Readit News logoReadit News
smallerfish commented on Emailing a one-time code is worse than passwords   blog.danielh.cc/blog/pass... · Posted by u/max__dev
johncolanduoni · 18 days ago
So we need to make a new open standard, and then somehow prevent Google from implementing it? Too badly they implemented TOTP too. I’m not sure what you’re proposing here.
smallerfish · 18 days ago
Did you see a proposal? I'm merely pointing out that there's disasterously poor UX lurking in the #1 platform that users may encounter passkeys in. It's not ready to send out to normies without more work on it.
smallerfish commented on Emailing a one-time code is worse than passwords   blog.danielh.cc/blog/pass... · Posted by u/max__dev
johncolanduoni · 19 days ago
Apple’s works fine, including when I’m logging on to my windows machine. Opening the camera app is a little annoying, but I don’t have to do it frequently. 1Password works well too and it runs on everything. There’s open source options, but I can’t attest to their UX.
smallerfish · 19 days ago
That's fine, but Chrome has 67% market share, and the majority of people will pick the default option for passkeys if prompted. For passkeys to replace passwords it's got to be seamless and easily recoverable without compromising security.
smallerfish commented on Emailing a one-time code is worse than passwords   blog.danielh.cc/blog/pass... · Posted by u/max__dev
DecoPerson · 19 days ago
The attack pattern is:

1) User goes to BAD website and signs up.

2) BAD website says “We’ve sent you an email, please enter the 6-digit code! The email will come from GOOD, as they are our sign-in partner.”

3) BAD’s bots start a “Sign in with email one-time code” flow on the GOOD website using the user’s email.

4) GOOD sends a one-time login code email to the user’s email address.

5) The user is very likely to trust this email, because it’s from GOOD, and why would GOOD send it if it’s not a proper login?

6) User enters code into BAD’s website.

7) BAD uses code to login to GOOD’s website as the user. BAD now has full access to the user’s GOOD account.

This is why “email me a one-time code” is one of the worst authentication flows for phishing. It’s just so hard to stop users from making this mistake.

“Click a link in the email” is a tiny bit better because it takes the user straight to the GOOD website, and passing that link to BAD is more tedious and therefore more suspicious. However, if some popular email service suddenly decides your login emails or the login link within should be blocked, then suddenly many of your users cannot login.

Passkeys is the way to go. Password manager support for passkeys is getting really good. And I assure you, all passkeys being lost when a user loses their phone is far, far better than what’s been happening with passwords. I’d rather granny needs to visit the bank to get access to her account again, than someone phishes her and steals all her money.

smallerfish · 19 days ago
> Passkeys is the way to go. Password manager support for passkeys is getting really good.

I set up a passkey for github at some point, and apparently saved it in Chrome. When I try to "use passkey for auth" with github, I get a popup from Chrome asking me to enter my google password manager's pin. I don't know what that pin is. I have no way of resetting that pin - there's nothing about the pin in my google profile, password manager page, security settings, etc.

smallerfish commented on Emailing a one-time code is worse than passwords   blog.danielh.cc/blog/pass... · Posted by u/max__dev
DecoPerson · 19 days ago
The attack pattern is:

1) User goes to BAD website and signs up.

2) BAD website says “We’ve sent you an email, please enter the 6-digit code! The email will come from GOOD, as they are our sign-in partner.”

3) BAD’s bots start a “Sign in with email one-time code” flow on the GOOD website using the user’s email.

4) GOOD sends a one-time login code email to the user’s email address.

5) The user is very likely to trust this email, because it’s from GOOD, and why would GOOD send it if it’s not a proper login?

6) User enters code into BAD’s website.

7) BAD uses code to login to GOOD’s website as the user. BAD now has full access to the user’s GOOD account.

This is why “email me a one-time code” is one of the worst authentication flows for phishing. It’s just so hard to stop users from making this mistake.

“Click a link in the email” is a tiny bit better because it takes the user straight to the GOOD website, and passing that link to BAD is more tedious and therefore more suspicious. However, if some popular email service suddenly decides your login emails or the login link within should be blocked, then suddenly many of your users cannot login.

Passkeys is the way to go. Password manager support for passkeys is getting really good. And I assure you, all passkeys being lost when a user loses their phone is far, far better than what’s been happening with passwords. I’d rather granny needs to visit the bank to get access to her account again, than someone phishes her and steals all her money.

smallerfish · 19 days ago
But you could replace #2 with "Enter your password from GOOD, as they are our sign-in partner". I'm not in favor of emailing 6 digit codes either, but your scenario presupposes that users will be willing to trust that two services have intermingled their auth, and in that case their password can be wrangled from them too.
smallerfish commented on AI is propping up the US economy   bloodinthemachine.com/p/t... · Posted by u/mempko
spaceman_2020 · 20 days ago
At the moment, every AI service is dealing with capacity issues. Demand is much bigger than supply.

