Yeah we did it this way on an app I worked on in the past, try the verbatim input and then a couple of minor variations in casing if it didn't work.
I've also found that for email fields you need to be careful to normalize the input (trim, casing) as safari had a habit of autocorrecting the first character to be a capital
Sounds like the requirement might be for the case insensitivity of the first character to only be for some platforms (eg mobile devices where autocapitalisation might have happened).
In that case this solution would have the disadvantage that it wouldn’t be platform specific.
Of course they hash the password. Of course they don't know the capitalised version of your saved password, but they can know the capitalised version of the password you just entered
Assuming the password is sent over the wire (rather than the salt being sent to the client, the client doing the hash, and sending the hash), the password will be stored in memory while the login process runs
Certainly it’s not definitive though. This could easily be accomplished by storing multiple hashes, or multiple password checks that alter the user input, but still have Google keeping hashed passwords. Definitive example could be something like them doing a password recovery where they send you a plaintext version of your current password.
cotillion|4 years ago
mnahkies|4 years ago
I've also found that for email fields you need to be careful to normalize the input (trim, casing) as safari had a habit of autocorrecting the first character to be a capital
chris_l|4 years ago
nimchimpsky|4 years ago
[deleted]
morsch|4 years ago
Raed667|4 years ago
So now you have to create 2 flows, those before the new policy and those that were set after the normalization.
Closi|4 years ago
In that case this solution would have the disadvantage that it wouldn’t be platform specific.
achairapart|4 years ago
> Looks like the app is clever enough to try changing the case of the first letter if the first attempt fails.
Still, looks like a compromise between usability and security/reduced password entropy.
doubleorseven|4 years ago
baybal2|4 years ago
williamdclt|4 years ago
Dylan16807|4 years ago
coredev_|4 years ago
iso1210|4 years ago
Normal password code would be
This would presumably be So while the password is 'stored' in the server side heap, it's no different to normal password 'storage'If the hash is done in the client it's the same, just the client sends two attempts rather than one.
nicoburns|4 years ago
pfarrell|4 years ago
Dylan16807|4 years ago
unknown|4 years ago
[deleted]