this post was submitted on 21 Oct 2025
65 points (95.8% liked)

memes

18618 readers
3007 users here now

Community rules

1. Be civilNo trolling, bigotry or other insulting / annoying behaviour

2. No politicsThis is non-politics community. For political memes please go to !politicalmemes@lemmy.world

3. No recent repostsCheck for reposts when posting a meme, you can only repost after 1 month

4. No botsNo bots without the express approval of the mods or the admins

5. No Spam/Ads/AI SlopNo advertisements or spam. This is an instance rule and the only way to live. We also consider AI slop to be spam in this community and is subject to removal.

A collection of some classic Lemmy memes for your enjoyment

Sister communities

founded 2 years ago
MODERATORS
 
top 22 comments
sorted by: hot top controversial new old
[–] Johanno@feddit.org 10 points 2 months ago (1 children)

Even worse the silent invalidation of a correct password.

Use password manager.

Can't log in, because "password is incorrect"... Fuck you! It is not! I copied in the same fucking thing as months before! If you want to force me to change it then say it! Asshole!

[–] mckean@programming.dev 5 points 2 months ago

sorry, but your new password cannot be the same as your current one.

[–] db2@lemmy.world 10 points 2 months ago (1 children)

isFirstSuccessfulLoginAttempt

Important distinction.

[–] dalekcaan@feddit.nl 3 points 2 months ago (2 children)

Yeah, as it is it only works if the brute force algorithm gets it on the first try.

[–] atopi@piefed.blahaj.zone 3 points 2 months ago

Or the variables are terribly named

[–] Jimbabwe@lemmy.world 0 points 2 months ago (1 children)

Boho sort is O(1) in the best case scenario

[–] sga@piefed.social 0 points 2 months ago (1 children)

i guess you mean bogo sort? just verifying that output is sorted requires O(n). In Quantum bogo sort, you can skip verification.

[–] Jimbabwe@lemmy.world 2 points 2 months ago (1 children)

Yeah, stupid autocorrect. And verifying ain’t the same as doing. I’ll come in, I’ll “sort” your data, and I’ll do it damn fast. You want verification that’s extra!

[–] sga@piefed.social 2 points 2 months ago (1 children)

but how do you know you are done. maybe there are different ideas of what bogo sort is, but as i remember, it is basically a while true (or while false loop) with condition - while list_is_not_sorted { return_a_random_ordering }

[–] Jimbabwe@lemmy.world 1 points 2 months ago

Yeah but I said in the best case. In the best case, your randomization is correct so you don’t need to check it

[–] laserm@lemmy.world 6 points 2 months ago (1 children)

At least make it if !isPasswordCorrect || isFirstTry

[–] Samskara@sh.itjust.works -1 points 2 months ago

guard isFirstAttempt { return LoginError(); }

[–] falseWhite@lemmy.world 4 points 2 months ago

I swear Microsoft does that.

[–] blockheadjt@sh.itjust.works 4 points 2 months ago

Center guy's hair got visibly lighter from the stress

[–] thatradomguy@lemmy.world 1 points 2 months ago

The only part that works is that I get to keep my trust issues.

[–] snooggums@piefed.world 1 points 2 months ago (2 children)

How does this 'kinda work'?

[–] MyTurtleSwimsUpsideDown@fedia.io 5 points 2 months ago (1 children)

It rejects the first [correct] login attempt (it’s worded poorly). It assumes that a brute force attacker will try any given password once and move on, while a human user will think they made a typo and try again. This works until the attacker realizes that it takes two attempts, in which case it merely doubles the attempts required to breach the account, and simply requiring an additional password character would be vastly more effective.

[–] snooggums@piefed.world 2 points 2 months ago (1 children)

What a shitty user experience for regular users.

[–] dreadbeef@lemmy.dbzer0.com 6 points 2 months ago (1 children)

which is why they made a comic instead of a revolutionary thought leading blog post

[–] taiyang@lemmy.world 2 points 2 months ago

Hey now, I'm sure there's someone on LinkedIn suggesting this exact thing with layers of corporate speak.

[–] TheseusNow@lemmy.zip 1 points 2 months ago (1 children)

It doesn't. Cracking programs don't use the user login form repeatedly. They use the same algorithm that creates the publicly encoded password to generate encoded passwords and keep going until they have a match. Besides getting the encoded password and salt, everything is done offline.

This just creates a really bad user experience.

[–] camelbeard@lemmy.world 1 points 2 months ago

If they actually use the real login form, most websites block an account after X attempts. Sometimes for 1-24 hours, sometimes until you do a PW reset