• 6nk06@sh.itjust.works
    link
    fedilink
    English
    arrow-up
    76
    arrow-down
    3
    ·
    2 days ago

    Password managers check the URL before giving its data. A human being can be fooled into giving it to a fake web site.

    • MentalEdge@sopuli.xyz
      link
      fedilink
      English
      arrow-up
      45
      arrow-down
      3
      ·
      edit-2
      2 days ago

      TBF, they can be fooled too.

      Bitwarden warns against using autofill on load for that very reason, as then simply loading a malicious page might cause it to provide passwords to such a site.

      And then, a human when a site doesn’t autofill, is more likely to just go “huh, weird” and do it manually.

      • lmmarsano@lemmynsfw.com
        link
        fedilink
        English
        arrow-up
        2
        ·
        23 hours ago

        they can be fooled too.

        Makes it harder: when I go to the wrong website, the manager simply doesn’t suggest credentials (it does not have) for it. That causes me to wonder why.

        Without a password manager, a user is never prompted to wonder. They’d simply not notice.

      • Darkassassin07@lemmy.ca
        link
        fedilink
        English
        arrow-up
        18
        ·
        edit-2
        2 days ago

        You’ve always got the human element, bypassing security features; but extra little hurdles like a password manager refusing to autofill an unknown url is at least one more opportunity for the user to recognize that something’s wrong and back away.

        If you’re already used to manually typing in the auth details, you may not even have an opportunity to notice you’re not on the site you were expecting.

        • gaylord_fartmaster@lemmy.world
          link
          fedilink
          English
          arrow-up
          1
          arrow-down
          2
          ·
          23 hours ago

          Someone manages to maliciously sneak username and password fields onto a site that store what is entered as soon as it’s typed. They don’t even have to be visible to the user and bitwarden will fill them in as soon as the page loads.

            • gaylord_fartmaster@lemmy.world
              link
              fedilink
              English
              arrow-up
              2
              ·
              21 hours ago

              Right, “maliciously sneak”, as in they’ve either gained access to make changes to the site ditectly, or they’ve found a way to inject their scripts to steal creds.

              • Serinus@lemmy.world
                link
                fedilink
                English
                arrow-up
                3
                ·
                edit-2
                20 hours ago

                And how is that any different from not having a password manager?

                Yes, if someone hijacks a domain they can get credentials intended for that domain. A password manager doesn’t make a huge difference here, because why would they make the site look any different than normal?

                • gaylord_fartmaster@lemmy.world
                  link
                  fedilink
                  English
                  arrow-up
                  1
                  arrow-down
                  1
                  ·
                  21 hours ago

                  They don’t even have to be visible to the user and bitwarden will fill them in as soon as the page loads.

                  I guess you didn’t read most of the comment.

                  • Cocodapuf@lemmy.world
                    link
                    fedilink
                    English
                    arrow-up
                    3
                    ·
                    edit-2
                    12 hours ago

                    No, he did, here’s where the confusion is.

                    Serinus is asking if the site in question needs to be compromised. In other words, can the attacker compromise a random site to fool your password manager into entering credentials for Gmail.com, or does the attacker have to compromise Gmail.com to do that?

                    Because those two attacks are very different levels of complexity.

                    And frankly, if someone compromises the site you’re actually trying to visit, there’s simply no defense against that at all.