Remix.run Logo
paxys 4 days ago

Yeah I know "everyone can be pwned" etc. but at this point if you are not using a password manager and still entering passwords on random websites whose domains don't match the official one then you have no business doing anything of value on the internet.

const_cast 4 days ago | parent | next [-]

This is true, but I've also run into legitimate password fields on different domains. Multiple times. The absolute worst offender is mobile app vs browser.

Why does the mobile app use a completely different domain? Who designed this thing?

djkoolaide 4 days ago | parent | prev | next [-]

Yeah, a password manager/autofill would have set off some alarms and likely prevented this, because the browser autofill would have detected a mismatch for the domain npmjs.help.

4ndrewl 3 days ago | parent | prev | next [-]

And I guess you can just withdraw your funding from him any time.

darkamaul 3 days ago | parent | prev | next [-]

I get the sentiment behind 'just use a password manager', but I don’t think victim-blaming should be the first reflex. Anyone can be targeted, and anyone can fail, even people who do 'everything right'.

Password managers themselves have had vulnerabilities, browser autofill can fail, and phishing can bypass even well-trained users if the attack is convincing enough.

Good hygiene (password managers, MFA, domain awareness) certainly reduces risk, but it doesn’t eliminate it. Framing security only as a matter of 'individual responsibility' ignores that attackers adapt, and that humans are not perfect computers. A healthier approach would be: encourage best practices, but also design systems that are resilient when users inevitably make mistakes.

Tarq0n 3 days ago | parent | prev | next [-]

Have you used a Microsoft product lately? So many bigco's publishing their org chart as login domains.

Drblessing 4 days ago | parent | prev [-]

How does someone intelligent with 2FA get pwned? Serious question.

Mawr 3 days ago | parent | next [-]

Thinking you're above getting pwned is often step one :)

It's not easy to be 100% vigilant 100% of the time against attacks deliberatly crafted to fall for them. All it takes is a single well crafted attack that strikes when you're tired and you're done.

odie5533 3 days ago | parent | prev [-]

Numbers game. Plenty of people got the email and deleted it. Only takes one person distracted and thinking "oh yeah my 2FA is pretty old" for them to get pwned.

CGamesPlay 3 days ago | parent | next [-]

(I think everyone in this comment chain already knows this, but) PSA: your 2FA does not "get old" and does not need to be rotated (unless the device YOU stored it on was compromised). "Rotate your 2FA periodically" is NOT recommended security advice.

pier25 3 days ago | parent | prev [-]

It's more than that. You need to log in, manually, into a new domain you've never used your password before.