this post was submitted on 09 Nov 2025
493 points (96.8% liked)

Technology

76917 readers
3327 users here now

This is a most excellent place for technology news and articles.


Our Rules


  1. Follow the lemmy.world rules.
  2. Only tech related news or articles.
  3. Be excellent to each other!
  4. Mod approved content bots can post up to 10 articles per day.
  5. Threads asking for personal tech support may be deleted.
  6. Politics threads may be removed.
  7. No memes allowed as posts, OK to post as comments.
  8. Only approved bots from the list below, this includes using AI responses and summaries. To ask if your bot can be added please contact a mod.
  9. Check for duplicates before posting, duplicates may be removed
  10. Accounts 7 days and younger will have their posts automatically removed.

Approved Bots


founded 2 years ago
MODERATORS
 

Use the "passwords" feature to check if one of yours is compromised. If it shows up, never ever reuse those credentials. They'll be baked into thousands of botnets etc. and be forevermore part of automated break-in attempts until one randomly succeeds.

you are viewing a single comment's thread
view the rest of the comments
[–] BombOmOm@lemmy.world 328 points 1 week ago (47 children)

Protip for the room: Use a password manager with a unique password for every service. Then when one leaks, it only affects that singular service, not large swaths of your digital life.

[–] artyom@piefed.social 96 points 1 week ago (2 children)
[–] stealth_cookies@lemmy.ca 40 points 1 week ago (5 children)

I hate how many places don't allow for + aliases. I want to know who leaked my email.

[–] artyom@piefed.social 22 points 1 week ago* (last edited 1 week ago)

No + required. There are hundreds of companies offering aliases using their shared domain. You can also just generate a temporary email address if you don't require any ongoing communication and the account is not super important.

[–] T156@lemmy.world 20 points 1 week ago (1 children)

At the same time, it is trivially easy to strip a + alias, so I'd not trust it to do anything much at all.

[–] Miaou@jlai.lu 6 points 1 week ago (1 children)

If you use aliases for all services, it makes it slightly harder to automate trying one leaked email on another site, since the hacker needs to add the new alias on the other service.

No one is going through of all these credentials manually, so any extra obscurity can actually bring you security in a pinch. Although if you have different passwords this shouldn't matter much...

[–] Anivia@feddit.org 7 points 1 week ago

No, you just run a simple Regex on both combolists and are done. It literally takes seconds

[–] CodenameDarlen@lemmy.world 6 points 1 week ago* (last edited 1 week ago)

Even if your alias is leaked they can remove the + part and it'll lead to your original email without aliases. They probably do some data formatting on emails to no get caught so easily and obviously.

load more comments (2 replies)
[–] wreckedcarzz@lemmy.world 14 points 1 week ago (1 children)
load more comments (1 replies)
[–] Dave@lemmy.nz 57 points 1 week ago (1 children)

Don't forget unique email addresses. I've had two spam emails in the last 6 months, I could trace them to exactly which company I gave that email address to (one data breach, one I'm pretty sure was the company selling my data). I can block those addresses and move on with my life.

My old email address from before I started doing this still receives 10+ spam emails a day.

[–] BitsAndBites@lemmy.world 9 points 1 week ago (1 children)

I've started using {emailaddress}+{sitename}@gmail.com i.e. myemail+xyzCompany@gmail.com

That way I can at least see who sold my info. I wish I would have started doing this long ago though. Some sites dont let you use the plus symbol even though it's valid though

[–] akilou@sh.itjust.works 34 points 1 week ago (1 children)

This trick is common enough and trivial to reverse engineer. I can just purge my billion-email-address hacked list of all characters between a + and an @ and have a clean list that untraceable with your system.

[–] AMillionMonkeys@lemmy.world 12 points 1 week ago (1 children)

Right? Has this ever worked for anyone? I've never bothered because of how easy it is for spammers to bypass.

[–] Scubus@sh.itjust.works 18 points 1 week ago* (last edited 1 week ago)

Spammers go for the easiest targets. If you do stuff like this, they might redesign their system to make it LESS likely to send to you. Keep in mind theyre targetting the elederly, mentally handicapped, and the emotionally desperate. They specifically DO NOT want to target the educated, technologically literate, and those that will waste their time. By attempting to technologically limit them from their scams, you make it more difficult for them to target you and it makes it obvious theyre not worth your time.

Its not about making yourself scam proof, its about making yourself an unappealing target.

(This all applies to scam emails, dunno if it has any effect if the goal is phishing but i would imagine so. If they can phish 5 people in the time it takes to phish you, youre no longer their target.)

Edit: this is why scam emails look obviously scammy, with misspelled words and grammarical errors. Its not a mistake, its an attempt to preemptively weed out people who want to waste their time

[–] BrianTheeBiscuiteer@lemmy.world 53 points 1 week ago

Also 2FA. You'll still want to change passwords but it buys you time.

