• Scrubbles@poptalk.scrubbles.tech
      link
      fedilink
      English
      arrow-up
      11
      ·
      29 days ago

      Of course not. This is like, the 4th time this guy has posted this and has yet to provide any screenshots, REST calls, or anything. If they were actually concerned about trolling this would be a GitHub issue, not a post on a support thread. It would behave been swarmed on. As far as I’m concerned this is just trolling until they provide actual proof to the devs.

    • devAlot@lemmy.world
      link
      fedilink
      English
      arrow-up
      3
      ·
      29 days ago

      Yeah screenshots would be great. Dug through the post history a bit and only found one other “It happened again” post, no ss, gave up on locating the original after a few pages. I did find this one where OP might have clicked a potential suspicious link, which could be related.

      Also curious to know if it’s just a visual glitch or if OP actually has full access to another user’s account, like inbox messages, ability to make posts as them, upvote/downvote, etc.

      OP, I recommend downloading a screen recording app and recording your logins on the off-chance it does happen again.

    • devAlot@lemmy.world
      link
      fedilink
      English
      arrow-up
      1
      ·
      28 days ago

      Just a heads up, I just encountered a bug with their 2FA. I logged in, got prompted for the code, pasted it in but accidentally hit Cancel instead of Submit. It took me back to the login page, then just logged me in. I’ve been able to repeat the process even with expired codes, but not with codes I make up on the fly.

    • Don_Dickle@lemmy.worldOP
      link
      fedilink
      arrow-up
      1
      ·
      29 days ago

      have no clue what that is. I am using firefox on an hp laptop and when I click my bookmark it usually auto logs me in to my account.

      • nocturne@sopuli.xyz
        link
        fedilink
        arrow-up
        1
        ·
        29 days ago

        2FA is two factor authentication, it requires your password plus a generated code from an authentication app that changes every 60 seconds.

          • devAlot@lemmy.world
            link
            fedilink
            English
            arrow-up
            1
            ·
            edit-2
            28 days ago

            I’m totally guilty of this myself for my work stuff (Edit: I WFH and everything still has either 2FA or MFA enabled), but saving passwords in your browser is risky. Browsers can be tricked into, for example, populating your credentials into hidden fields, thus exposing your creds to whoever’s on the other end wanting that data.

            I’m certainly not going to stop doing it myself, so I’m just recommending that all your passwords at least be unique for each account. I use a password manager to store them all, that way I only need to remember one master password for all my accounts.

    • Don_Dickle@lemmy.worldOP
      link
      fedilink
      arrow-up
      2
      arrow-down
      7
      ·
      29 days ago

      Folks think we got a Redditor here. It’s only briefly that it happens and plus don’t want like the last time I did give out a username that may be compromised.

      • surewhynotlem@lemmy.world
        link
        fedilink
        arrow-up
        4
        ·
        28 days ago

        No, this is simple IT support work. If you can’t reproduce it, and you can’t evidence that it happened, there’s nothing people can do. You’ve given them no real place to start.

        It’s effectively like saying “there’s a misspelling in this dictionary” and giving no further information.

      • NutinButNet@hilariouschaos.com
        link
        fedilink
        English
        arrow-up
        3
        ·
        29 days ago

        It’s important for the purpose of evidence.

        There’s no harm of dox towards the user you logged in as because that is publicly available and as long as you’re not sharing anything like their email, what is the harm? Just showing a screenshot of the page where it shows their username on your session is suffice. Blur anything private, if needed.

        But there’s nothing anyone can do with the information you’re giving here. There’s too much data to parse through to determine what was the invalid login.