Should password strength validation also be run server-side or only client-side?

Personally, I think that it’s not so important to check the strength of the passwords on server-side, since, if the user evades the validation on the client side, it would be their responsibility to use an insecure password; however, I don… Continue reading Should password strength validation also be run server-side or only client-side?

Leaking Passwords through the Spellchecker

Sometimes browser spellcheckers leak passwords:

When using major web browsers like Chrome and Edge, your form data is transmitted to Google and Microsoft, respectively, should enhanced spellcheck features be enabled.

Depending on the website you visit, the form data may itself include PII­—including but not limited to Social Security Numbers (SSNs)/Social Insurance Numbers (SINs), name, address, email, date of birth (DOB), contact information, bank and payment information, and so on.

The solution is to only use the spellchecker options that keep the data on your computer—and don’t send it into the cloud…

Continue reading Leaking Passwords through the Spellchecker

Why PAKE or Zero-knowledge password proof didn’t replace sending a password via HTTPS

Technologies like Zero-knowledge password proof and PAKE seems to be pretty mature but almost all modern web-sites still send passwords over HTTPS to check authentication. At first glance, this protocols look like a magic pill, but still n… Continue reading Why PAKE or Zero-knowledge password proof didn’t replace sending a password via HTTPS

Does Google share it’s international database of search queries with LEA agencies for purposes of breaking encryption?

So, suppose a person accidentally typed their complex encryption password into Google search. They weren’t logged in to any Google services so the search was anonymous, and they continued to use this password afterwards. What I am curious … Continue reading Does Google share it’s international database of search queries with LEA agencies for purposes of breaking encryption?