this post was submitted on 19 Jul 2025
415 points (92.1% liked)

Technology

72957 readers
2938 users here now

This is a most excellent place for technology news and articles.


Our Rules


  1. Follow the lemmy.world rules.
  2. Only tech related news or articles.
  3. Be excellent to each other!
  4. Mod approved content bots can post up to 10 articles per day.
  5. Threads asking for personal tech support may be deleted.
  6. Politics threads may be removed.
  7. No memes allowed as posts, OK to post as comments.
  8. Only approved bots from the list below, this includes using AI responses and summaries. To ask if your bot can be added please contact a mod.
  9. Check for duplicates before posting, duplicates may be removed
  10. Accounts 7 days and younger will have their posts automatically removed.

Approved Bots


founded 2 years ago
MODERATORS
 
you are viewing a single comment's thread
view the rest of the comments
[–] MentalEdge@sopuli.xyz 36 points 1 day ago* (last edited 1 day ago) (3 children)

TBF, they can be fooled too.

Bitwarden warns against using autofill on load for that very reason, as then simply loading a malicious page might cause it to provide passwords to such a site.

And then, a human when a site doesn't autofill, is more likely to just go "huh, weird" and do it manually.

[–] lmmarsano@lemmynsfw.com 1 points 11 hours ago

they can be fooled too.

Makes it harder: when I go to the wrong website, the manager simply doesn't suggest credentials (it does not have) for it. That causes me to wonder why.

Without a password manager, a user is never prompted to wonder. They'd simply not notice.

[–] Serinus@lemmy.world 5 points 21 hours ago (1 children)

Wait, what? How does autofill get fooled?

[–] gaylord_fartmaster@lemmy.world 1 points 11 hours ago (1 children)

Someone manages to maliciously sneak username and password fields onto a site that store what is entered as soon as it's typed. They don't even have to be visible to the user and bitwarden will fill them in as soon as the page loads.

[–] Serinus@lemmy.world 2 points 10 hours ago (1 children)

Bitwarden will only autofill if the domain matches.

[–] gaylord_fartmaster@lemmy.world 1 points 9 hours ago (1 children)

Right, "maliciously sneak", as in they've either gained access to make changes to the site ditectly, or they've found a way to inject their scripts to steal creds.

[–] Serinus@lemmy.world 1 points 9 hours ago* (last edited 8 hours ago) (1 children)

And how is that any different from not having a password manager?

Yes, if someone hijacks a domain they can get credentials intended for that domain. A password manager doesn't make a huge difference here, because why would they make the site look any different than normal?

[–] gaylord_fartmaster@lemmy.world 0 points 9 hours ago (1 children)

They don't even have to be visible to the user and bitwarden will fill them in as soon as the page loads.

I guess you didn't read most of the comment.

[–] Cocodapuf@lemmy.world 1 points 4 minutes ago* (last edited 4 minutes ago)

No, he did, here's where the confusion is.

Serinus is asking if the site in question needs to be compromised. In other words, can the attacker compromise a random site to fool your password manager into entering credentials for Gmail.com, or does the attacker have to compromise Gmail.com to do that?

Because those two attacks are very different levels of complexity.

And frankly, if someone compromises the site you're actually trying to visit, there's simply no defense against that at all.

[–] Darkassassin07@lemmy.ca 16 points 1 day ago* (last edited 1 day ago)

You've always got the human element, bypassing security features; but extra little hurdles like a password manager refusing to autofill an unknown url is at least one more opportunity for the user to recognize that something's wrong and back away.

If you're already used to manually typing in the auth details, you may not even notice you're not on the site you were expecting.