this post was submitted on 17 May 2025
484 points (95.3% liked)

Technology Memes

360 readers
6 users here now

Welcome to Technology Memes. Here you can make memes and/or rant about technology, internet, computers, corporations, enshittification and etc.

Rules:

  1. Stay on-topic.
  2. Don't attack and harras anyone. Be nice.
  3. No racism and discrimination.
  4. No politics unless they're related to tech.
  5. No spam, no ads.
  6. No NSFW.
  7. Don't repost.

Please report any posts and comments that violate these rules.

Related communities:

founded 6 months ago
MODERATORS
 
top 50 comments
sorted by: hot top controversial new old
[–] [email protected] 20 points 3 days ago (4 children)

got hired by a new company. every fucking day I have to MFA to use the VPN. then I have to MFA to sign into email. Then MFA into tickets. MFA into confluence. MFA into git.

and then I have to do it all over again 4 hours later after lunch.

[–] [email protected] 3 points 2 days ago (1 children)
[–] [email protected] 2 points 2 days ago (1 children)

mid-size enterprise. my team has gone through 5 managers in 12 months.

they can't even with SSO right now lol

[–] [email protected] 2 points 2 days ago

It’s relatable

[–] [email protected] 2 points 2 days ago (1 children)

Same, but also add MFA to log into laptop.

[–] [email protected] 1 points 2 days ago

dude...I do that so often I completely glossed over it. 💀

[–] [email protected] 2 points 2 days ago

I've had good luck with bitwarden. It copies autofills the username and password, then once you submit, it copies the 2fa to your clipboard.

of course, it's a pro feature, so you'd either pony up or host vaultwarden assuming you can even install the plugin on your PC.

[–] [email protected] 1 points 2 days ago

Why not HSM?

[–] [email protected] 4 points 2 days ago

I'm glad that a pizza place has higher MFA requirements than many banks. We've made good decisions as a society for that to be true.

[–] [email protected] 4 points 2 days ago (1 children)

Like with insurance, it's far more worth spending an extra 2.5 seconds on 2fa than it is spending regaining your stolen identity and (potentially) ruined reputation (unless it's text based 2fa)

[–] [email protected] 3 points 2 days ago

2.5 seconds? You must be the fastest 2fa grinder

[–] [email protected] 72 points 4 days ago

You'll lose many more years if your accounts with sensitive content ever get compromised.

[–] [email protected] 37 points 4 days ago (5 children)

Every time I read comments on posts like these, it reaffirms to me how the average person does not give a shit about real security or is completely ignorant to how and why these extra safeguards are used. Lemmy, I would assume, has a higher than average tech knowledge amongst it's user base vs many other platforms, but the sentiment often that of, MFA and needing to login to a bunch of separate applications is too much work and the people that designed them don't know what they're doing. It's a bit disheartening.

[–] [email protected] 26 points 3 days ago* (last edited 3 days ago)

nah, you can care about security and also lose hours on MFA. for global enterprise, the overall user experience is far from optimal imho.

[–] [email protected] 2 points 2 days ago

At work I need multifactor for everything, but... ITS ALL THE SAME MICROSOFT ACCOUNT. We have SSO, but every single stupid webpage needs me to sign in separately with 2FA and forgets about me hours later. It's needlessly tedious.

[–] [email protected] 15 points 3 days ago (2 children)

GoDaddy sends a confirmation email for updating DNS. It does not ever arrive faster than 10 minutes from the time they claim they will send it, and sometimes it takes up to 15 minutes. The code expires in 20 minutes, so if you switch focus to something else in the mean time and miss the email and the code times out, you have to send another one and just sit there staring at the email inbox. I have lost hours of my life to GoDaddy MFA. Not all MFA is stupid, but their implementation is amazingly stupid.

[–] [email protected] 12 points 3 days ago

Another bigass reason why godaddy sucks lol

[–] [email protected] 5 points 3 days ago

Yes, I can't defend dog shit implementation. There are enough authenticator apps available that anyone reputable should use one instead of the less secure email or SMS.

[–] [email protected] 1 points 2 days ago (1 children)

I just use strong, unique passwords and be mindful when something is asking for my logins.

[–] [email protected] 1 points 2 days ago (1 children)

That should be the bare minimum for everyone, but it doesn't protect anything if a password is compromised, especially something like email that can lead to getting other passwords.

