Larion Studios forum stores your passwords in unhashed plaintext. Don’t use a password there that you’ve used anywhere else.

  • voxel@sopuli.xyz
    link
    fedilink
    English
    arrow-up
    64
    arrow-down
    13
    ·
    edit-2
    1 year ago

    no, they probably dont.
    they just send it to your email upon registration, which is kinda a bad idea, but they are probably storing passwords hashed afterwards.

    • Mirodir@discuss.tchncs.de
      link
      fedilink
      English
      arrow-up
      25
      arrow-down
      1
      ·
      1 year ago

      …and if they keep the emails they send out archived (which would be reasonable), they also have it stored in plaintext there.

        • glitches_brew@lemmy.world
          link
          fedilink
          English
          arrow-up
          12
          arrow-down
          1
          ·
          1 year ago

          As the designated email dev at my company I can confidently say this is not true.

          Not saying that this specific email is persisted, but almost all that I work with are. It’s a very common practice.

          • tocopherol@lemmy.dbzer0.com
            link
            fedilink
            English
            arrow-up
            1
            ·
            1 year ago

            I wonder how much this varies depending on the amount of data it would require to store the emails of a company. I know nothing about this subject, but does it occur where companies with very large email lists would forgo storing those types of emails to save data costs?

            • glitches_brew@lemmy.world
              link
              fedilink
              English
              arrow-up
              2
              ·
              1 year ago

              In my experience it varies a lot. Even in our own system certain emails are stored differently. There are a few “we legally have to deliver this email and might need to prove it later” notifications. We store a PDF of those in s3. For others we might just save the data, a sent timestamp, and a key for which email visual template was used.

              I also thought of a counter argument to my point overnight. We don’t store one super duper high volume email which is the email that only has an MFA code. We would also absolutely never ever dream about allowing a plaintext password in an email, so we’re probably following different patterns in the first place.

      • voxel@sopuli.xyz
        link
        fedilink
        English
        arrow-up
        4
        arrow-down
        3
        ·
        edit-2
        1 year ago

        these emails don’t usually get copied to local outbox folder (as any oher auto generated emails)

        password may end up in cache somewhere tho…
        and this is why it’s a bad idea and rarely done nowadays

      • Thadrax@lemmy.world
        link
        fedilink
        English
        arrow-up
        6
        arrow-down
        6
        ·
        1 year ago

        Generated emails usually don’t get saved, as soon as it is delivered it will be gone.

    • dangblingus@lemmy.world
      link
      fedilink
      English
      arrow-up
      19
      arrow-down
      6
      ·
      1 year ago

      I’ve literally never had a service provider email me my own password ever. Maybe a OTP, but never my actual password. And especially not in plaintext.

      What would be the necessity behind emailing someone their own password? Doesn’t that defeat the purpose of having a password? Email isn’t secure.

      • wim@lemmy.sdf.org
        link
        fedilink
        English
        arrow-up
        12
        ·
        1 year ago

        I find that very hard to believe. While it is less common nowadays, many, if not most, mailing list and forum software sent passwords in plaintext in emails.

        A lot of cottage industry web apps also did the same.

      • bnjmn@lemmy.world
        link
        fedilink
        English
        arrow-up
        4
        ·
        1 year ago

        Idk if I’m misremembering, but it’s my impression that they did this a lot in the 2000s, haha. I guess bad practices have a habit of sticking around

      • EssentialCoffee@midwest.social
        link
        fedilink
        English
        arrow-up
        2
        ·
        1 year ago

        I’ve had service providers physically mail my own password to me before. Just crazy.

        Always use unique passwords for every site.

      • Umbraveil@lemmy.world
        link
        fedilink
        English
        arrow-up
        3
        arrow-down
        3
        ·
        1 year ago

        Is it though? While it certainly isn’t something I’d recommend, and I’ve encountered it before, if E2E encryption exists we cannot assume a data exposure had occurred.

        What they do on the backend has nothing to do with this notification system. Think of it as one of these credentialess authentication systems that send a ‘magic link’ to your inbox.

    • darkkite@lemmy.ml
      link
      fedilink
      English
      arrow-up
      19
      arrow-down
      8
      ·
      1 year ago

      this is still a terrible idea. the system should never know the plaintext password.

      logs capture a lot even automated emails. i don’t see a single reason to send the user their plaintext password and many reasons why they shouldn’t

      • voxel@sopuli.xyz
        link
        fedilink
        English
        arrow-up
        3
        arrow-down
        1
        ·
        edit-2
        1 year ago

        passwords are usually hashed server-side tho and that’s done for a reason.
        if handling passwords correctly, server side hashing is way more secure then client-side. (with client side hashing, hash becomes the password…)

    • tb_@lemmy.world
      link
      fedilink
      English
      arrow-up
      22
      arrow-down
      12
      ·
      edit-2
      1 year ago

      But that still means they had your plaintext password at some point.

      Edit: which, as some replies suggest, may not actually be much of an issue.
      I’m still skeptical about them returning it, however.

      • voxel@sopuli.xyz
        link
        fedilink
        English
        arrow-up
        16
        arrow-down
        1
        ·
        edit-2
        1 year ago

        hashing on client side is considered a bad idea and almost never done.
        you actually send your password “in plain text” every time you sign up.

        • wim@lemmy.sdf.org
          link
          fedilink
          English
          arrow-up
          1
          arrow-down
          5
          ·
          1 year ago

          It’s not a bad idea and it is often done, just not in a browser/webapp context.

            • wim@lemmy.sdf.org
              link
              fedilink
              English
              arrow-up
              3
              ·
              edit-2
              1 year ago

              Sorry, I should have included an example in my comment to clarify, but I was in a rush.

              HMAC is a widely used technique relies on hashing of a shared secret for verifying authenticity and integrity of a message, for example.

      • Kilamaos@lemmy.world
        link
        fedilink
        English
        arrow-up
        12
        arrow-down
        9
        ·
        1 year ago

        Of course. You receive the password in plain on account creation, do the process you need, and then store it hashed.

        That’s fine and normal

          • Vegasimov@reddthat.com
            link
            fedilink
            English
            arrow-up
            12
            arrow-down
            8
            ·
            1 year ago

            When you create an account you type your password in. This gets sent to the server, and then it is hashed and stored

            So there is a period of time where they have your unhashed password

            This is true of every website you have ever made a password on

              • Vegasimov@reddthat.com
                link
                fedilink
                English
                arrow-up
                1
                arrow-down
                2
                ·
                1 year ago

                I’ve never even heard of the game studio I’m not defending them, I was replying to the person who said the company should never have your unhashed password, and explaining that they have to at some point in the process

            • dangblingus@lemmy.world
              link
              fedilink
              English
              arrow-up
              2
              arrow-down
              9
              ·
              1 year ago

              So why would an agent at Larian have man-in-the-middle access between the password being sent to the server, and the auto-hash?

      • Hexarei@programming.dev
        link
        fedilink
        English
        arrow-up
        4
        arrow-down
        2
        ·
        1 year ago

        Um. Yeah, because you provided it to them. They have to have it in plain text in order to hash it.