asklemmy

This magazine is from a federated server and may be incomplete. Browse more on the original instance.

garbagebagel, in What is the name of your cleaning robot?

Ours is named Rachel because once a long time ago I had a dream that my bf cheated on me with someone named Rachel so now we always joke about Rachel doing things around our house when I’m not home. She’s been slacking a lot lately though, he’ll have to get a new girlfriend soon.

kalkulat, (edited ) in what is you're phone journey?
@kalkulat@lemmy.world avatar

I got a mobile phone because somebody gave me one. I can understand the price I paid for it after discovering all of the annoyances. OH the LUXURY!

WHY anyone puts up with the terrible hardware compromises, the terribly designed UIs, the shit software, the crappy audio, the constant charging, the security threats, the unregulated demands on our time, etc. etc. is beyond me.

I use one roughly once a week, ONLY because I found a really cheap plan. But then, I never needed to talk to someone while I was walking down the street - and if I just had to (never), there were public phones everywhere. A dime for unlimited local calls. No fear of dropping a phone booth. Or accidentally leaving the phone booth at the bar. And they had doors - so you could hear yourself think. Or change into your costume.

I suppose that back when beaverskin hats and buckboards were trendy, everyone just knew they had to have one. But oh, the price we’re paying.

ada,
@ada@lemmy.blahaj.zone avatar

I use mine for internet in my pocket, not for calling people

kalkulat,
@kalkulat@lemmy.world avatar

That makes the most sense … as a source of info, like a map, or nearby business locations, or quick advice.

If you don’t mind leaking your current position. (I wonder if cows’ eartags do that these days.)

ada,
@ada@lemmy.blahaj.zone avatar

I’m in a big capital city in Australia

CobolSailor, in What's an amusing thing to say before going under general anesthesia?

Saying I don’t consent to surgery isn’t the best thing to say. But gosh the the doctors face… priceless

stolid_agnostic,

Any professional would cancel the procedure at this point. Too much liability now.

dingus,

There are a lot of good ones out there, but this just seems like a stupid move tbh and a way to get your surgery cancelled

PrincessLeiasCat, in whats going on with the 'tankie' thing

Maybe it’s because I just woke up after only a few hours of sleep, but I have no idea what you just said.

livus,
@livus@kbin.social avatar

@PrincessLeiasCat the cliff notes version is "trololololol trolololol trolololol."

PrincessLeiasCat,

That would have been more pleasant to wake up to tbh

livus,
@livus@kbin.social avatar

@PrincessLeiasCat yeah, it actually is a surprisingly pleasant song.

BorgDrone, in what is you're phone journey?
  • Siemens C10
  • Siemens C35i
  • SonyEricsson S700
  • Nokia 6320 Classic
  • iPhone 3G
  • iPhone 4
  • iPhone 5S
  • iPhone 6S
  • iPhone X
  • iPhone 13 Pro
Cqrd, in Tech workers - what did your IT Security team do that made your life hell and had no practical benefit?

Often times you’ll find that the crazy things IT does are forced on them from higher ups that don’t know shit.

A common case of this is requiring password changes every x days, which is a practice that is known to actively make passwords worse.

dditty,

For our org, we are required to do this for our cybersecurity insurance plan

Natanael,

Tell them NIST now recommends against it so the insurance company is increasing your risks

Hobo,

The guideline is abundantly clear too with little room for interpretation:

5.1.1.1 Memorized Secret Authenticators

Verifiers SHOULD NOT impose other composition rules (e.g., requiring mixtures of different character types or prohibiting consecutively repeated characters) for memorized secrets. Verifiers SHOULD NOT require memorized secrets to be changed arbitrarily (e.g., periodically). However, verifiers SHALL force a change if there is evidence of compromise of the authenticator.

pages.nist.gov/800-63-3/sp800-63b.html

Krudler,

That’s super true, so many times to stay ISO compliant (I’m thinking about the lottery industry here), security policies need to align with other recommendations and best practices that are often insane.

But then there’s a difference between those things which at least we can rationalize WHY they exist… and then there’s gluing USB plugs shut because they read about it on slashdot and had a big paranoia. Lol

Ookami38,

So glad we opted for a longer password length, with fewer arbitrary limits, and expiry only after 2 years or a suspected breach.

xkforce,

The DOD was like this. And it wasn’t just that you had to change passwords every so often but the requirements for those passwords were egregious but at the same time changing 1 number or letter was enough to pass the password requirements.

dual_sport_dork,
@dual_sport_dork@lemmy.world avatar

Or it prompts people to just stick their “super secure password” with byzantine special character, numeral, and capital letter requirements to their monitor or under their keyboard, because they can’t be arsed to remember what nonsensical piece of shit they had to come up with this month just to make the damn machine happy and allow them to do their jobs.

