Use the “passwords” feature to check if one of yours is compromised. If it shows up, never ever reuse those credentials. They’ll be baked into thousands of botnets etc. and be forevermore part of automated break-in attempts until one randomly succeeds.

  • ImgurRefugee114@reddthat.com
    link
    fedilink
    English
    arrow-up
    11
    ·
    1 day ago

    Something to keep in mind about not using browser integrations is that you can fall victim to simple keyloggers and clipboard stealers. But using an extension can also be a weakpoint if it autopopulates incorrectly or on a compromised site; but that’s far less common.

    But, dear readers, don’t let that dissuade you: even a text file in a veracrypt volume is better than “PurpleElephant1994”

    • u_u@lemmy.dbzer0.com
      link
      fedilink
      English
      arrow-up
      13
      ·
      1 day ago

      I would dare say PurpleElephant1994 is already much better than most passwords people have been willingly tell me.

      • anguo@piefed.ca
        link
        fedilink
        English
        arrow-up
        1
        ·
        21 hours ago

        I recently found out a family member’s passwords are things like “1100011”, “1111000” and similar variations. It’s like they’re already using binary to give a helping boost to brute-forcing bots.

    • JohnEdwa@sopuli.xyz
      link
      fedilink
      English
      arrow-up
      5
      ·
      21 hours ago

      In theory auto-population is way more likely to save you from getting scammed because it won’t do it for a fake site, as the URL doesn’t match. In practice though most people are just going to be annoyed it didn’t work and do it manually anyway before they realize why it didn’t work.

    • AbidanYre@lemmy.world
      link
      fedilink
      English
      arrow-up
      5
      ·
      edit-2
      1 day ago

      Autopopulate is probably less likely to mistake I and l or O and 0 in a fake url though.