838

Creepy..... WTF

Comments
  • 23
    LOL WTF???
  • 64
    Great security feature!
  • 5
    Unbelievable... Smh
  • 6
    Hahahaha!!!! I'm dying. No words to describe this.
  • 64
    If you entered the name of your lover as a password, you sure would feel uncomfortable.
  • 7
    Password123
  • 12
    Report as bug. explain consequences. profit~ 😉
  • 3
    Come on tell us the website
  • 21
    This also means that they dont hash the password..
  • 14
    How to build a password list... Step 1!
  • 15
    @BlackMagic You are wrong, they can take the password from the input and verify it in real time
  • 13
    @BlackMagic how do you think passwords is checked on login?
  • 3
    That is made of so much win... *facepalm*
  • 1
    WTF !! kkkk !!
  • 2
    @wubstepper most users are so trusting with their credentials, they shove it into everything including their neighbour's mailbox. We love our beloved users, guys like these just make them victims... which also angers me. Cause once you have their credentials from this site, very few users use multiple passwords for various sites.
  • 2
    @wubstepper what's the purpose on encrypting public posts?
  • 2
    @wubstepper #fuckemalltodeath #garrison4prez
  • 1
    Seens this more than once actually
  • 1
    @wubstepper
    1. I think that quite nobody will care if you encrypt everything...
    2. Encrypt everything makes code maintenance very hard
  • 1
    @altermind that's not the point. The important part is how many care when you *don't* encrypt everything.
  • 10
    Tell them this is your password, demand them to tell you who is using it!
  • 3
    I...
    What...
    Why...
    I want to know which PM thought this was a good idea.
  • 0
    How do they know?
  • 0
    @wubstepper I mean that's bad.
  • 1
    I died a little lot on the inside
  • 0
    @sasikanth

    PLEASE TELL US THE WEBSITE!!!
  • 0
    It would be great if it prints out the other user's username who is having the same password.
  • 3
    @ravan the odds of it having console.log is pretty high....
  • 3
    Please for the love of got try a SQL injection as I feel they don't sanitize
  • 0
    @wubstepper how are you indexing posts for site searches etc? (Obviously would take to long to decrypt all posts and search every time someone search)
  • 0
    Also nothin states that this information is not hashed uniquely to a user, the user aggregate could have its own copy and separate context could just have the stuff piped through in order to for-fill this feature. Yes it is a shitty feature but the implementation doesn't have to be insecure. Especially if it is in a different database like users in MySQL and this feature in Redis or something.
  • 2
    @all Guys, I found it on Twitter and took screenshot and posted it here. Let me try to find original tweet and share the link here.

    PS: As there are lot of people asking for the website tried @all. I'm sure it will not work but fuck we devs try anyway.
  • 2
  • 0
    @wubstepper so you store the post keywords unencrypted in a map table pointing to a URL?
  • 1
    Place your bets on this using plain text passwords
  • 2
    @wubstepper They could just hash your input and compare the hashes, so this doesn't mean that they sore unencrypted passwords
  • 5
    Absolutely no salt.
  • 0
    @wubstepper well you could hash it on the client for the signup process
  • 0
    If it was written "you can't use your old password " then it was understoodable but no one displays warnings like this, i guess you are the one doing this locally by creating a fake sample page 😌
  • 1
    So who's gonna write a web scraper for.... research?
  • 0
    "Secure environment "
  • 1
    "We respect your privacy concerns"
  • 0
    @puneet, as I mentioned I found it on Twitter and shared it here. You can see the link for original tweet in one of my comments
  • 0
    Wtf...
  • 1
    @bjorngi @blackmagic

    At least ist means they dont salt or pepper their hashes... Hashing is not enougth..
  • 1
    @JaggerJo Yeah, you're right. my mistake
  • 0
    Seriously???? What???!!
  • -1
    @wubstepper Why does it matter? I think depends on what the password gives access to. Imagine, you wouldn't lock in a standard 1 cent coin without any market or sentimental value in a large EX classed vault. Because that would be overkill^3.
    Same with sites having bad security. If the password is, for lets say saving some sorting preferences on a site, who cares about if the passwords leak?
    But its another thing if it were a web shop with saved orders, sensitive info like CC numbers and so on.
  • 2
    @sebastian Every password on every site needs to be secured at the minimum level (hash and salt) because users are not smart enough or industrious enough to create new passwords for every site. At that point, the password you are storing is more valuable than your content.
  • 0
    It's a little unnerving that half the people in this thread, based on their comments, have no clue how security works.
  • 0
    @edisonn
    Even if they do it right on their backend, expising a message like that is definitly a security issue ...
  • 0
    I'll prank some users with that soon but only with js, no actual password queries shyt
  • 0
    I smell a business requirement, that really needed to get pushed, and somebody just didn't say ... "WTF that's dangerously stupid"
  • 0
    Wait........ What?!?!?
  • 0
    I don't think this is a bad thing, apart from the fact that passwords aren't being salted. Using a password that's in common use is a huge security risk for the user, and forcing a unique password goes a long way toward improving security. Easy-to-guess passwords get knocked out of the pool early.
  • 0
    @Strosser you could implement this feature with salted passwords...
  • 0
    This is some next level stupidity. Not to mention a complete lack of privacy/security. Smh.
  • 0
    This would've made a perfect repost for wk25
  • 0
    Realy bag :P xD
  • 0
    @BlackMagic or that they hash it while checking for others, or do it front-end. All bad
  • 0
    Just realised this could be a great idea to stop common password usage.

    The someone else could literally be the list of most common passwords dumped online that attackers use to try stop people using them
  • 0
    That's not a Security threat, that information is useless. Even I can say someone in this world has a given Password. It might be useful if someone keeps a weird Password like you and you have found your "Soulmate"
Add Comment