this post was submitted on 31 Oct 2025
142 points (99.3% liked)

No Stupid Questions

44251 readers
535 users here now

No such thing. Ask away!

!nostupidquestions is a community dedicated to being helpful and answering each others' questions on various topics.

The rules for posting and commenting, besides the rules defined here for lemmy.world, are as follows:

Rules (interactive)


Rule 1- All posts must be legitimate questions. All post titles must include a question.

All posts must be legitimate questions, and all post titles must include a question. Questions that are joke or trolling questions, memes, song lyrics as title, etc. are not allowed here. See Rule 6 for all exceptions.



Rule 2- Your question subject cannot be illegal or NSFW material.

Your question subject cannot be illegal or NSFW material. You will be warned first, banned second.



Rule 3- Do not seek mental, medical and professional help here.

Do not seek mental, medical and professional help here. Breaking this rule will not get you or your post removed, but it will put you at risk, and possibly in danger.



Rule 4- No self promotion or upvote-farming of any kind.

That's it.



Rule 5- No baiting or sealioning or promoting an agenda.

Questions which, instead of being of an innocuous nature, are specifically intended (based on reports and in the opinion of our crack moderation team) to bait users into ideological wars on charged political topics will be removed and the authors warned - or banned - depending on severity.



Rule 6- Regarding META posts and joke questions.

Provided it is about the community itself, you may post non-question posts using the [META] tag on your post title.

On fridays, you are allowed to post meme and troll questions, on the condition that it's in text format only, and conforms with our other rules. These posts MUST include the [NSQ Friday] tag in their title.

If you post a serious question on friday and are looking only for legitimate answers, then please include the [Serious] tag on your post. Irrelevant replies will then be removed by moderators.



Rule 7- You can't intentionally annoy, mock, or harass other members.

If you intentionally annoy, mock, harass, or discriminate against any individual member, you will be removed.

Likewise, if you are a member, sympathiser or a resemblant of a movement that is known to largely hate, mock, discriminate against, and/or want to take lives of a group of people, and you were provably vocal about your hate, then you will be banned on sight.



Rule 8- All comments should try to stay relevant to their parent content.



Rule 9- Reposts from other platforms are not allowed.

Let everyone have their own content.



Rule 10- Majority of bots aren't allowed to participate here. This includes using AI responses and summaries.



Credits

Our breathtaking icon was bestowed upon us by @Cevilia!

The greatest banner of all time: by @TheOneWithTheHair!

founded 2 years ago
MODERATORS
 

Either by sending a code to SMS or Email, you are able to sign into your account without ever needing to or being able to add a password. Why has this become a thing recently?

top 50 comments
sorted by: hot top controversial new old
[–] jerkface@lemmy.ca 2 points 6 days ago* (last edited 6 days ago)

If the registration email is compromised, the attacker can reset the password. So the password doesn’t offer any additional security, in actual practice, over just testing control of the registration email address. If anything, passwords are less secure.

[–] BombOmOm@lemmy.world 70 points 1 week ago* (last edited 1 week ago) (5 children)

Side rant:

To make it worse, SMS is incredibly insecure. Nothing should send you codes via SMS, and if you have the option to use an authenticator app, do that. It's atrocious so many banks only have SMS as an option.

The really dumb part is, the SMS codes are literally the same authenticator algorithm, but running on their servers and sent to you via an insecure medium.

[–] 9tr6gyp3@lemmy.world 29 points 1 week ago (1 children)

And one little lapse in not paying a cell phone bill can cause you to lose your phone number, which then means you can no longer authenticate.

[–] HubertManne@piefed.social 9 points 1 week ago

this is why I don't like it and why I often advocate that countries should provide a secure email that you can come to an office in person if you can't get to it. People get mad as if Im suggesting it should be the only email they have but what I really want is a guaranteed thing that is made as secure as possible and allows for real in person support to make sure you can get access or stop someone that somehow got access.

[–] ultranaut@lemmy.world 10 points 1 week ago

This shit drives me nuts. I've put in a lot of effort to secure my accounts but a number of them require SMS without any opt out. We have known about the risks of SMS plenty long enough at this point.

[–] madcaesar@lemmy.world 7 points 1 week ago (5 children)

I never understood why SMS is insecure, are you saying it's easy to intercept someone's number? How would that even work without the SIM?

