Basic cyber security says that passwords should be encrypted and hashed, so that even the company storing them doesn’t know what the password is. (When you log in, the site performs the same encrypting and hashing steps and compares the results) Otherwise if they are hacked, the attackers get access to all the passwords.
I’ve noticed a few companies ask for specific characters of my password to prove who I am (eg enter the 2nd and 9th character)
Is there any secure way that this could be happening? Or are the companies storing my password in plain text?
I always figured they checked the plaintext locally before hashing and sending it to their server, but I don’t really know.
This is it.
It seems a lot of people have trouble distinguishing between what’s simply happening in their browser, and what’s being sent back to the server. I mean, I get it; it’s confusing, even to the people creating the tech, let alone a casual netizen. It’s a good question, and you can’t fault anyone for wondering what’s what.
Yes, asking these questions is a fantastic thing.
Speaking of questions - I imagine there is a day to use the built in dev tools in the browser to verify that the particular site does this, but I don’t know how. Do you happen to know how I might?
I remember signing up for a site a few years ago and they emailed me my confirmation, with my password, in plaintext. I was absolutely shocked
that doesn’t explain the scenario described in the post
You’re right, I misread the post. What sites have done that? I’ve been fortunate to never encounter any.
A bunch of European banks.
Might be time to switch banks…
They all do it. It’s perfectly secure if you don’t implement it in a naive way.
No, they aren’t storing your password in plaintext.
How is it implemented?
There’s a security stack exchange on this exact question here.
Storing your credentials in plaintext would be insane, illegal, and would never pass any kind of audit.