• @futatorius@lemm.ee
    link
    fedilink
    English
    146 months ago

    Internet security and internet privacy are only incompatible goals when combined with incompetency and shit user-exerience design.

  • @Katana314@lemmy.world
    link
    fedilink
    English
    106 months ago

    On this question of verification, I don’t have a particularly foolproof solution, but maybe there just isn’t one.

    I can criticize the modern web for a lot of things, but as long as we have situations where we want to check whether an account is a real person, as opposed to FarmingBot #295038, they need something. I’m not a fan of phone verification, but I’d only criticize it when we have alternatives.

    I’d even be in favor of some kind of one-way algorithm by which a trusted real-person-identifying entity could tell a random third party site: Yes, this is a genuine human.

    • @Ahrotahntee@lemmy.ca
      link
      fedilink
      English
      9
      edit-2
      6 months ago

      The technology has existed since the 80s.

      X509 certificates would allow a government agency to sign a digital identity indicating that it’s legitimate, would allow for remote revocation in the event of loss or theft, and can be easily integrated with every existing computer and browser.

      An issued physical card would resemble a credit card, with a chip in it. Other physical form factors can take the shape of USB-devices which bundle the card and the reader into a single device.

          • 0xD
            link
            fedilink
            English
            1
            edit-2
            6 months ago

            It’s because the phone is a two-factor token that everyone has with them. With a secure processor being the hardware token and fingerprints or face scans biometrics. This makes it ideal for saving such sensitive data. I most frequently use it to digitally sign documents in a legally enforceable way.

            The card you linked is similar, and a smart card was one of the previous versions of our system. The goal here was to make it universally accessible, and a smartphone is perfect for that.

  • y0kai
    link
    fedilink
    English
    156 months ago

    I’ve been considering getting a pager or a burner phone just for this

      • y0kai
        link
        fedilink
        English
        16 months ago

        you know i’m not sure.

        What i want is a phone that is basically a beeper for text messages. Doesn’t even have to send. just receive the stupid OTP. I wonder how hard that’d be to make with like a raspberri pi or something

    • @ikidd@lemmy.world
      link
      fedilink
      English
      46 months ago

      Just get a virtual DID number from something like Voip.ms or virtualphone. There may be other providers out there that use crypto for payment for added privacy, but if all you want to do is be able to keep your real phone # off the grid, these work.

        • Psychadelligoat
          link
          fedilink
          English
          36 months ago

          Never had that problem with the Google voice service

          Yeah yeah it’s google, but it gives numbers that work

          • @Boozilla@sh.itjust.works
            link
            fedilink
            English
            26 months ago

            Google voice is hit or miss. It’s worked for a lot of smaller sites for me, but the bigger / more corporate it is, the less likely it seems to work.

          • @u_u@lemmy.dbzer0.com
            link
            fedilink
            English
            26 months ago

            Last time I checked, Google Voice is only available for US residents. Not sure if there’s alternative.

      • @Appoxo@lemmy.dbzer0.com
        link
        fedilink
        English
        36 months ago

        Better to not associate this number to your main phone anyway. Less likelyhood to have the info stolen from you.

  • Cousin Mose
    link
    fedilink
    English
    311
    edit-2
    6 months ago

    To the same audience: quit selling my fucking phone number!

    I ditched a phone number I had for 10+ years because it was leaked everywhere. Only a few short months after updating my number with the DMV and a handful of other government agencies I started receiving scam calls/messages again.

    At some point we need to adopt some fucking privacy laws. This is absolutely bonkers—is no one else fed up??

    Edit: I already know how to silence unknown callers. What I want is to not have the problem in the first place, ideally by 1) having companies not sell personal data to third parties and 2) being able to block spoofed (non-encrypted) caller ID.

    • @john89@lemmy.ca
      link
      fedilink
      English
      46 months ago

      At some point we need to adopt some fucking privacy laws. This is absolutely bonkers—is no one else fed up??

      Look at you, trying to use the government to solve every day problems that face pretty much all of us.

      Don’t you know we only focus on gridlock issues to distract us from real issues now?

    • mox
      link
      fedilink
      English
      176 months ago

      quit selling demanding my fucking phone number!

      FTFY

    • @buddascrayon@lemmy.world
      link
      fedilink
      English
      66 months ago

      At some point we need to adopt some fucking privacy laws.

      Yeah we absolutely had to ban TilTok because of privacy concerns but the idea of creating a law to protect our privacy is ridiculous beyond all reasoning. The stupidity of the United States government is absolute.

      • Cousin Mose
        link
        fedilink
        English
        26 months ago

        Agreed, but I’m not addressing TikTok specifically but rather policies similar to GDPR.

    • Snot Flickerman
      link
      fedilink
      English
      1336 months ago

      Oh everyone is fed up but we just elected a guy and government who is sure to make it all way way way worse.

      He just helped put the nail in the coffin of the lie that crypto is for anything but scams, don’t worry, it’s gonna get real bad before it gets any better.

      • @tourist@lemmy.world
        link
        fedilink
        English
        296 months ago

        In South Africa, where I live, everyone is assigned an ID Number at Birth. You need an ID number, thumbprint scan AND proof of address to get issued a SIM card number due to a law introduced called RICA. It was meant to help fight crime. Worried that the government could listen in to calls or read their SMSs, the criminals just switched to WhatsApp, which also happened to become cheaper than SMSs and gained popularity in this time.

        The cops never seemed to crack WhatsApp. The only drug busts that happen are when an open secret becomes laughably too open and when they harass every person arriving from South America at O.R. Tambo international airport just to catch the decoy mules carrying 12g of cocaine (total). Every dealer I ever organised with was over WhatsApp.

        So now, woopsi, RICA stopped nothing and just became a liability. That treasure trove of fragile data made its way to scammers and spammers. A total net negative.

        I’d encourage everyone else in other countries to apply major pushback to any government proposals in this direction.

        • @nyan@lemmy.cafe
          link
          fedilink
          English
          106 months ago

          There’s a subset of Americans who are rather like ostriches: heads so deeply buried in the sand that they forget anything exists outside their immediate surroundings. Reminding them that the rest of the world is out there rarely has any positive results, however.

      • @explodicle@sh.itjust.works
        link
        fedilink
        English
        3
        edit-2
        6 months ago

        “Bitcoin, it just seems like a scam,” Mr Trump said. “I don’t like it because it’s another currency competing against the dollar.”

        — Donald Trump

        Of course, Trump Coin made just for him is fine. And any security who bribes him. Oh wait now none of them are securities; Gary Gensler was our last line of defense.

        [Edit: got it backwards]

    • @adarza@lemmy.ca
      link
      fedilink
      English
      236 months ago

      lists sourced from drivers licenses and motor vehicle registration records are literally sold by some states.

    • @DaddleDew@lemmy.world
      link
      fedilink
      English
      506 months ago

      I’m pretty sure a lot of scam calls use machines that call every possible phone number within an area code and see who answers. There is no way to avoid it.

      • Pika
        link
        fedilink
        English
        146 months ago

        this right here. I stopped getting scam calls years ago, I stopped answering and they just eventually stopped calling. If you don’t interact with the call (interact being ignore it or mute it NOT reject it) and it just goes to voicemail, they seem to eventually stop

        • @BlemboTheThird@lemmy.ca
          link
          fedilink
          English
          136 months ago

          Lucky you. I’ve been letting calls from any number I don’t recognize go to voicemail for years and nothing ever seems to change.

          • @ElegantBiscuit@lemm.ee
            link
            fedilink
            English
            26 months ago

            I just block and report as spam any spam text messages I get and any calls that get marked as scam likely. It was terrible before the election because I live in a swing county in a swing state and I think everyone was just mass spamming every number in the area code, but since then I haven’t really gotten much, maybe one errant text every 2 or 3 weeks. Which is much better than it was last spring and summer when the amount started picking up for me.

        • @atrielienz@lemmy.world
          link
          fedilink
          English
          6
          edit-2
          6 months ago

          If you’re job hunting, or work in specific fields this may not be a reasonable thing to do and that’s at least part of the problem.

          • Pika
            link
            fedilink
            English
            26 months ago

            This would deem troublesome yea, being said I firmly believe in separating work and home. I wouldn’t be willing to use a personal number for work related activities, at least not public related activities. Being said, I have no good solution for that, at least you are being paid for the scam call I guess.

            • @atrielienz@lemmy.world
              link
              fedilink
              English
              26 months ago

              Job hunting is what I meant. And you pretty much have to use your personal phone for that. I haven’t ever had a company phone. Doubt they’d give it to techs.

    • Pika
      link
      fedilink
      English
      26 months ago

      I’m confused of how this keeps happening to people.

      Like I use my phone on most sites that allow it and I’ve never had spam/scam calls really, but I’ve also explicitly unchecked the marketing boxes that appear on the signup so maybe that it.

      The last instance that actually happened to me was with entering my university a few years ago for my BS degree. They 1000% sold my contact information as some part of the deans/honors list process. I reached out to them and stopped that so fast.

    • Ulrich
      link
      fedilink
      English
      66 months ago

      I set my phone to decline calls from unknown callers years ago.

      These calls are already illegal. I used to report them to the FTC but I never heard anything back so I have no idea what happens, but I presume nothing. If I had the time to take them, and if they spoke English, I would record them with the Cube ACR app (which no longer works) and convince them to incriminate themselves. Ask their name, company, location, time/date, whether they ran my number through the DNC registry.

    • @pHr34kY@lemmy.world
      link
      fedilink
      English
      11
      edit-2
      6 months ago

      Australia has a “do not call register”. It seems to mostly work, but telcos are having trouble with calls originating from outside the network with spoofed caller ID. We still get spam/scam calls from India among other places.

      Even if they’re not calling you directly, they are still using your phone number to link you to things and create a shadow profile behind the scenes.

      • Cousin Mose
        link
        fedilink
        English
        16 months ago

        That’s not the problem I’m referring to; this is already built-in to iOS (and I hope Android).

    • Shimitar
      link
      fedilink
      English
      76 months ago

      Don’t worry, here in Europe we are full of privacy laws but I still receive tents of spam calls per day. Usually from non UE countries faking the number with my country numbers.

      • @Blackmist@feddit.uk
        link
        fedilink
        English
        26 months ago

        Anything with a London 020 number is guaranteed to be a man with an Indian accent pretending to be from British Telecom.

  • Pika
    link
    fedilink
    English
    10
    edit-2
    6 months ago

    Are internet security and internet privacy incompatible goals?

    Yes. They are completely incompatible goals when anything relating to identity/being is linked to it. Examples of this could be anything from your name, to your behavioral patterns, to your phone number

    Disregarding the entire possibility that ANY site is hack-able/breach-able, the issue stands that the reasons that most sites request PII is valid, for security reasons. There does not exist any valid method of ensuring users identity that does not violate users privacy. CAPTCHAS are proven inefficient, email domains are easy as a 1-2 click. Once the setup is done server side changing to a new address is as easy as changing your server settings and registering a new domain, then just pointing your MX records there. Heck depending on your postfix setup you might not even have to change server settings, if your account lookup is setup to ignore the domain and it all uses the same database. Even phone numbers have proven troublesome but its the least troublesome method available

    The entire reason PII style setups are used, is because its an easy verification site side, but a hard to spoof verification customer side. Like the article says, phone numbers are hard to change for verification, many only let you change so many times in X period, and usually require some form of physical identity to register, and the ones who don’t are forced such as VOIP style numbers get blocked.

    We lack currently a good system aside from that, because at the end of the day, how do you prove you are who you say you are, without disclosing your identity. I personally think it should be fine to give up some PII for security purposes, but this NEEDS to be restricted only to security and should never be shared with any entity, and this includes government overreach. Alas this will never happen.

    • @AnAmericanPotato@programming.dev
      link
      fedilink
      English
      96 months ago

      This assumes a legitimate need to prove who you are outside the context of that specific site, rather than just within it. Sometimes that need is real, sometimes it is not.

      When it’s not, and you only need to prove you are the same person who created the account, then a simple username and password is sufficient. Use 2FA (via authenticator app or key, NOT via SMS or email) on top of that. This allows users to prove to a sufficient degree that they are the owner of that account.

      This is how most Lemmy instances work, for example. I can sign up by creating a username and password, with optional 2FA. They do not need my email. They do not need my phone number. They do not need my name, or my contacts, or anything else that is not related to my identity within their server.

      I realize that this is untenable at large scales for any communications platform. Spam (and worse) is a problem wherever there are easy and anonymous signups. I’m honestly not sure how Lemmy is as clean as it is. I guess it’s just not popular enough to attract spammers.

      • Pika
        link
        fedilink
        English
        36 months ago

        You are correct with this comment yea, the biggest drawback (which as acknowledged we have seen on lemmy) is the anonymous of the account. It’s easy to spin up spam instances, and due to how federation works its hard to combat against it. I remember LW had an issue regarding that a bit ago with someone threatening to just keep changing domains to avoid blocking, which is indeed a problem for any of these style services. I agree at large scale, most sites are not going to want to have to put up with losing that level of control moderation side. It creates a lot of headaches and for most sites it’s just easier to enforce a policy that forces disclosing PII.

  • Ulrich
    link
    fedilink
    English
    4
    edit-2
    6 months ago

    It’s not an accident. They’re not stupid. It is intentional. They want your personal information. Most of your personal information is tied to your email but it’s easy enough to spin up an alias to sign in with. Requiring a phone number ensures that they know exactly who you are and can buy/sell/use your data accordingly. They also know what a giant pain in the dick it is to change your phone number, especially when you need it for these security checks. They also know sales conversion rates are much higher if they can get you on the phone. So yeah, they’re not going to stop doing that.

  • @D_Air1@lemmy.ml
    link
    fedilink
    English
    126
    edit-2
    6 months ago
    • Phone numbers
    • social security numbers

    Stop making personal information into digital ids because when it inevitably ends up in some kind of data breach. These companies all throw their hands up saying sucks to be you.

    • @ikidd@lemmy.world
      link
      fedilink
      English
      86 months ago

      What I hate is when they want you to store “secret” information like your mother’s maiden name/ first pet name for later verifications. You know these are stored in plain text of course. My own damn government does this stupid shit, and they’ve had several hacks of PII including gun registrations because as far as I can tell, nobody competent works in government IT.

      • @pixelscript@lemm.ee
        link
        fedilink
        English
        46 months ago

        Security questions don’t care what you put in there. It’s not an exam. It’s basically just an alt password.

        I just generate a string of alphanumeric text from my password generator and stuff those in there. If I lose my password vault somehow I’m cooked anyway, so.

      • mycelium underground
        link
        fedilink
        English
        96 months ago

        I choose random questions and store the random passwords that I use as answers in my password manager. It’s also more secure because people can’t just Facebook stalk you for answers.

  • @werefreeatlast@lemmy.world
    link
    fedilink
    English
    36 months ago

    I have absolutely no need for my phone number, nor do I use it for anything that I couldn’t use a voice app for. Just get rid of them altogether.

    • Ulrich
      link
      fedilink
      English
      56 months ago

      Yeah I mean I’d get rid of that and email entirely if I could but unfortunately there are legal and societal expectations.

      • @pHr34kY@lemmy.world
        link
        fedilink
        English
        126 months ago

        We need email. It’s one of the few protocols that are 100% in the user’s control. I run my own mail server. I can’t do the same for whatsapp.

