this post was submitted on 21 Oct 2025
633 points (97.7% liked)

memes

17788 readers
2383 users here now

Community rules

1. Be civilNo trolling, bigotry or other insulting / annoying behaviour

2. No politicsThis is non-politics community. For political memes please go to !politicalmemes@lemmy.world

3. No recent repostsCheck for reposts when posting a meme, you can only repost after 1 month

4. No botsNo bots without the express approval of the mods or the admins

5. No Spam/Ads/AI SlopNo advertisements or spam. This is an instance rule and the only way to live. We also consider AI slop to be spam in this community and is subject to removal.

A collection of some classic Lemmy memes for your enjoyment

Sister communities

founded 2 years ago
MODERATORS
 
all 38 comments
sorted by: hot top controversial new old
[–] MamaSharon@lemmy.world 0 points 28 minutes ago

Tired of the 9–5 grind? Got a dream business waiting to take off? If you’re trustworthy and ready for a change… Big Mama’s got you! 💰 today and kiss those money worries goodbye! 🚀 DM YES BIG MAMA And where you from?

[–] laserm@lemmy.world 3 points 2 hours ago (1 children)

At least make it if !isPasswordCorrect || isFirstTry

[–] Samskara@sh.itjust.works 1 points 58 minutes ago

guard isFirstAttempt { return LoginError(); }

[–] blockheadjt@sh.itjust.works 4 points 2 hours ago

Center guy's hair got visibly lighter from the stress

[–] thatradomguy@lemmy.world 1 points 1 hour ago

The only part that works is that I get to keep my trust issues.

[–] the_grass_trainer@lemmy.world 2 points 2 hours ago

Is this Tron: Ares?

[–] Johanno@feddit.org 29 points 12 hours ago

Even worse the silent invalidation of a correct password.

Use password manager.

Can't log in, because "password is incorrect"... Fuck you! It is not! I copied in the same fucking thing as months before! If you want to force me to change it then say it! Asshole!

[–] falseWhite@lemmy.world 14 points 15 hours ago

I swear Microsoft does that.

[–] db2@lemmy.world 157 points 1 day ago (2 children)

isFirstSuccessfulLoginAttempt

Important distinction.

[–] funkless_eck@sh.itjust.works 4 points 11 hours ago
  SessionSuccessfulLogins == 1
[–] dalekcaan@feddit.nl 32 points 1 day ago (4 children)

Yeah, as it is it only works if the brute force algorithm gets it on the first try.

[–] TheseusNow@lemmy.zip 1 points 7 hours ago

Not even then. Brute force cracking programs don't rely on the server to indicate if the attempted password is correct.

[–] atopi@piefed.blahaj.zone 9 points 17 hours ago

Or the variables are terribly named

[–] Jimbabwe@lemmy.world 4 points 20 hours ago

Boho sort is O(1) in the best case scenario

[–] Simulation6@sopuli.xyz 0 points 15 hours ago

No, it just means you have to type in the correct password twice in a row.

[–] snooggums@piefed.world 16 points 1 day ago (4 children)

How does this 'kinda work'?

[–] TheseusNow@lemmy.zip 4 points 7 hours ago (1 children)

It doesn't. Cracking programs don't use the user login form repeatedly. They use the same algorithm that creates the publicly encoded password to generate encoded passwords and keep going until they have a match. Besides getting the encoded password and salt, everything is done offline.

This just creates a really bad user experience.

[–] camelbeard@lemmy.world 1 points 2 hours ago

If they actually use the real login form, most websites block an account after X attempts. Sometimes for 1-24 hours, sometimes until you do a PW reset

[–] MyTurtleSwimsUpsideDown@fedia.io 73 points 1 day ago (1 children)

It rejects the first [correct] login attempt (it’s worded poorly). It assumes that a brute force attacker will try any given password once and move on, while a human user will think they made a typo and try again. This works until the attacker realizes that it takes two attempts, in which case it merely doubles the attempts required to breach the account, and simply requiring an additional password character would be vastly more effective.

[–] snooggums@piefed.world 38 points 1 day ago (5 children)

What a shitty user experience for regular users.

[–] dreadbeef@lemmy.dbzer0.com 93 points 1 day ago (1 children)

which is why they made a comic instead of a revolutionary thought leading blog post

[–] taiyang@lemmy.world 13 points 23 hours ago

Hey now, I'm sure there's someone on LinkedIn suggesting this exact thing with layers of corporate speak.

[–] Smoogs@lemmy.world 4 points 16 hours ago

Yup it’s like how software companies will get a hate on for pirates and take it out on their loyal paying cutosmers

[–] petersr@lemmy.world 4 points 16 hours ago

Look, we all need to pay a little for the greater good of security.

/s

[–] ICastFist@programming.dev 17 points 1 day ago

Just like captcha

Agreed, and also makes it readily known that that is what you are doing.

The sneakier more user friendly way to implement it would be to require the second correct attempt only if the user has made an incorrect attempt since the last successful login.

[–] black0ut@pawb.social 23 points 1 day ago

All tools that bruteforce passwords attempt each password only once, and if it doesn't work, discard it. Nobody really runs 2 identical attacks back to back (they're incredibly slow when done over the internet), so the password would seem uncrackable at first glance.

This approach wouldn't work with hash cracking, vault breaking or file encryption, because once they get their hands on the hash/vault/file, the attacker can use their own code for hashing/checking a password candidate.

[–] Kolanaki@pawb.social 6 points 1 day ago (1 children)

They'll change the correct password every time because they are told it is wrong.

[–] MonkeMischief@lemmy.today 2 points 21 hours ago

Don't worry, a not-insignificant number of users probably use "Forgot Password?" every time because they can't keep track of the correct one. Lol

I suspect this is why we started to see all those "use a temporary password instead" options lately. XD