this post was submitted on 13 Mar 2026
297 points (98.4% liked)

Programmer Humor

30322 readers
3076 users here now

Welcome to Programmer Humor!

This is a place where you can post jokes, memes, humor, etc. related to programming!

For sharing awful code theres also Programming Horror.

Rules

founded 2 years ago
MODERATORS
 
top 48 comments
sorted by: hot top controversial new old
[–] LiveLM@lemmy.zip 16 points 57 minutes ago* (last edited 57 minutes ago) (1 children)

The best I've seen was yesterday where a website had the log-in button greyed out after the password manager filled my creds in.
So I had to manually click both the email and password field. Just click them. Then it enabled the log-in button.
So someone took their time to write a piece of JS that said "If the user hasn't focused both fields at least once, no login". Literally why? Extra code that does nothing useful.


I was hoping passkeys would be the solution to this madness, but it seems to me the entire spec gives too much power to the OS Makers and too little to the users because "mUh AtTtEsTatIoN" so now I don't know anymore

[–] Gumbyyy@lemmy.world 1 points 7 minutes ago

I've definitely run into that. Even more frustrating is when there was one particular site that forced me to actually delete the last character of my password and then retype it. Just focusing in the field wasn't enough, I had to actually send it a keystroke. And Ctrl-V to paste the password in manually didn't count. I suppose typing a random character at the end and then deleting it would have worked too.

[–] paequ2@lemmy.today 17 points 1 hour ago (1 children)

God I hate those stupid magic links. They're WAAAAYYY slower than just using my password manager.

AND they kinda contribute to locking you into Big Tech. I sometimes have problems with those stupid links because I don't have a Gmail account. Somewhere along the stupid chain there's probably some stupid check that delays or blackholes emails to non-big-tech domains.

[–] definitemaybe@lemmy.ca 2 points 25 minutes ago

Based.

Email is terrible. It's an unreliable communication system. You cannot depend on sent emails arriving in the recipient's mailbox—even the spam folder.

People indirectly assume that all emails at least get to their spam folder. They don't. There are multiple levels of filters that prevent most emails from ever making it that far because most email traffic is bots blasting phishing links, scams, and spam. Nobody wants phishing and scam emails, but the blocks that prevent those are being used by big tech to justify discriminating against small mail servers.

I can't remember the site, now, but I literally couldn't log into one this week because the email never arrived.

[–] criticon@lemmy.ca 1 points 2 minutes ago

Or worse:

Use email link -> use password instead

Enter password

Now enter the code that we sent you your email...

[–] MaggiWuerze@feddit.org 92 points 2 hours ago (5 children)

Also This strange trend to split username and password on to two separate pages, or only showing the password field after confirming the username

[–] bobo@lemmy.ml 14 points 1 hour ago (1 children)
  1. Username
  2. Password
  3. MFA
  4. Do the whole process all over again because the remember this device is on step 2 and it's impossible to go back

Bonus stage 0: special login URL decided to crap out, and going back to any point in history automatically redirects to the error page that you can't use to log in, so you need to keep going back and trying to copy the URL before it redirects becausw Firefox interprets pressing "stop" as "do whatever you want idk"

Fucking aws...

[–] Sabata11792@ani.social 4 points 26 minutes ago

You forgot step 2.5: incorrectly identifying stoplights 6 times in a row.

[–] neidu3@sh.itjust.works 39 points 2 hours ago* (last edited 2 hours ago) (3 children)

Not that strange. Different users may belong to different groups which may have different authentication backends. The associated authentication method is brought up once a username has been provided.

[–] lime@feddit.nu 13 points 1 hour ago

if your choice of api route directly affects your auth flow something is very wrong.

[–] paraphrand@lemmy.world 3 points 1 hour ago

Yes, but, it also lets them slurp up email addresses. Routing users is legit tho.

[–] atomicbocks@sh.itjust.works 1 points 55 minutes ago

You can do that as part of an OAuth workflow. You don’t need to have them on separate pages for that to happen.

[–] IcedRaktajino@startrek.website 25 points 2 hours ago* (last edited 2 hours ago)

And the auto-submitting TOTP entry form where you're apparently not allowed to make a typo. And obscuring the TOTP number like it's a password or state secret.

