![]() Individually, does that matter, eg if your ElReg account was hacked, used to post spam or offensive comments, and got deleted? You might have to become SchultTheSecond, round these parts. It is less secure than not using autofill. Is there anything wrong about the browser (Chrome) autofill method for low priority passwords (e.g. if you can't share any advice useful to a normal human being, don't bother. you shouldn't buy shit you moron." i mean really. "well i've never bought anything so i don t get burgled. Your dismissive, arrogant, miserable snarkiness is beyond counterproductive. ![]() Am not really on social media myself but for many it's crucial link to friends and family in world of increasing isolation. "sorry boss, I'm a tin foil hat so everytime i need to go to the bank i need 2 hours out of the office". In our not tiny town, lloyds has already shut, hshc is shortly to close too and if you can't drive what then? Rely on a once an hour bus to get to a branch in your lunch hour and be late back for work. Most people don't have multiple pcs including one that's never online and air gapped lots of people can't bank in person now as the branches are being shut down at increasing rate. why not just give up and withdraw from modern life entirely which is pretty much the next effect of what you are suggesting. an asterisk) into the alphabet itself only makes it 1/26th stronger. ![]() Starting with just an ordinary alphabet, a character added to password length would make the password 26 times stronger, while including a new character (e.g. (*) Human-rememberable passwords are WAY outside brute-force limits - just make sure they are LONG, not faff around with fancy characters in your potential alphabets. Like antivirus - the only program to run as SYSTEM, begin at startup, run for every user, intercept every possible file access on the entire machine, able to hide anything it does, not let itself get shut down, connect to the Internet, update itself automatically, and even nowadays run your firewall, decide what can get out or see packets, and what can come back in, often with remote-support tools built in. But still, in the end, if they're trying to be legitimate, what possible reason is there for LastPass to be controllable by a webpage?īoth of which are worse than just securing your machine (not letting people see you type your passwords), choosing sensible passwords (* long, not complex) and not running third-party software with access to EVERYTHING on your computer, including an explicit list of every password you've ever used, anywhere, ever. The fact that "" exposed this issue makes me think it was used by LastPass as some sort of backdoor (oh, I'm sure they'll claim it was a test server they never meant to be released to public). Plugin prompts user to fill fields.(important, especially for hidden fields!!!) But if that's the case, why/how does the plugin expose anything to a website? Shouldn' all data go from webpage to plugin? All the plugin has to do is fill out fields, right? What possible reason is there for even including functionality a web page can manipulate? I though LastPass was user encrypted, like even Last Pass couldn't unencrypt the data without your password. At least I uninstalled Gator when it moved to spamware (hey, I was a teenager).
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |