this post was submitted on 26 Jun 2024
304 points (95.8% liked)

Cybersecurity - Memes

1964 readers
2 users here now

Only the hottest memes in Cybersecurity

founded 1 year ago
MODERATORS
 
top 50 comments
sorted by: hot top controversial new old
[–] MrJameGumb@lemmy.world 80 points 4 months ago (4 children)

Here's a little scenario that played out at work the other day...

Dramatis personae:

M - who is Me. Customer service agent extrodinaire.

C - who is a dumbass cranky customer

Our scene opens on your humble narrator diligently toiling at his work station

M: Thank you for calling The Company, my name is M, may I have your name please?

C: yeah yeah, my name is C, and I got a lot of problems with you people! Do you know how many times that damned robot voice tried to send me messages? I just want to talk to a person dammit!

M: I'm so sorry to hear you're having a bad experience sir! I'll be happy to help you with anything you need, but it does appear you have enabled two factor authentication, so I'll need to send a link to your phone so I can access your account

C: THIS IS FUCKING RIDICULOUS! YOU CAN'T JUST TELL ME WHAT I WANT???? I PAY YOU PEOPLE A FORTUNE EVERY MONTH AND I CAN'T EVEN ASK A DAMNED QUESTION??? THIS COMPANY IS A FUCKING JOKE!!!

M: Yes sir, I know the enhanced security requirements can be frustrating, but unfortunately we've had to update them in order to make sure our customers accounts remain secure. It should just take a moment for me to send the message though and all you have to do is click the link! Can I go ahead and send it to your number on file?

C: are you fucking kidding me here? Is this what I pay for every goddamned month??? ALL I WANT TO DO IS ASK A QUESTION AND YOU ARE REFUSING TO HELP ME!!! GET ME YOUR SUPERVISOR! NOW!

M: again sir, I understand how frustrating this can be. Unfortunately in order to protect your security, I cannot give you any information or transfer you to anyone else until we have verified your account. If you would prefer not to verify the account that is certainly your right though. Was there anything else I can help you with today?

C: (sighs dramatically) fine... just send me the goddamned thing... I'm leaving this joke of a company tomorrow though.

M: well sir I would hate for you to have to go to a competitor who doesn't value your security as much as we do here at The Company. I'll send that message out. You should be getting it right.... now

(Mr C grumbles incoherently as he clicks the link. It takes him all of two seconds.)

C: THERE! I did what you ORDERED! Now will you PLEASE help me with my account???

M: Absolutely sir! What can I help you with today?

C: I have gotten at least 20 messages from you people today telling me some bullshit about approving an order being placed on my account! I DIDN'T ORDER ANYTHING!!! DO YOU PEOPLE EVEN KNOW WHAT YOU'RE DOING OVER THERE???

(I pause to take a brief respite and collect my thoughts as I feel a little piece of my soul dying)

M: That is a very serious issue sir! It appears someone was attempting to access your account online, and nearly managed to place an order for almost $5000 worth of equipment! It looks like the order was canceled because they couldn't get past your (here it comes) enhanced two factor authentication requirements.

C: ...oh. Thank you have a nice day (click)

(I scream internally, yet god does not listen)

END SCENE

[–] slazer2au@lemmy.world 34 points 4 months ago

I do miss Tales from tech support.

[–] Wizard_Pope@lemmy.world 18 points 4 months ago (1 children)

Man, that was a rollercoaster. I don't think I have the mental fortitude to not start crying if that happened to me.

[–] MrJameGumb@lemmy.world 5 points 4 months ago

It can be overwhelming for people when they first start, but after a while you eventually learn to expect it lol

I can tell you from experience that someone like this probably makes up a reason to call in once or twice a month at least and claims they are taking their business elsewhere EVERY TIME for years and years lol

[–] Droggelbecher@lemmy.world 3 points 2 months ago (1 children)

It might be I'm being stupid, so please tell 'em if I am. But why do you not wait to find out what the question even is before going into their account? That way you could explain the troubleshooting process better to them, no?

[–] MrJameGumb@lemmy.world 1 points 2 months ago (1 children)

If someone is calling about an alert that there was an order placed on their account I can't troubleshoot a single thing until I'm in the account

[–] Droggelbecher@lemmy.world 2 points 2 months ago

Aah ok, it sounded like they only said that after you logged in

[–] LazerFX@sh.itjust.works 2 points 4 months ago

I've done that soul sucking job... You're a saint. And I love those sorts of conversations.

[–] headset@lemmy.world 26 points 4 months ago* (last edited 4 months ago) (4 children)

Fuck the 2 factor bullshit. I've lost many accounts just because I moved to another country and changed my number. I still know the password, It is my account but I can't login just because the asshole who created 2 factor authentication never moved out of his parent's basement.

[–] RecluseRamble@lemmy.dbzer0.com 31 points 4 months ago (1 children)

SMS based 2FA isn't recommended and with an authenticator/hardware token your scenario is not a problem.

[–] jj4211@lemmy.world 6 points 4 months ago (2 children)

While true, other scenarios do come into play, like "I'm using a FIDO key but I dropped it down a storm drain". Meaning you pretty much have to provide some recovery mechanism, since you can't really require the user to have a backup device.

[–] RecluseRamble@lemmy.dbzer0.com 3 points 4 months ago* (last edited 4 months ago) (1 children)

That's why I don't use hardware tokens. They are more secure but they can break or get lost/stolen. My authentication app supports backups.

[–] jj4211@lemmy.world 1 points 4 months ago (1 children)

Indeed, but some "security" guys frown deeply about the private key ever leaving a specific hardware device, because the second it can be backed up they freak out that it could, theoretically, be stolen. It's hardly a practical concern, but there's a lot of security people that don't care about practical considerations.

[–] RecluseRamble@lemmy.dbzer0.com 4 points 4 months ago (1 children)

I see it more neutrally - the concern isn't wrong after all. Security is always to be balanced against convenience.

I consider being locked out for good so inconvenient that I'm willing to sacrifice a bit of security to avoid it. But everyone has to find what works best for them.

[–] fuzzzerd@programming.dev 3 points 4 months ago

Get out of here with your pragmatism. We'll have none of that in this security context.

[–] bertof@lemm.ee 1 points 4 months ago

That's why it is called multi-factor

[–] Skipcast@lemmy.world 8 points 4 months ago

Skill issue (don't use sms based 2fa it's the worst and least secure kind)

load more comments (2 replies)
[–] Aeri@lemmy.world 26 points 4 months ago (3 children)

I do live in a state of constant dread of losing my phone, or having it break down, or getting a new phone now, but at least things are "secure" again *sigh

[–] Audalin@lemmy.world 13 points 4 months ago

TOTP can be backed up and used on several devices at least.

[–] agressivelyPassive@feddit.de 3 points 4 months ago (1 children)

True. And I don't even know, what to do about it. I can't really be expected to always keep and maintain two phones, ideally at different places.

[–] Wizard_Pope@lemmy.world 1 points 4 months ago (1 children)

If you have an old phone you don't use anymore, like your previous smartphone for example. Set it up on that as well and have it stored somewhere you know it is. Also make sure to charge it every couple months to make sure the battery stays healthy.

[–] agressivelyPassive@feddit.de 3 points 4 months ago

Well, I ditched my old phone because the battery is practically dead.

And my point is not, that I don't have a mitigation at hand, but it's stupid that I even need that mitigation. Essentially, the security providers offloaded their incompetence and/or unwillingness to pay insurances onto all of their users.

[–] DannyBoy@sh.itjust.works 0 points 4 months ago

Google Authenticator will back up keys. I often add keys on my main phone and read them off my backup phone.

[–] Zachariah@lemmy.world 15 points 4 months ago (1 children)

Unfortunately, it’s often implemented as two-step authentication though. Like asking for a password and an answer to a security question. Those are both something you know. Two-factor authentication would involve two of these factors: something you know, something you have, and something you are.

[–] Wizard_Pope@lemmy.world 3 points 4 months ago

I thought the security code version was more common. Either geting a SMS code or email or the better version with a designated Authenticator app.

[–] mlg@lemmy.world 11 points 4 months ago

Cybercriminals stealing the Oauth2 tokens after users authenticate with 2FA:

[–] letsgo@lemm.ee 9 points 4 months ago

IT pro here with over 40 years XP. I have MFA in some places, not in others. As with everything else in IT, IT DEPENDS.

[–] udon@lemmy.world 7 points 4 months ago (1 children)

I was all for it and even bought a USB dongle to make it super easy. Turns out this shit doesn't work anywhere. Fuck 2FA if nobody implements decent mechanisms.

[–] jj4211@lemmy.world 6 points 4 months ago* (last edited 4 months ago) (1 children)

Basically, you have:

  • TOTP - no particular investment needed, so very popular, but a bit onerous
  • Various MFA vendors that tie into their cloud services. I hate these since it means I generally have to get additional apps, with uneven platform support
  • Webauthn/Passkey - Cool, integration with my phone, a Fido usb key, windows hello if applicable, no need for external service, uses asymmetric encryption so it's not shared secret and it's more convenient.... Almost no one bothers to implement it for their service though, despite it being pretty damn easy.
[–] LazerFX@sh.itjust.works 1 points 4 months ago

I use Dashlane... It just handles all the user side of all of those for me, covering 2FA with the app/passkey nicely.

[–] JackLSauce@lemmy.world 5 points 4 months ago

Got to implement one of these systems at work before

They wanted it in place ASAP so I skipped creating an opt-out/opt-in "feature"

[–] yesman@lemmy.world 5 points 4 months ago* (last edited 4 months ago) (2 children)

Your identity cannot be stolen. The idea is science fiction. What thieves make off with are your credentials. Many of which you have no choice and sometimes no knowledge of. If you think about it, these credentials aren't necessarily for your benefit, and sometimes directly to your harm.

But it's your job to safeguard and secure these credentials with your time, effort, and hardware you own and maintain. Carry on consumer.

[–] ramble81@lemm.ee 2 points 4 months ago

Biometrics say what?

[–] Bytemeister@lemmy.world 1 points 4 months ago

Identity is a construct, and it absolutely can be stolen.

[–] ByteJunk@lemmy.world 4 points 4 months ago

This was my ISP and I a few years ago. I'm a beta tester for some of their features, and I argued this was necessary for ages. They finally implemented it, and now err on the side of way too many prompts for 2FA, but at least we have it.

My current beef is arguing that we NEED IPv6 settings in the router. One size does NOT fit all. It's an uphill battle...

[–] boredsquirrel@slrpnk.net 3 points 4 months ago (1 children)

Btw with TOTP the server has your secret credentials too, pretty crazy.

[–] jj4211@lemmy.world 6 points 4 months ago (1 children)

Yes, shared secret based, but not a big deal because it is machine generated and unique per account. The 'server has your credential' is only a problem if the credential is reused across services. If you have access to read TOTP secrets from the server, you probably don't need those TOTP secrets to further compromise the service.

But webauthn/passkey is a better approach. Properly managed SSH keys are good too, but folks aren't too happy about how ssh keys are commonly pretty lax. Client certificates similarly would have worked, but never took off. Similar story for smartcards.

[–] boredsquirrel@slrpnk.net 1 points 4 months ago* (last edited 4 months ago)

I am in the process of buying a Nitrokey 3 Mini!

Gonna test some stuff, like Secure Element LUKS encryption on my old Thinkpad

[–] StarlightDust@lemmy.blahaj.zone 1 points 4 months ago

If only you could disable prompt on an already logged in device login. It almost completely eliminates half of the point of having 2fa.

load more comments
view more: next ›