BastingChemina,

Your coworkers put their password under the keyboard ? Mine just leave a post it on the side of the monitor.

SpaceNoodle, (edited )

I do this in protest of asinine password change rules.

Nobody’s gonna see it since my monitor is at home, but it’s the principle of the thing.

residentmarchant,

A truly dedicated enough attacker can and will look in your window! Or do fancier things like enable cameras on devices you put near your monitor

Not saying it’s likely, but writing passwords down is super unsafe

Krudler,

What you are describing is the equivalent of somebody breaking into your house so they can steal your house key.

curve_empty_buzz,

No, they’re breaking into your house to steal your work key. The LastPass breach was accomplished by hitting an employee’s personal, out of date, Plex server and then using it to compromise their work from home computer. Targeting a highly privileged employees personal technology is absolutely something threat actors do.

Krudler,

The point is if they’re going to get access to your PC it’s not going to be to turn on a webcam to see a sticky note on your monitor bezel. They’re gonna do other nefarious shit or keylog, etc.

residentmarchant,

Why keylog and pick up 10k random characters to sift through when the password they want is written down for them?

Rooty,

Again, how is the attacker going to see a piece of paper that is stuck to the side of the screen? This rule makes sense in high traffic areas, but in a private persons home? The attacker would also need to be a burglar.

Krudler,

It seems that some people are having trouble following the conversation and a basic stream of topical logic.

The initial premise was that somebody could see your passwords by pwning your machine… And using that to… Turn on webcam so they could steal your password so they could… pwn your machine?

Lol

Hobo,

Nope. The premise is they pwn ANOTHER, less secure, personal device and use the camera from the DIFFERENT device to pwn your work computer. For example, by silently installing Pegasus on some cocky “security is dumb lol” employee’s 5 year out-of-date iphone via text message while they’re sleeping, and use the camera from that phone to recon the password.

They probably wouldn’t want the $3.50 that person has in their bank account, but ransoming corporate data pays bank, and wire transfering from a corporate account pays even better! If you’re in a highly privileged position, or have access to execute financial transactions at a larger company, pwning a personal device isn’t outside of the threat model.

Most likely that threat model doesn’t apply to you, but perhaps at least put it under the keyboard out of plain sight?

Krudler,

Would you just stop.

Hobo,

I made one comment to you clarifying the other person’s point because you clearly didn’t understand what they were saying. Personally seen a couple of small companies fold because they were ransomed from a password on a post it. But you do you.

linearchaos,
@linearchaos@lemmy.world avatar

Forcing password expiration does cause people to make shittier passwords. But when their passwords are breached programitically or through social engineering They don’t just sit around valid for years on the dark web waiting for someone to buy them up.

Natanael,

NIST now recommends watching for suspicious activity and only force rotation when there’s risk of compromise

linearchaos,
@linearchaos@lemmy.world avatar

Tell me, can your users identify suspicious activity cuz mine sure as hell can’t.

Natanael,

That’s why password leak detection services exists

(And a rare few of them yes)

Cqrd,

This requirement forces people who can’t otherwise remember passwords to fall into patterns like (kid’s name)(season)(year), this is a very common password pattern for people who have to change passwords every 90 days or so. Breaching the password would expose the pattern and make it easy enough to guess based off of.

linearchaos,
@linearchaos@lemmy.world avatar

99% of password theft currently comes from phishing. Most of the people that get fished don’t have a freaking clue they got fished oh look the Microsoft site link didn’t work.

Complex passwords that never change don’t mean s*** when your users are willing to put them into a website.

linearchaos,
@linearchaos@lemmy.world avatar

It’s still not in a freaking list that they can run a programmatic attack against. People that give this answer sound like a f****** broken record I swear.

Cqrd,

Secops has been against this method of protection for many years now, I’d say you’re the outdated one here

linearchaos,
@linearchaos@lemmy.world avatar

Years ago phishing and 2fa breaches werent as pervasive. Since we can’t all go to pass key right now, nobody’s doing a damn thing about the phishing campaigns. Secops current method of protection is to pay companies that scan the dark web by the lists and offer up if your password’s been owned for a fee.

That’s a pretty s***** tactic to try to protect your users.

Cqrd, (edited )

We’re on the internet, you can say shit.

If your user is just using johnsmithfall2022 as their password and they update the season and year every time, it’s pretty easy for hackers to identify that pattern and correct it. This is not the solution and it actively makes life worse for everyone involved.

Natanael,

Password crackers says you’re wrong

linearchaos,
@linearchaos@lemmy.world avatar

No never minded people that think that all passwords are being cracked tell me I’m wrong. Lists emails and passwords grabbed from fishing attacks tell me the people that are too lazy to change their passwords and once in awhile don’t deserve the security.

glue_snorter,

I’m a native English speaker. I can’t understand your comment. I sense that you have a useful perspective, could you rephrase it so it’s understandable?

vagrantprodigy,

Even better is forcing changes every 30 or 60 days, and not allowing changes more than every week. Our users complain daily between those rules and the password requirements that they are too dumb to understand.