        We’ve added a lot of checks to email (SSL, DKIM, DMARC, SPF) so it’s very easy to identify spam these days. It’s also easy to avoid giving any two companies the same email address. That’s something much harder to avoid with a phone number.

        For 2FA, per-account email addresses and authenticor apps are the best approach for privacy.

        • Ulrich
          link
          fedilink
          English
          3
          edit-2
          6 months ago

          I run my own mail server. I can’t do the same for whatsapp.

          No, but you can do the same for a wide variety of chat apps.

          it’s very easy to identify spam these days

          LOL then why is my inbox constantly full of spam?

          Platforms like SimpleX solve spam by requiring participants to have an invitation to message you. You can either send them a 1-time invitation or you can use a semi-permanent one that can be posted publicly and rolled as necessary without losing contact with anyone you’ve already connected with, so by the time it’s mined somehow and sold to some company, it’s already changed.

          For 2FA, per-account email addresses and authenticor apps are the best approach for privacy.

          LOL what? No they’re not. How does an email protect your privacy over just a username?

          • mox
            link
            fedilink
            English
            4
            edit-2
            6 months ago

            LOL what? No they’re not. How does an email protect your privacy over just a username?

            They said per-account email addresses, presumably meaning that when giving out an email address, you would use a different one for each service. That way, they couldn’t be used to link you across services, and you could easily delete one (and know who to blame) if it was abused.

            • Ulrich
              link
              fedilink
              English
              26 months ago

              Yes, I understand how email aliasing works. Again, how is that more private than a username?

              • mox
                link
                fedilink
                English
                4
                edit-2
                6 months ago

                I don’t see a claim of it being more private than a username. Perhaps the person you’re arguing with views them as equally private, or is thinking of services that require some form of contact info. I can’t speak for them.

                • Ulrich
                  link
                  fedilink
                  English
                  2
                  edit-2
                  6 months ago

                  It’s right here:

                  For 2FA, per-account email addresses and authenticor apps are the best approach for privacy.

                  I can’t speak for them.

                  But you just did.

            • Ulrich
              link
              fedilink
              English
              36 months ago

              Zoomer spotted

              Haha, not even close

              Email >>>>> chat apps.

              Wrong again. But please, do go on.

    • Phoenixz
      link
      fedilink
      English
      56 months ago

      Nah, there are more than enough algorithms available that won’t work on quantum computers, I’m not too worried about that

    • @Zak@lemmy.world
      link
      fedilink
      English
      686 months ago

      I’m sad PGP didn’t become a popular way to log into websites. A challenge-response protocol could have even been built into web browsers. Big tech is reinventing that idea as Passkey, but with a very big tech flavor.

        • @Kusimulkku@lemm.ee
          link
          fedilink
          English
          256 months ago

          I’m already hearing about restrictions on exporting passkeys and some apps requiring that you’re not running a custom ROM on Android and stuff like that. Makes me worried they’re going to fuck that up and make it restrictive bs

          • @lmmarsano@lemmynsfw.com
            link
            fedilink
            English
            36 months ago

            Passkeys or WebAuthn are an open web standard, and the implementation is flexible. An authenticator can be implemented in software, with a hardware system integrated into the client device, or off-device.

            Exportability/portability of the passkey is up to the authenticator. Bitwarden already exports them, and other authenticators likely do, too.

            WebAuthn relying parties (ie, web applications) make trust decisions by specifying characteristics of eligible authenticators & authentication responses & by checking data reported in the responses. Those decisions are left to the relying party’s discretion. I could imagine locked-down workplace environments allowing only company-approved configurations connect to internal systems.

            WebAuthn has no bearing on whether an app runs on a custom platform: that’s entirely on the developer & platform capabilities to reveal customization.

            • @RogueBanana@lemmy.zip
              link
              fedilink
              English
              56 months ago

              From what I heard passkeys need google services framework for some reason. Don’t know technical reasons behind it but I would assume its bs given its google.

