this post was submitted on 08 Aug 2025
28 points (88.9% liked)

Cybersecurity

8629 readers
3 users here now

c/cybersecurity is a community centered on the cybersecurity and information security profession. You can come here to discuss news, post something interesting, or just chat with others.

THE RULES

Instance Rules

Community Rules

If you ask someone to hack your "friends" socials you're just going to get banned so don't do that.

Learn about hacking

Hack the Box

Try Hack Me

Pico Capture the flag

Other security-related communities !databreaches@lemmy.zip !netsec@lemmy.world !securitynews@infosec.pub !cybersecurity@infosec.pub !pulse_of_truth@infosec.pub

Notable mention to !cybersecuritymemes@lemmy.world

founded 2 years ago
MODERATORS
 

I remember hearing before that it's a sign they are storing your info unencrypted but I never checked.

Is this true? I was logging into a .gov website and noticed it does that.

you are viewing a single comment's thread
view the rest of the comments
[–] p_consti@lemmy.world 67 points 3 months ago (22 children)

The only thing that needs to be encrypted or hashed is the password.

But telling that an email is already in use is leaking information. A bad actor can use this to figure out if you are using a particular service, or alternatively try random email addresses and check if they belong to a real user. This is why it's usually encouraged to just say "invalid combination of username/email and password", instead of specifying which is incorrect.

[–] Randelung@lemmy.world 2 points 3 months ago (1 children)

User registration will still need to check if the email is the user id (which I loathe).

[–] p_consti@lemmy.world 4 points 3 months ago

Not necessarily. If it's implemented well, the frontend will just show a "success" message, but the email sent will be different. This way, the owner of the account will know if they already have an account, or if it wasn't them, that someone else tried to use their email. Meanwhile the bad actor won't know anything new.

load more comments (20 replies)