[–] blazeknave@lemmy.world 8 points 1 week ago (6 children)

Also, length is most of what matters. A full length sentence in lowercase with easy to type finger/key flow for pw manager master, and don't know a single other password. Can someone correct me if I'm wrong?

[–] Vigge93@lemmy.world 6 points 1 week ago* (last edited 1 week ago) (2 children)

I've found that there are a handful of passwords that you need to remember, the rest can go in the password manager. This includes the password for the password manager, of course, but also passwords for your computer/phone (since you need to log in before you can access the password manager), and your email (to be able to recover your password for the password manager).

You are also correct that length is mostly what matters, but also throwing in a random capitalization, a number or two, and some special character will greatly increase the required search space. Also using uncommon words, or words in other languages than english can also greatly increase the resistance to dictionary attacks.

load more comments (2 replies)
load more comments (5 replies)
[–] realitista@lemmus.org 7 points 1 week ago (16 children)

Which one works on all browsers including mobile safari and mobile Firefox?

[–] sc2pirate@lemmy.world 54 points 1 week ago (1 children)

Bitwarden has been good for me, but I actually don't know about safari...

[–] nocturne@slrpnk.net 22 points 1 week ago (1 children)

It works with Safari. I use both Bitwarden and mobile/desktop Safari.

[–] realitista@lemmus.org 8 points 1 week ago (1 children)

Thank you for actually answering the question.

[–] nocturne@slrpnk.net 5 points 1 week ago (5 children)

On mobile, Bitwarden is an app that fills login/password info into your browser.

load more comments (5 replies)
[–] Pika@sh.itjust.works 13 points 1 week ago

Keepass does a pretty decent job. I have keepassXC on my Windows, Debian and Android devices. On Android it's integrated into the phone(and the autofill service if actual 2fa isn't supported on the app) so it works on every application. With IOS though I know they can be a stickler on anything remotely technical so I'm not sure if something similar exists with it. I also use syncthing as the service to make sure the same copy of the database is on each device to prevent having to use a password manager that requires a subscription for a cloud service, this also minimizes my risk factor of a cloud service being compromised.

[–] haulyard@lemmy.world 7 points 1 week ago (1 children)

Heard great things about bitwarden. I’ve personally been using 1Password for over a decade.

load more comments (1 replies)
[–] CrazyLikeGollum@lemmy.world 6 points 1 week ago (2 children)

For mobile safari Bitwarden (and I think a number of others, but Bitwarden's the only one I can speak to) ties into Apple's password management system for autofill and password generation. Still have to use the app or webpage (either Bitwarden's official site or self-hosted vaultwarden) for more in depth management.

For mobile Firefox, on iOS it's the same as Safari. On Android you can either use the Bitwarden add-on or use it with the app and Android's built-in password management system just like on iOS.

Since you mentioned "all browsers" for chrome/chromium based browsers there is also on add-on for both mobile and desktop. For Internet Explorer and pre-chrome Edge I don't believe there's an add-on but it can still work, it'll just be more of a pain since you autofill either won't work or will be spotty. You'll probably be relying on the standalone desktop app.

On MacOS it integrates with Apple's password management, so no need for an add-on on desktop safari.

For other browsers, you'll probably have to use the desktop app and manually copy/paste just like for IE.

I also remember seeing some third-party integration for the windows terminal app and various Linux terminals, but I can't really speak to their quality or functionality since I haven't used them. But that would probably cover your needs for terminal based browsers like Lynx.

load more comments (2 replies)
load more comments (12 replies)
[–] sobchak@programming.dev 5 points 1 week ago* (last edited 1 week ago) (2 children)

I was thinking about this earlier. The password manager browser plugin I use (Proton Pass) defaults to staying unlocked for the entire browser session. If someone physically gained access to my PC while my password manager was unlocked, they'd be able to access absolutely every password I have. I changed the behavior to auto-lock and ask for a 6-digit PIN, but I'm guessing it wouldn't take an impractical amount of time to brute-force a 6-digit PIN.

Before I started use a password manager, I'd use maybe 3-4 passwords for different "risks," (bank, email, shopping, stupid shit that made me sign up, etc). Not really sure if a password manager is better (guess it depends on the "threat" you're worried about).

Edit: Also on my phone, it just unlocks with a fingerprint, and I think law enforcement are allowed to force you to biometrically unlock stuff (or can unlock with fingerprints they have on file).

[–] gian@lemmy.grys.it 8 points 1 week ago

If someone can gain physical access to your PC you are done anyway, he van simply copy the file or do whatwver he want

load more comments (1 replies)
load more comments (41 replies)