[–] Tanoh@lemmy.world 12 points 1 week ago

Getting a replacement SIM from the phone company is often shockingly easy, just a tiny bit of social engineering. And then you have access to the number and everything that 2FA "protects"

[–] BombOmOm@lemmy.world 10 points 1 week ago

Veritasium did a great video on it. Anything I can say about it will be 10x worse than that video.

[–] AA5B@lemmy.world 7 points 1 week ago

It is but only if you are targeted. I completely disagree with people who say it’s insecure because most attacks are remote and in bulk. Which your password they can login from any browser but are stopped by the SMS code.

For the SMS code they can use mostly automated social engineering to trick a certain percentage into giving it up.

However while A SIM attack may be easy enough for a targeted individual, I don’t think it scales: they have to do work that only helps with one user. It’s too “expensive” compared to automated social engineering against a million vulnerable users

[–] bdonvr@thelemmy.club 3 points 1 week ago

The most common way is basically calling up your phone company and pretending to be you saying you needed to switch phones

But also beyond just that the networks that route calls and texts globally are not very secure... and it's not as hard as it should be to get access to it.

[–] FreedomAdvocate@lemmy.net.au 2 points 1 week ago

It's all just a big "in theory" really. It's "insecure" in that if someone knows the telco you are with, and the telco that you're with doesn't follow procedures to verify that a caller is who they say they are, you could have someone else steal your phone number by getting a replacement sim card sent to them.

In reality it's nothing to worry about. Like..........at all. Every telco I've been with sends you a sms to confirm that you requested a new SIM card, and that's after they've confirmed that you are who you say you are via sending you a code on your phone number or email.

[–] Ironfist@sh.itjust.works 3 points 1 week ago

its also very inconvenient if you are outside of the country and dont want to pay for roaming. Cellphone providers should offer a way to forward sms messages to an email address, their own webpage or an app.

load more comments (1 replies)
[–] stinerman@midwest.social 51 points 1 week ago (1 children)

It is coding for the lowest common denominator of user -- those who use the same easily-guessable password for everything. Making them click a link to login is honestly better security.

Of course there should be an option for those of us who have a TOTP app and use a password manager.

[–] neidu3@sh.itjust.works 3 points 1 week ago (1 children)

Can't brain today, I have the dumb. What's TOTP, other than that BBC show?

[–] dbx12@programming.dev 19 points 1 week ago (5 children)

Time based one time passwords. Those (usually) six digit codes which get replaced every 30 seconds or so. During setup you copied the secret to your device (usually smartphone) and now your device and the server you authenticate at can calculate the same secret code every thirty seconds.

load more comments (5 replies)
[–] AA5B@lemmy.world 23 points 1 week ago (2 children)

Personally I’m frustrated with always having to give a working phone number to accounts.

I have no idea if I’ve been at all successful in poisoning my data but all my accounts use unique generated emails in addition to generated passwords and fake profile info. It’s just habit now.

However all too often the one piece of real data I have to give is my phone number, and that would be really useful to cross-link all my accounts for data brokers building a dossier on me.

I have hundreds of fake emails but can create at most a couple phone numbers

load more comments (2 replies)
[–] kambusha@sh.itjust.works 17 points 1 week ago (1 children)

Outsourcing the securiry risk to a third-party

[–] kn33@lemmy.world 4 points 1 week ago

Yup. "That's not on me! Your email was compromised! That's between your email provider and you!"

[–] LuigiMaoFrance@lemmy.ml 16 points 1 week ago* (last edited 1 week ago) (2 children)

I'm paranoid so I view passkeys and similar streamlined login mechanisms as a way to make it easy for police to access your entire digital life once they unlock your phone.

This is why manufacturers started pushing biometric unlocking so hard. Once someone has access to your person and phone they no longer need PINs or passwords to gain access to everything.

[–] ilinamorato@lemmy.world 6 points 1 week ago (1 children)

Most phone OSes now have a "lockdown mode" which temporarily disables biometric authentication until you use a PIN to unlock it.

load more comments (1 replies)
load more comments (1 replies)
[–] ilinamorato@lemmy.world 12 points 1 week ago (1 children)

They're offloading authentication to your email provider. It's basically quick and cheap oauth. I think it's because they're trying to avoid being a vector for a data breach.

[–] rekabis@lemmy.ca 3 points 1 week ago (2 children)

The irony being that putting all of a user’s eggs in one basket makes things far riskier for the user, and not less.