[–] bamboo@lemmy.blahaj.zone 15 points 2 hours ago (1 children)

This is because of Enterprise Single Sign On. You can try this for yourself by going to https://gmail.com/ and enter the email of a public person at a large org, for example the CEO of Doordash (tony@doordash.com). After you enter the email, you get sent to Doordash's employee portal to authenticate. Based on the email you provide, Gmail has to figure out if you need to provide a password to gmail itself or if the email authenticates another way.

[–] Jesus_666@lemmy.world 6 points 1 hour ago (1 children)

It's not like you can't add a "Log in with your company's SSO" button to the form. That works just fine and at least Microsoft does something like that.

[–] bamboo@lemmy.blahaj.zone 0 points 1 hour ago (2 children)

Not sure I'd take design inspiration from Microsoft of all places. Also https://login.live.com/ has the same workflow email -> continue -> password. Not sure where you're seeing Log in with SSO option.

[–] Gumbyyy@lemmy.world 1 points 5 minutes ago

I see the Login with SSO option all over the place. Of course, that assumes the users actually understand what that means, and they know whether or not they need to click it.

[–] Jesus_666@lemmy.world 1 points 40 minutes ago* (last edited 40 minutes ago) (1 children)

My company uses Entra ID (or whatever they've renamed it to this week) and it's a pretty common sight in our login flow. I think our SharePoint instance does it so it should be something MS does.

Of course it all depends on w how the company configures it.

[–] bamboo@lemmy.blahaj.zone 1 points 19 minutes ago

Ok, I think I get what you're saying. You mean have a different form input without the password, like how it's done here: https://eu.app.orcasecurity.io/login? I guess that's one way to do it, but it's not really intuitive from a user perspective, since the first thing you see is a password field, and then think you don't have access because you don't have a password. This one comes to mind because I have had to tell people to click the tab for the email only field, not email and password.

[–] kibiz0r@midwest.social 3 points 2 hours ago

1Password handles this gracefully

[–] lung@lemmy.world 40 points 2 hours ago (1 children)

HEY BUT DO YOU WANT TO USE A PASSCODE?? PASSCODE! PASSCODE! USE THE PASSCODE! -_-

[–] Psychodelic@lemmy.world 7 points 2 hours ago (2 children)

Yeah what the hell is up with that one? Seems so sketchy

[–] panda_abyss@lemmy.ca 8 points 1 hour ago* (last edited 1 hour ago) (2 children)

Passkeys are okay, but your browser and OS want you to use them because you can’t just take a passkey to another platform, you have to create a new one, and it’s a pain in the ass.

It’s a lock-in gimmick latching on to a real useful solution.

[–] 4am@lemmy.zip 9 points 1 hour ago

Password managers can hold Passkeys now and they’re portable. Bitwarden stores all of mine, use them on any machine.

[–] bdonvr@thelemmy.club 2 points 44 minutes ago

That's false. My passkeys sync to my password manager and are available on all my devices

[–] voidsignal@lemmy.world 5 points 2 hours ago* (last edited 2 hours ago)

Passkeys are fine. It's just MTLS but by marketers (if by passcode you mean passkeys. otherwise, what's a passcode?)

[–] manxu@piefed.social 4 points 1 hour ago

It feels like the factors of authentication discussion misses one important aspect: can the factor be replayed. Passwords can be replayed indefinitely, while the email links you get or the OTP token only work for a short period of time.

I remember it from the bad days when I used LastPass. Suddenly I got a notification that the place had been compromised and I had to suddenly change hundreds of passwords. 90% of them were for sites that didn't even exist any longer, but sifting through the long, long list to go change passwords was more work than I wanted to do.

Don't have to do that if I need to use a one-time token via Aegis or email! I do agree, though, that for low risk sites, username/password is totally fine.

[–] HuntressHimbo@lemmy.zip 16 points 2 hours ago (1 children)

Ah but you see it's one factor of authentication that also conveniently loops in whichever email provider is spying on you

[–] voidsignal@lemmy.world 3 points 2 hours ago

Of course. How would Microslop or Google LLMs snoop on your data then? You guys really make no effort.. /s

[–] Assassassin@lemmy.dbzer0.com 11 points 2 hours ago (2 children)

Just let me use passkeys at this point. The way that people typically use passwords is less secure anyway, why not just make it as simple as possible?