              • @dracs@programming.dev
                link
                fedilink
                English
                36 months ago

                Yes, they don’t work without Google Play Services. Google didn’t implement passkeys in Android, only their own services.

            • @Kusimulkku@lemm.ee
              link
              fedilink
              English
              36 months ago

              I’m living this pain with a custom ROM already, with some banking stuff, Google Wallet, WhatsApp passkeys and I think Netflix (haven’t installed it) block you for tripping up Google’s security tests.

              If passkeys become a big thing and they’ll start enforcing them and apps that have those security measures I’m going to fucking firebomb something. REEEEEE

              • @Korhaka@sopuli.xyz
                link
                fedilink
                English
                26 months ago

                Shit like this is why I don’t have a smartphone anymore. I have a brick phone that half the time I don’t even take out with me.

    • @yogurtwrong@lemmy.world
      link
      fedilink
      English
      26 months ago
      -----BEGIN PGP MESSAGE-----
      
      hF4D7cLqolaUp8cSAQdAOCdAgwhjdDgwk6TsYbey9XLZrKT7ny+KRAORyTPJsmUw
      Fl1llKK3dYtwrPDUts8CA71uU8D2SOWwrk/mrQxlrP/btjNNj6j1vXehQJ0+FIuc
      0sBPAU3onDQoAiPLDU7qky1cgtbgitMp4nGEnZ48Xh8OhWS03d9YfU4iIIuf/AWA
      MTzzbMLZCLqZrIiJGyE2EgJOLIMAOToxidQ6Z/blrT6W9effeu4GwEB622O0eIv5
      ct0jm/e2A6j1Gf/7UsnzeC21ME55/JkDIFQQ5ZrYqRGp9+M0yNHXIhJXQvO+QmHz
      1CclNIdwbnupIIy0+eiy+Wn41An/IUV2NJy+bmCxRmqTXZyNrfnPMrelY5imknd9
      1oZGuHc6tWqNq0ntjV1sBBsxHtAXtFIBWcqEmUgnpxEBglRxx20thoWvQINisCB4
      9ptHAUM9Qjr3tWFdvL5MqOHZ14XQ65bbKXhx5MJmr5yijA==
      =JKT0
      -----END PGP MESSAGE-----
      

      No one except this guy will be able to read this. Die out of curiosity muhahahaha

    • Pika
      link
      fedilink
      English
      9
      edit-2
      6 months ago

      I want to preface this response saying I full agree with this, I want something like this to happen, I am responding because of some concerns I have. The real major one: How do you verify the authentication part of the data security chain?

      A PGP key alone does not authentically validate that you are who you say you are. When the source is the untrusted party, it doesn’t accomplish the site’s goal. It’s the equivalent to me handing you a piece of paper saying “I’m John Smith and this is what I use to say I’m this” which works amazing for trusted exchanges, but when the source is “just trust me bro” it doesn’t solve anything for the website owner.

      Websites get around this by having trust certificates/root servers that are co-signed with the PGP key. However, we lack any system like that for personal identities. Arguably, setting up such a system would isolate most of the known internet, as it is a significant roadblock, much like how SSL certificate usage was a huge roadblock for sites before Let’s Encrypt became a thing.

      This setup would be amazing for logging into sites. However, it fails to accomplish what the websites that are asking for PII are looking for, which is verification that their user is who they say they are, and not a random third party.

      To reliably use this setup, we would need something similar to Let’s Encrypt, but for user identification. The issue with that is it would become the de-facto attack vector (for both law enforcement and criminal parties), and that site would need to require PII to address the biggest concern on these sites, which is that you are who you say you are, and not Jo Smo or a bot looking to harvest data. Additionally, as mentioned earlier, a massive retraining of the internet would need to be done, which would mostly affect non-tech folk.