[–] jerkface@lemmy.ca 3 points 1 week ago* (last edited 1 week ago)

Smearing authentication credential data out across the entire Internet makes a sloppy user safer because the inevitable breeches that come with being sloppy are contained, but it increases the demands on a safe user while also increasing their attack surface. Though such a user does typically have a single point of failure in the form of their own sloppy password management.

[–] corsicanguppy@lemmy.ca 11 points 1 week ago

Because people don't realize how ridiculously insecure SMS and (usually unencrypted) email are.

It's just kids who never had a mentor.

[–] Saltarello@lemmy.world 9 points 1 week ago* (last edited 1 week ago) (2 children)

My previous bank does this sends an SMS. Extremely insecure & also pointless if a would be thief has my phone (if im stupid enough to use no/easily guessable PIN) or has compromised it.

Is there not an argument that password managers have been around long enough now that anyone reusing logins & easily guessable passwords responsible for their own stupidity? We all know not to leave our doors & windows wide open when we go on vacation.

[–] vrighter@discuss.tchncs.de 11 points 1 week ago (1 children)

banks have the most obnoxious, yet the stupidest security measures.

[–] AA5B@lemmy.world 6 points 1 week ago (1 children)

Banks are the web sites most likely to reject a generated password from my password generator

[–] ozymandias117@lemmy.world 6 points 1 week ago (1 children)

It's been a few years, I dont know if they ever fixed it...

However, at least as of 2022, Wells Fargo (the 4th largest bank), had case insensitive passwords.

If you made your password hUnTer2, you could also log in with HUNTER2, hunter2, HUntEr2, etc.

load more comments (1 replies)
[–] erev@lemmy.world 2 points 1 week ago (2 children)

you underestimate how bad a lot of people are at using technology. something like banking can be a necessity and must be accessible to all. many banks should encourage more secure MFA but i understand why they can't require it.

load more comments (2 replies)
[–] mlg@lemmy.world 9 points 1 week ago

gg ez ease of use feature, which is hilarious because that's exactly where smishing attacks come in. People are actually more willing to give out the OTP than their actual password, so it definitely less secure.

I think this started out as a decently good idea, like sign in with a device type of feature (think QR code from an authenticated device), but then along the way someone just went "screw it" and changed it to an OTP.

Even in 2025 password managers are rare, people still reuse the same 8 character password everywhere, and people fall for low effort scams. So someone thought "if they're gonna be insecure anyway, lets just make it so they never have to use a password and sync it to their phone or email".

[–] MrsDoyle@sh.itjust.works 7 points 1 week ago (1 children)

I hate the SMS ones, because I don't have a good phone signal in my home, so I have to ruin around trying to get a couple of bars so I can get the effing code. My banking app just uses a fingerprint.

[–] Funky_Beak@lemmy.sdf.org 3 points 1 week ago (1 children)

Check out if your router and provider supports SIP. It allows sms and calls over your wifi connection

load more comments (1 replies)
[–] kepix@lemmy.world 6 points 1 week ago (2 children)

i have no proof, but im semi sure that this way you cannot sign up with a temp mail or temp sms, so you are kinda forced to use your real data, which means the site is selling your data

[–] jerkface@lemmy.ca 4 points 1 week ago* (last edited 1 week ago)

You can generate one-time-use email addresses by using the little-know mailbox field of the email address format:

kepix+you_can_write_anything_here_and_it_will_reach_your_inbox@gmail.com

Obviously this will not fool a human being into thinking you are a different person, but I have never encountered authentication code that treats two mailboxes at the same address to be the same person. This is useful for identifying the source of data breaches, when you start getting phishing attacks at your "kepix+reddit.com@gmail.com" address, and makes it trivial to train your spam/important filters.

load more comments (1 replies)
[–] CobblerScholar@lemmy.world 4 points 1 week ago (1 children)

Can't be liable for theft if there were no locks?

well, in case of sending an email with a temporary access code it's not different than using the "forgot password" link

[–] wesker@lemmy.sdf.org 4 points 1 week ago

It's an immediate red flag for me.

[–] HeerlijkeDrop@thebrainbin.org 3 points 1 week ago

Which services? I haven't stumbled upon a single one

[–] HubertManne@piefed.social 3 points 1 week ago

From my experience things like this are not important services. they are things where I keep the password in an online password service which I won't do for anything important.

[–] solrize@lemmy.ml 2 points 1 week ago (1 children)

Too many big password breaches also occurred to me.

But that's what MFA is there for, although they shouldn't be using SMS as one of the possible factors - let alone the main one, as seems to be the case.

load more comments
view more: next ›