IT infrastructure now, but I am confident that my successor will still do good job, than unlike me, he has a proper education in programming, 😂 I was literally in vibe code state
(Thank you AI)
You mean the QA teams a lot of companies laid off because management decided the developers (and now AI) can just write all the automated tests?
Yeah we are shifting left! Engineers are now responsible for testing and QA can go fuck off I guess :(
If they have one.
This could also be a funny translation issue.
My bank sends a text message to me with the first code and a second code I enter.
They tell me the first code in a similar way so I can verify they sent it to me, then I enter the other code in the text.
That’s up there with: "You cannot use this password, it’s already in use by … "
But that’s so practical. Maybe I can contact them and ask them if we can swap. Haha
Assuming this is real, how the fuck do you fuck up so badly?
When I first added 2fa to page, I had a bug and made it do that to compare the values.
production or test, it’s likely debug code.
What!? It’s more user friendly this way. No need to make the user switch to a totally different device when you can tell them right here!
/s
(I hate pointing out sarcasm, but it’s better not to risk it these days.)
(you don’t need to apologise for using tone tags, they’re a useful accessibility tool and hurt nobody)
New intern
It took me way too long to figure out what was wrong with this screenshot
Yeah, same here. I was counting the boxes thinking they’d got the wrong amount of numbers.
I counted the boxes 3 times. :(
I need help. I don’t get it…
The “secret” code sent to your phone is spelled out in the text
No point sending the code to your phone when it’s displayed right there. The idea of doing this is making sure nobody has stolen your password, because they still need access to your phone before they can access your account.
SMS/email-based 2FA should die.
Luckily, you don’t even need to check SMS or input a valid number with the “verification” in the screenshot!
mission failed successfully
It’s wild how standard SMS is given how (relatively) trivial it is to exploit.
Even with autofilling it on iOS, macOS you still have developers that need to fuck with form fields using JavaScript because they think they’re smarter than you.
It’s better than nothing and some people would really struggle to do other types of 2FA.
I’ll be homest with you, some people really struggle with email 2fa. The amount of working Americans I have spoken with who don’t understand how to have two tabs open at once is genuinely frightening.
As a reset method it’s worse than having nothing
What’s the best alternative?
App based 2FA is better. Either the app generates a time based code that you enter into the site or the site sends a push notification to the app asking you to verify the login attempt.
Passkeys are good too as they replace the password completely and leave the 2FA part to the device.
Passkey or notification please. So sick of entering these codes on a daily basis.
If it’s alright with your threat model, you can put the time-based OTPs into your password manager of choice, like Bitwarden. Upon filling your username and password, it places your OTP in your clipboard, so that you can simply paste it in. This does of course reduce the security of the system slightly, since you centralize your passwords and your OTPs. When opting for this method, it is therefore imperative to protect your password manager even more, like via setting up 2FA for the password manager itself or making sure your account gets locked after something like 10 minutes of inactivity. The usability aspect is improved by using a yubikey or another similar physical key technology.
Very good point. I have Bitwarden set up as a passkey for at least one account. I should remove that. 👍
Well, they’re not a bad thing per se, it’s just important to remember that by doing that you are essentially delegating the access security (including any means of MFA) from the target website to the password manager. I.e., instead of inputting password and 2FA code for example.com, you have to input your password and 2FA code for the password manager itself. This has the same security guarantees, so long as you don’t set your vault to—for example—never lock automatically.
For the case of passkeys, using Bitwarden, even with 2FA does reduce the security level in my eyes somewhat, since I’d argue passkeys to be a more secure measure than password + OTP. Unless, of course, you use a different passkey to authenticate yourself to Bitwarden.
TLDR; be careful about putting everything inside Bitwarden. You’ll be fine if you make sure to protect your password manager adequately, but if you put OTP secrets (or passkeys) for other website inside Bitwarden AND only use password authentication for Bitwarden without any MFA, then you are effectively reducing your MFA back to a single factor (the Bitwarden password).
I’m afraid user authentication on the internet is broken beyond salvation. It’s already complex enough to grasp fully for tech-savvy people, meanwhile we’ve taught the general population to use password123 for all their accounts and write it on a post-it for a good measure.
I just save the cookies tbh
Aren’t cookies invalidated after a while anyway? Doesn’t seem viable to me.
After some time, yeah. Depends on the site.
And the browser saves those cookies for you, right? Throws them out when they expire.
Okay, but then you have to develop an app
You don’t for the one time codes because there is a standard that is supported by many authenticator apps.
TOTP, FIDO2 or not worrying about logins and just using {GitHub,Google,Microsoft,selfhosted.lan} as identity provider with OIDC
IIRC the screenshot in the tweet is from a shitpost in reddits r/badUIbattles
Feels like testing feature, hopefully the screenshot isn’t from production.
We test in production, silly.
Everyone has a test environment. Some are just lucky enough to have a separate production environment.
vs
It’s not like QA would’ve caught these problems before it went to production anyway
What QA? They were all fired over the pandemic and “replaced” with “ai”.
The zero to three people doing all the qa tasks for the 10 to Infinity developers before that never really got a chance to test anything beyond the basic “if this breaks were fucked” stuff anyway though, so it’s not like quality was ever a priority for the people in charge sucking up all the money.
It’s the only way to fly.
Sike! That’s the wrong number! /s
It’s spelled “psych”, as in you’re psyching them out.
It’s ok I’m oot of academia.
Nitpicking words like this makes me psich
Just delay accepting the numbers for 10 seconds to simulate the time needed to check SMS and type them.