      I am hopeful that an easy function that won’t violate users privacy comes out, but I don’t think the two topics are compatible sadly

      • socsa
        link
        fedilink
        English
        5
        edit-2
        6 months ago

        The solution here is distributed trust by proxy. You start with a single exchange between two trusted peers, and build from there. As long as every individual link within the network is trusted, then any route between two disconnected endpoints can be trusted as well. As the network grows there is a very high statistical likelihood that there will exist many individual trust graphs between two nodes, which provides redundant validation.

        I have always thought this would make a cool chat app. You enter the network by scanning someone’s QR code to become their validated peer, and then you can theoretically communicate with anyone else on the network by exchanging keys via trust graphs. You could then build a social network on top of it which shows you how many hops it takes you to get to some celebrity or some shit.

        • Pika
          link
          fedilink
          English
          2
          edit-2
          6 months ago

          tox did something similar with this outcome, but it never took off. Basically with tox each account is actually stored locally, much like how Skype did when it was p2p, but the difference is your account is actually on your device, as in if you lost your “key” you lost your account, when you connected with others, you gave your friends your TOXID which was essentially your public key signature with some added information regarding what you wanted for privacy added to it, and then your messages were relayed through a p2p DHS network. Every communication was encrypted e2e. With tox anyone could create an account with any information, but only people you added were able to message you, and visa versa. The only time you were ever publicly disclosed was during adding contacts to people you didn’t already have, which helped minimize botting on it as bots wouldn’t be able to message you without your ID. The issue with that method was, both parties had to be online to message each other, there was no central server to manage identity and handle users, so every connection was considered trusted since you had to manually add the person via their tox ID.

          I expect this solution /could/ be moved into a centralized system for all user accounts, since the only way to add people was manually adding their private key, but I would expect that on large scale, the lack of ability to actually stop problematic users might dissuade platforms from wanting to implement it, since account creation was as easy as just clicking “create account” and no accounts were ever verified server side, which in order to do, brings back to the issue topic: Privacy vs Security

      • @wellbuddyweek@lemm.ee
        link
        fedilink
        English
        36 months ago

        How do they currently solve this problem for passwords? You could just have the register/create account button lead to a pubkey upload instead of a ‘set password’, no?

        • Pika
          link
          fedilink
          English
          66 months ago

          This problem isn’t addressing password authentication, its the website knowing who you are and that you are legitimate. Websites that collect things such as phone numbers during account creation don’t collect your PII as part of your password procedure. They collect it as a verification that you are an actual being and not a fake account/bot. The ease of being able to go through a forgot password thing is just a positive side effect.

          This solution would work amazingly for logging in, there’s no argument for that, but it doesn’t address the elephant in the room: That the website wants to make sure you are a person/legitimate account and not a fake alias or a bot to scrape info, and when you are the only one providing that information that claim can’t be verified.

        • This is fine🔥🐶☕🔥
          link
          fedilink
          English
          46 months ago

          Wdym why? That’s how most bank portals are designed. Copy-paste functionality is disabled and you have to type username, password, authentication code

          • mox
            link
            fedilink
            English
            2
            edit-2
            6 months ago

            I think my question was clear enough. The comment didn’t mention banks, I’ve never had a bank that did that, and we generally don’t try to hide our identities from our banks anyway. My best guess was that they misunderstood how public/private keys work, but since that was only a guess, I asked.

      • @MisterFrog@lemmy.world
        link
        fedilink
        English
        26 months ago

        A bit of a hacky workaround on Android. Get Keepass2Android, use the included keyboard.

        “Paste” whatever via the inbuilt password input functionality. It basically auto types out your passwords. (You protect this behind a master password/and optionally quick accessed by biometrics)

        Profit

        • @AbidanYre@lemmy.world
          link
          fedilink
          English
          156 months ago

          I’ve seen a few. They’re super annoying when trying to use a password manager with a decent password.

          • @llii@discuss.tchncs.de
            link
            fedilink
            English
            1
            edit-2
            6 months ago

            Can’t your password manager do autotype? That’s what I use mostly, because I don’t want all my passwords in my clipboard.