JigglySackles,

Password changes that frequent are shown to be ineffective, especially for the hassle. Complexity is a better protection method.

vagrantprodigy,

I’m aware. Apparently everyone who read my post has misread it. I’m saying that the requirements above are terrible, and they make my users complain constantly. Our security team constantly comes up with ways to increase security theater at the detriment of actual security.

JigglySackles,

Ahh my bad. That sounds like a sec team that needs a reality check.

kent_eh,

And in my company the password change policies are very different from one system to another. Some force a change monthly, some every 28 days, some every 90 days, and thwn there is rhat one legacy system that no longer has a functioning password change mechanism, so we can’t change passwords there if we wanted to.

And the different systems all want different password formats, have different re-use rules.

And, with all those uncoordinated passwords, they don’t allow password managers to be used on corporate machines, despite the training materials that the company makes us re-do every year recommending password managers…

Aceticon,

What I really love is mandatory length and character password policies so complex that together with such password change requirements that push people beyond what is humanly possible to memorize, so it all ends down written in post-its, the IT equivalent of having a spare key under a vase or the rug.

xubu,

I’m in IT security and I’m fighting this battle. I want to lessen the burden of passwords and arbitrary rotation is terrible.

I’ve ran into a number of issues at my company that would give me the approval to reduce the frequency of expired passwords

  • the company gets asked this question by other customers “do you have a password policy for your staff?” (that somehow includes an expiration frequency).
  • on-prem AD password complexity has some nice parts built in vs some terrible parts with no granularity. It’s a single check box in gpo that does way too much stuff. I’m also not going to write a custom password policy because I don’t have the skill set to do it correctly when we’re talking about AD, that’s nightmare inducing. (Looking at specops to help and already using Azure AD password protection in passive mode)
  • I think management is worried that a phishing event happens on a person with a static password and then unfairly conflating that to my argument of “can we just do two things: increase password length by 2 and decrease expiration frequency by 30 days”

At the end of the day, some of us in IT security want to do the right things based in common sense but we get stymied by management decisions and precedence. Hell, I’ve brought NIST 800-63B documentation with me to check every reason why they wouldn’t budge. It’s just ingrained in them - meanwhile you look at the number of tickets for password help and password sharing violations that get reported … /Sigh

01189998819991197253,
@01189998819991197253@infosec.pub avatar

I feel this. I increased complexity and length, and reduced change frequency to 120d. It worked really well with the staggered rollout. Shared passwords went down significantly, password tickets went to almost none (there’s always that ‘one’). Everything points to this being the right thing and the fact that NIST supports this was a win… until the the IT audit. The auditor wrote “the password policy changed from 8-length, moderate complexity, 90-day change frequency to 12-length, high complexity, 120-day change frequency” and the board went apeshit. It wasn’t an infraction or a “ding”, it was only a note. The written policy was, of course, changed to match the GPO, so the note was for the next auditor to know of the change. The auditor even mentioned how he was impressed with the modernity of our policy and how it should lead to a better posture. I was forced to change it back, even though I got buyin from CTO for the change. BS.

Trainguyrom,

Having been exposed to those kinds of audits before that’s really just bad handling by the CTO and other higher ups!

01189998819991197253,
@01189998819991197253@infosec.pub avatar

Oh, I agree. Just one reason I decided to move on to a different employer.

partial_accumen,

At the end of the day, some of us in IT security want to do the right things based in common sense but we get stymied by management decisions and precedence. Hell, I’ve brought NIST 800-63B documentation with me to check every reason why they wouldn’t budge. It’s just ingrained in them - meanwhile you look at the number of tickets for password help and password sharing violations that get reported …

Paint the picture for management:

At one time surgery was the purview of medieval barbers. Yes, the same barbers that cut your hair. At the time there were procedures to intentionally cause people to bleed excessively and cutting holes the body to let the one of the “4 humors” out to make the patient well again. All of this humanity arrived at with tens of thousands of years of existence on Earth. Today we look at this as uninformed and barbaric. Yet we’re doing the IT Security equivalent of those medieval barber still today. We’re bleeding our users unnecessarily with complex frequent password rotation and other bad methods because that’s what was the standard at one time. What’s the modern medicine version of IT Security? NIST 800-63B is a good start. I’m happy to explain whats in there. Now, do we want to keep harming our users and wasting the company’s money on poor efficiency or do we want to embrace the lesson learned from that bad past?

