@nzakas Stop the madness is your friend!
Super Agent automatically fills out website’s cookie consent forms for you based on your preferences. Super Agent’s mission is to make privacy simple, by giving power to users to decide if and how they want to be tracked and ensure that their options are automatically applied with no effort. We’re a…
@ravipatel @nzakas That's really cool! 🤩
If only it were unnecessary 🤔.
Web Content Accessibility Guidelines (WCAG) 2.2 covers a wide range of recommendations for making web content more accessible. Following these guidelines will make content more accessible to a wider range of people with disabilities, including accommodations for blindness and low vision, deafness and hearing loss, limited movement, speech disabilities, photosensitivity, and combinations of these, and some accommodation for learning disabilities and cognitive limitations; but will not address every user need for people with these disabilities. These guidelines address accessibility of web content on any kind of device (including desktops, laptops, kiosks, and mobile devices). Following these guidelines will also often make web content more usable to users in general.
My bank is still not listening 🦻
They want their customers to use longish passwords and they also block the paste functionality 🔑
One can always drag-drop the text into the paste protected field without any problem. No need for extensions.
A lot of people are probably turning to phrases like: This.C0mpany.Can.F***-0ff!
@loke @nzakas I once had senior leadership make the request "don't allow the user to copy+paste this image" because it contained sensitive information.
When asked "what about when they hit 'printscreen' on their keyboards", their brains broke.
If not that, they'll take a picture of the screen with their phone.
If somebody wants something you've already served them up on their screen, they'll find a way to get it.
@nzakas I hacked together an Alfred workflow a couple months back after getting particularly pissed at a site that did this. The workflow turns the clipboard into simulated keystrokes and uses AppleScript to type them.
I get a little glee every time I use it on a site.
OMG rage. They're just ensuring that I eff it up. Copy/paste is a survival skill for me.
@nzakas it's an #AntiSecurity-Feature since it prevents people from using #PasswordManagers, resulting in weaker Passwords like:
Idonthavetimef0rthis$it!
instead of some solid password generated with cryptographic randomness...
Like a 128-digit password...
https://github.com/kkarhan/misc-scripts/blob/260f087c8337417c69f94787358abf4faf5090f9/bash/.bash_aliases
@kkarhan @nzakas it’s worse than that, so many analytics libraries include keyloggers that a manually typed password on most sites should be considered compromised
(Tho there’s also malware that tries to replace anything on the clipboard that looks like a crypto wallet address with the attackers wallet address, which will replace some randomly generated passwords, so I guess using the clipboard isn’t all that secure either)
@ShadSterling @nzakas well, I just block all but whitelisted Cookies and JS.
And Yes, #Cryptojacking is a problem in general...
Needless to say users can't be made liable for shitty #ITsec of the company who's website they log in.
Point is: #PasswordManagers are the most secure option - period.
@[email protected] it's an #AntiSecurity-Feature since it prevents people from using #PasswordManagers, resulting in weaker Passwords like: Idonthavetimef0rthis$it! instead of some solid password generated with cryptographic randomness... Like a 128-digit password... https://github.com/kkarhan/misc-scripts/blob/260f087c8337417c69f94787358abf4faf5090f9/bash/.bash_aliases
@nzakas this and password managers.
Also those that use a hidden honeypot field that password managers can't recognise.
@nzakas those forms that say "repeat email" and then don't let you paste, turn off autocomplete, and then only do validation onKeyUp...
Now instead of carefully checking my email address I'm rummaging in your dom to delete attributes from your form fields
@nzakas Ah, but it can drive your users to madness.
It's a make work for mental health professionals thingy.
Anyway, I would literally have to think of how you can do “security” on the client side, well, basically the same way you would do in any client delivered directly onto the PC of the user, written in an interpreted language.
You'll notice that our beloved overlords from Hollywood insisted that their DRM is embedded into the browser VM, not running on top it.