      • @ayyy@sh.itjust.works
        link
        fedilink
        English
        306 months ago

        The California DMV requires you to renew your vehicle registration every year by paying with a bank account number (no card) which is like a 30ish digit number and they disable paste. If you get it wrong they won’t notify you in any way until you get pulled over by a cop who is one bad sneeze away from murdering you. It’s a great system.

  • Ogmios
    link
    fedilink
    English
    3
    edit-2
    6 months ago

    Computer technology is fundamentally insecure so long as everything is connected all the time. It drives me mental that idiots keep trying to foist the whole of human society onto devices which are clearly unfit for the task.

    • @corroded@lemmy.world
      link
      fedilink
      English
      136 months ago

      Technology exists to keep all your personal data exceptionally secure. Modern encryption is incredibly difficult to break (impossible really).

      Humans are fundamentally insecure. Any time you read about a data leak, it’s because somebody stupidly opened an attachment or fell for a scam. Any time someone gets “hacked,” they didn’t. They gave away their information. Human error and a lack of education are the problems.

      • Mark With a Z
        link
        fedilink
        English
        36 months ago

        While I also disagree with the claim that technology is “fundamentally” insecure, it’s unfortunately not that often made by smart and caring people.

        • Ogmios
          link
          fedilink
          English
          16 months ago

          While I also disagree with the claim that technology is “fundamentally” insecure

          For pretty much everyone other than perhaps the CIA and Mosad, it is.

  • HobbitFoot
    link
    fedilink
    English
    176 months ago

    Are Internet security and Internet privacy incompatible goals?

    They are if the security is tied to knowing that an account is a person.

  • dual_sport_dork 🐧🗡️
    link
    fedilink
    English
    166 months ago

    I don’t want to treat phone numbers as an ID, but for some reason my customers will give their phone number to me online far more willingly than they’ll cough up their email address, which is baffling only until you realize:

    • Most people are technologically incompetent and are intimidated by the avalanche of crap they get in their email, and
    • They never answer their phones anyway, so who cares?

    I actually offer the option, because I don’t give a rat’s ass how people ignore me when I try to contact them. But when they place an order I at least need to be able to prove that I tried.

    • @john89@lemmy.ca
      link
      fedilink
      English
      76 months ago

      which is baffling only until you realize

      I stopped being baffled when I realized most people are dumb as shit.

      It’s just a fact of life, and we either see it or we don’t.

      • @Regrettable_incident@lemmy.world
        link
        fedilink
        English
        36 months ago

        TBF many people are more intimidated by emails. My mum, for example, is in her 70s - she’s okay with using a smartphone but she doesn’t trust ‘internet stuff’. Won’t put her card details in, doesn’t trust emails - which is fair, because a lot of emails are bullshit or scams. She grew up with telephones though and feels safer using them. Possibly why so many phone scams target older people. I’ve tried to educate her.

        This attitude doesn’t make people dumb. A bit ignorant, maybe, but I feel like ‘dumb as shit’ is a bit harsh.

    • @AA5B@lemmy.world
      link
      fedilink
      English
      46 months ago

      When I give out my email, I always get spam, regardless of how many boxes I uncheck.

      When I give out my phone number, sometimes I don’t

      Of course that no longer makes sense since I have one phone number I can’t easily change, but give out uniquely generated emails that I can individually turn off

  • snooggums
    link
    fedilink
    English
    476 months ago

    It is the same thing that happened with US Social Security Numbers, which were originally just tracking numbers for that one purpose that were coopted by capitalists and treated like something special.

  • Teknikal
    link
    fedilink
    English
    576 months ago

    Bane of my life as about a year ago my dad switched his sim and immediately started pestering me about not being able to log into his accounts.

    Yes he got rid of the old number completly and expected me to somehow make his logins work. This is still going on to this day when he complains to me something doesn’t work it’s because he’s tied it to his old phone number.