Aviandelight, in What's an amusing thing to say before going under general anesthesia?
@Aviandelight@mander.xyz avatar

I had a very stodgy surgeon and I actually got a laugh out of him. He checked in with me pre surgery and as he was leaving said he would see me in the OR and I was like I hope I don’t see you (meaning I hoped the anesthesia worked). No one else got what I meant except for him and he had a genuine chuckle.

Window_Error_Noises,
@Window_Error_Noises@lemmy.world avatar

This gives me a sense of satisfaction by proxy.

tacosplease,

I said “Yeah. You’ll see me.”

Fogle, in what is you're phone journey?

Nexus 5 Nexus 6p Pixel 2 Galaxy something or other for a week pixel 3 pixel 5 pixel 6 pro

Neeen, in What is the name of your cleaning robot?

Zippy!

KISSmyOS, in what is you're phone journey?
  • several cheap phones from Motorola, Sagem, Samsung, etc. (I couldn’t afford a Nokia 3310)
  • some no-name feature phone
  • some Chinese 60€ smartphone
  • Samsung Galaxy J5 (used)
  • Samsung Galaxy J2 (got it for free)
  • Gigaset GX290
  • Unihertz Atom

I’ve never spent more than 150€ on a phone. If you debloat them and use open source apps, you really don’t need many “features” or much CPU-power/memory/storage.
And I don’t think I’ve ever a used a different browser than Fennec, cause that’s what pops up if you search for Firefox on F-Droid.

pewgar_seemsimandroid,

did you ever use an mp3 player?

KISSmyOS,

Yes, I had an MP3 player before I got my first smartphone.
Or, if you’re asking about apps, I used Vanilla Music Player. But nowadays I either use Spotify or a cassette player.

pewgar_seemsimandroid,

for Spotify i use spotube

KISSmyOS,

Yeah, me too.

pewgar_seemsimandroid,

nice, though i sometimes also use SoundCloud with the default app

edit: and an YouTube playlist

owatnext, in what is you're phone journey?
  • Nokia 1112 (moved on from Tracphone)
  • LG Chocolate (stopped working outright)
  • Sony Xperia XA1(eventually lost it)
  • Sony Xperia XA2 Ultra (voLTE compatibility)
  • OnePlus 8 (current)

I try to make my phones last as long as possible. I get about five years out of each phone. Hoping to make the OP8 last longer, as it has 5G and voLTE and that is the only reason I had to get rid of the XA2. Otherwise I was fine with the XA2 other than the fact that it didn’t get service anymore.

I use Fennec as my mobile web browser, if that is what you are asking.

pewgar_seemsimandroid,

so fennec is you’re main browser like the one you use the most

owatnext,

If you mean web browser, yes.

pewgar_seemsimandroid,

yes I meant web browser

BeatTakeshi, in What's an amusing thing to say before going under general anesthesia?
@BeatTakeshi@lemmy.world avatar

Finally, time to experience that cutting edge technology!

fiendishplan, in What's an amusing thing to say before going under general anesthesia?

I asked my doctor “You’ve done this before, right?” he didn’t laugh.

KISSmyOS,

Did he start to sweat and stutter, instead?

MajorHavoc,

Everyone has to start somewhere.

I hope you got a coupon discount or something, though.

killeronthecorner, in What's an amusing thing to say before going under general anesthesia?
@killeronthecorner@lemmy.world avatar

Tell your wife I love her

Muscle_Meteor, in Tech workers - what did your IT Security team do that made your life hell and had no practical benefit?

This is what i have to do to log into microsoft fuckin teams on my work laptop when i work from home…

  1. Unencrypt my laptop hardrive
  2. Log into my OS
  3. Log into the VPN
  4. Log into teams
  5. Use the authenticator app on my phone to enter the code that is on my screen
  6. Use my fingerprint on my phone to verify that i am the person using my phone…

Step 5 was introduced a few months ago because the other steps weren’t secure enough. This is why half my colleagues aren’t available when they work from home…

I suggested that we just use slack as our work chat and leave teams as a red herring to dissapoint extremely talented hackers.

jasondj,

Don’t reuse passwords!

But make them complicated!

Don’t write them down!

Change them every week!

  • All
  • Subscribed
  • Moderated
  • Favorites
  • asklemmy@lemmy.world
  • localhost
  • All magazines
  • Loading…
    Loading the web debug toolbar…
    Attempt #

    Fatal error: Allowed memory size of 134217728 bytes exhausted (tried to allocate 20975616 bytes) in /var/www/kbin/kbin/vendor/symfony/http-kernel/Profiler/FileProfilerStorage.php on line 171

    Fatal error: Allowed memory size of 134217728 bytes exhausted (tried to allocate 10502144 bytes) in /var/www/kbin/kbin/vendor/symfony/error-handler/Resources/views/logs.html.php on line 28