top | item 41282579

(no title)

salil999 | 1 year ago

I got around this by just editing the HTML. Worked like a charm

discuss

order

Someone1234|1 year ago

Also demonstrates how pointless that theater was.

A lot of GOOD malware don't "sniff keys" because that gives them random stream of garbage that has little value. No human is going to sit there and hand-decipher that garbage. Instead, they either inject browser extensions, intercept at the Win32 layer, or intercept the HTTP traffic upstream of the browser giving them the raw form-fields with URL which can be packaged and sold.

So all TreasuryDirect was doing, when they were doing this, was inconveniencing real people while the malware didn't even notice. Utterly insane. Glad someone had them quit it.

Grimblewald|1 year ago

a lot of efforts to prevent malpractice are like this. Anti-piracy software only really hurts paying customers for example.

Intralexical|1 year ago

These days I'd be scared that fails some biometric spyware and gets your entire account instantly banned+deleted with no recourse.

qingcharles|1 year ago

I found some sites recently that have big ASCII banners in the console log when you open devtools telling you to stop being naughty.

ericd|1 year ago

Yeah, you could just delete "readonly" from the input, then try the password manager autofill again. Thankfully no longer necessary.