[–] [email protected] 1 points 2 days ago (1 children)

If your email is compromised, isn't 2FA also compromised?

[–] [email protected] 2 points 2 days ago (1 children)

I suppose in some cases, yea. I was thinking about authenticator apps as MFA and forgot about email. Ideally, all MFA would be through a separate authenticator. For stronger security, something like a ubikey or other hardware security device can be used.

[–] [email protected] 1 points 2 days ago

I don't even think I use websites that would use that. The only "app" like that is google using my phone for new logins. Every other 2fa uses my email. If it's not a google service, I'd prefer not to have to use an app because I treat my whole phone as insecure.

[–] [email protected] 7 points 3 days ago (3 children)

Do I really need TFA for social media? Or a forum? News sites? Fucking weather? Financial logins I get, but every single site requiring it is a cumulative time and hassle burden that is not worth it.

[–] [email protected] 1 points 2 days ago

I don't mean to sound rude but why would you need an account just to check weather

[–] [email protected] 4 points 3 days ago

I would say anytime where someone can impersonate you or make purchases as you deserves MFA. That's my risk tolerance, but it can differ obviously. I just feel that threshold is too low for a lot of people.

load more comments (1 replies)
[–] [email protected] 15 points 3 days ago (2 children)

The galaxy-brain move is to store the password in a password manager, and also have the same password manager store the TOTP. Finally, you set your password manager to unlock by biometric authentication

All of a sudden, you're set by just showing your fingerprint to the reader.

[–] [email protected] 15 points 3 days ago (2 children)

Only downside is that you can more likely be compelled to give up biometric authentication than a password (as far as I understand)

[–] [email protected] 2 points 2 days ago

Very true. But most of the places that will compel you also have no issue just compelling the companies you have accounts to give you up.

[–] [email protected] 5 points 3 days ago (2 children)

This is a threat I'm not planning to handle.

[–] [email protected] 12 points 3 days ago* (last edited 3 days ago) (1 children)
[–] [email protected] 4 points 2 days ago (1 children)

Physical security keys to the rescue!

Break it when you're in danger.

[–] [email protected] 3 points 2 days ago (2 children)

Or just invest in some real, physical security using all the crypto you've got to prevent something like this happening in the first place, that way you've got both physical and digital security to protect u rather than js one like some jokeman.

load more comments (2 replies)
[–] [email protected] 7 points 3 days ago

I have a very secure password protecting my password manager, and have set up all my passwords there to 123456

[–] [email protected] 26 points 4 days ago (16 children)

A minor annoyance now to avoid a major headache later. Worth the trade

load more comments (16 replies)
[–] [email protected] 16 points 4 days ago (1 children)

Oh you know your password? Fuck you. We’re sending an email to your second account and to verify that one we will text you.

[–] [email protected] 7 points 3 days ago* (last edited 3 days ago)

Let's say your account is logged into from 1000 miles away, wouldn't you want that account or device, whether it was you or an attacker, to prove itself?

In most cases, if you've logged in on a specific browser/device/account, unless you've cleared cookies, it doesn't constantly ask for MFA. but in my example above, a new IP, new device, or app, it should absolutely go "whoa, wtf is this" and make you verify.

[–] [email protected] 4 points 3 days ago (2 children)

they lost access to their account because of mfa or they just think it's a waste of time?

[–] [email protected] 2 points 2 days ago

It's not a waste of time, but God is does it waste time....

[–] [email protected] 5 points 3 days ago

I assumed it was cumulative use.

[–] [email protected] 14 points 4 days ago

Well, maybe. You said years plural, so let's take just two years. 2 years * 365 days a year * 24 hours a day * 60 minutes an hour is 1,051,200 minutes in two years.

Let's say that every time you use 2FA it's an extra 2 minutes. How many times a day do you use 2FA? That's probably the biggest variable. For some people it's a couple times a week, for others it's several times a day. Let's say 5 times a day. We also need to know how long you've been using 2FA. That's going to be another big variable. Does 5 years seem reasonable? If so, 5 years * 5 times a day * 365 days a year * 2 minutes each time = 18,250 minutes wasted on 2FA.

That's a small fraction of the million minutes in two years, but it could change a lot depending on some of the variables.

But on the other side, if even one time the 2FA stopped you getting your account hacked, the calculation would change a lot.

[–] [email protected] 9 points 4 days ago (4 children)
load more comments (4 replies)
load more comments
view more: next ›