As long as that remains true, don't see how this bubble will be popped

smallerfish · 20 days ago
> As long as that remains true, don't see how this bubble will be popped

That's what everybody was saying in February 2000.

smallerfish commented on Monitor your security cameras with locally processed AI   frigate.video/... · Posted by u/zakki
smallerfish · 21 days ago
I run Frigate with 5 IP cameras (3 Hikvisions, 2 Amcrests) and 1 USB camera. I'm using a USB Coral TPU, which does a good enough job that Frigate can keep up with an average of only 30% CPU usage on an old Dell with 4 core i7-6700.

Frigate's better than anything else I tried, but not perfect. As mentioned in another thread, it has some issues with codecs from some cameras (playing clips from Amcrests is fine, Hikvisions not so much) and therefore you may need to transcode. Also it has no built in option for sending your recorded clips offsite; theoretically you could mirror its storage directory, but as far as I've found it's not organized in a way that you can separate just important events.

smallerfish commented on Monitor your security cameras with locally processed AI   frigate.video/... · Posted by u/zakki
chocolatkey · 21 days ago
I disagree regarding the choice of codec. Currently, I have no issues receiving, saving, and viewing H265 streams. Any modern CPU/GPU can handle them natively (I use a 2018 Intel CPU w/ QSV), any modern desktop or mobile device (I use both Android and iOS) can stream it, and the recorded video takes up less space. What are you using that requires transcoding?
smallerfish · 21 days ago
For Hikvision sourced cameras, previews and exports work, but you can't play clips without transcoding. Unfortunately I haven't found a transcoding option that doesn't completely swamp my CPU (with 3 cameras) so I'm living without ability to play clips right now.
smallerfish commented on Monitor your security cameras with locally processed AI   frigate.video/... · Posted by u/zakki
a3w · 21 days ago
Nearly an aside, but:

Why are people still installing security cameras that are monitored by them? They increase stress level and felt insecurity. They do not make you feel secure, say psychological studies. You probably think more about burglaries and dead spaces in your setup and actively monitor for these in your daily lives, where for 99.8 % of people this should be a non-topic.

If you want to install them for later police work, that still seems tedious and you might require off-site backup. In public places we often have CCTV of people, but unless you have number signs on vehicles, they seem to not help with conviction rates by much.

smallerfish · 21 days ago
We had a couple of minor break-ins in our neighborhood, and subsequently installed 3 very visible cameras along the neighborhood road (which is a dead end). No break-ins since.
smallerfish commented on New research finds that ivermectin could help control malaria transmission   ndm.ox.ac.uk/news/new-res... · Posted by u/rguiscard
ImHereToVote · 24 days ago
I believe it was a licensed MD who prescribed Ivermectin to him. It might be that we all have some parasites that worsen COVID immune reactions.
smallerfish · 24 days ago
Yes, and there are licensed MDs working for RFK specifically to demonize vaccines (while there are many other licensed MDs who see vaccines as being very positive and efficacious). A license doesn't make you right.
smallerfish commented on Our Farewell from Google Play   secuso.aifb.kit.edu/engli... · Posted by u/shakna
cnst · 25 days ago
> "Additionally, the app prevents devices from taking screenshots."

Why do the "security" apps ALWAYS have to have this anti-feature? It's especially annoying when employed by the banking apps.

Famously, Schwab had some issues where it didn't properly keep track of orders during highest loads (people ending up selling more shares than they had even in IRA accounts), yet conveniently they prevent users from taking screenshots of their app, so you wouldn't be able to prove that you did cancel or replace the order and did receive the cancel confirmation, before it executed anyways. Of course, if it's an IRA account, selling more shares than you own, is clearly Schwab's bug, but not being able to keep these things locally, is one of the biggest anti-features of modern apps.

smallerfish · 24 days ago
I've gone off Schwab big time over the past year.

a) I cancelled my "intelligent advisor" accounts (which was a pain to do by itself) and had the money xferred back into regular IRA accounts. After this was complete, I was no longer able to see any trade history for the past 12 years of those Intelligent Advisor accounts, *even though they were ostensibly backed by regular Schwab IRAs*, and my historical "wealth" tracking in Schwab made it look like I'd simply never had the $NNN^n that was in those accounts for that period of time, or in other words as if I'd added $NNN^n to my accounts on the day of the transfer. Definitely some hackery there. I had one Schwab rep who acknowledged this as a (rather severe) problem, but the other 3 I spoke to did not even understand why it was an issue.

b) For an example of their approach to data in general, take a look at their historical chart for the WEED ETF around the time of the reverse split in 2023, and compare it to how WEED themselves chart it, and how Fidelity charts it. Schwab's presentation of the price history isn't justifiable, and essentially omits information. (https://www.schwab.com/research/etfs/quotes/summary/weed, https://www.roundhillinvestments.com/etf/weed/, https://digital.fidelity.com/prgw/digital/research/quote/das...). Their support brushed this off.

u/smallerfish

KarmaCake day3625July 7, 2017
About
@dang approved 03/30/25 2:38 ET
View Original