[–] Anafabula@discuss.tchncs.de 2 points 31 minutes ago

I would love to use my physical Yubikey, but all the websites I've seen that allow passkey login always deny both Yubikeys.

[–] bleistift2@sopuli.xyz 9 points 2 hours ago (4 children)

I forget. Are passkeys the access method that prevents you from logging in ever again if you lose access to a device?

[–] bdonvr@thelemmy.club 2 points 43 minutes ago

No? My password manager holds them so they are available everywhere...

[–] Assassassin@lemmy.dbzer0.com 9 points 1 hour ago (1 children)

Typically, no. You're thinking of TOTP/Authenticator based 2FA. Those still come with backup codes in case you break the phone that has the TOTP codes warehoused. I always recommend keeping those backup codes saved in the notes of whatever password manager you're hopefully using.

Passkeys are essentially just one half of a cryptographic key pair (like what you'd use for authenticating SSH without passwords). These allow you to authenticate once using password + 2FA, then use the generated passkey for future sessions. Since these are much more complex than passwords and remove the need to actually remember anything, they are significantly more secure.

There are also some other features that I'm forgetting, and that may not be a perfectly accurate description, but I think you can get the gist.

[–] Jesus_666@lemmy.world 4 points 1 hour ago (1 children)

Passkeys are supposed to be bound to one device and protected by that device's OS's secure enclave. If you have a second device you're supposed to create a second passkey.

That's why many sites will flat out refuse to let you create a passkey with a desktop browser since a PC-stored passkey doesn't fit the security model.

[–] Assassassin@lemmy.dbzer0.com 1 points 50 minutes ago

Yeah, that's how I understood it to work, as well. I didn't mention it because I've seen a bunch of different implementations that don't seem to work that way. I didn't want to speak too much on that specific point, since I don't have a very thorough understanding of it.

[–] 4am@lemmy.zip 2 points 1 hour ago

Only if you use the OS built-in saving.

Most password managers support them at this point, making them portable and secure.

[–] Brkdncr@lemmy.world 1 points 48 minutes ago

The amount of security threat encouragement in these comments is impressive.

[–] Deebster@infosec.pub 5 points 2 hours ago

My email uses greylisting which is where the first email received from a server gets a "busy" response - the idea being that spammers just fire and forget whereas real mailers will retry.

Unfortunately, some senders take so long to resend that it's timed out. The second time will work though. Unless they have multiple servers. Some have so many servers that you have to do this a multitude of times until you lose the will to login or forget what you were going to do anyway.

[–] bamboo@lemmy.blahaj.zone 3 points 2 hours ago (1 children)

I can imagine that the sites want to validate that you still have access to the email associated with the account, and asking people to check their settings is annoying, and they know no one will do it. I can also imagine that sites want to know as much about you as possible, don't want you to be using burner email addresses, and are probably selling the fact that your email address can still receive email to marketing firms who compile that info.

[–] Sprinks@lemmy.world 5 points 2 hours ago

Annual/routine email verification fills that need, though. For the sites i do support desk for, an email verification link is sent during account creation and then annually. If the email address is not verified then on login the account holder is prompted to either resend the verification link or change it and verify the new email.

[–] etherphon@piefed.world 1 points 1 hour ago

Passwords are quite insecure and people write them down on shit and forget them, I vastly prefer it too, but they're going to die out, probably rather soon, so be prepared.

[–] lessthanluigi@lemmy.sdf.org 1 points 2 hours ago

Hearing this in Spongebob's voice is amazing!

[–] Switorik@lemmy.zip 0 points 2 hours ago (1 children)

I weirdly don't mind the email method. I don't like copy pasting my passwords because I feel it's less secure than typing it out.

Now I wouldn't mind if it was an option.

[–] SW42@lemmy.world 9 points 2 hours ago (2 children)

That’s why you use password managers.

[–] Switorik@lemmy.zip 1 points 1 minute ago

I do use them, I don't use them for auto complete.

[–] bamboo@lemmy.blahaj.zone 2 points 1 hour ago

No need, just use Forgot Password for every login. No password manager needed /s