• Chozo
    arrow-up
    62
    arrow-down
    1
    ·
    2 months ago
    link
    fedilink

    “Bank Robbers used Honda, Toyota, and Camry getaway vehicles”

    Like okay? That’s hardly the issue. The login systems used have nothing to do with the crimes being committed.

    The article’s paywalled, so I dunno if there’s much more to it than this, but this seems like a ridiculous headline.

    • cm0002
      arrow-up
      16
      arrow-down
      0
      ·
      2 months ago
      link
      fedilink

      Right, and the article makes it sound like a good thing that an SSO provider should be policing things. I see it as almost as bad as PayPal “policing” things against their moral code i.e. when they freeze funds for completely legal NSFW creators

      • talEnglish
        arrow-up
        5
        arrow-down
        0
        ·
        2 months ago
        edit-2
        2 months ago
        link
        fedilink

        Right, and the article makes it sound like a good thing that an SSO provider should be policing things

        I’ve been very leery about the idea of letting companies own someone’s credentials via SSO in general, so if it encourages at least diversification away from a few SSO providers, I’m kind of enthusiastic about SSO providers imposing restrictions on people using their services.

  • MagicShel
    arrow-up
    47
    arrow-down
    0
    ·
    2 months ago
    link
    fedilink

    You don’t need to be vetted to use OAUTH. And you shouldn’t need to be. It would kill OAUTH completely.

    • cheese_greater
      arrow-up
      12
      arrow-down
      0
      ·
      2 months ago
      link
      fedilink

      Won’t this make it super easy to track down whoever’s using this?

      • schizoEnglish
        arrow-up
        16
        arrow-down
        0
        ·
        2 months ago
        link
        fedilink

        Yeah. You have to make a developer account to make an API token in order to setup any of those oauth options.

        Granted, you could just put in random bullshit in the developer accounts, but generally I’d bet google would still know who the person involved is.

      • MagicShel
        arrow-up
        7
        arrow-down
        0
        ·
        2 months ago
        link
        fedilink

        So I’m thinking back to the times I’ve used it. I want to say I assume they have a way to track where this is being used based on referrer, but I don’t remember clearly enough. I don’t think a given token has to be tied to any URL. You just get a token and validate it with a service.

        But people who use it on a daily basis could probably answer more definitively. I’ve just used it a couple of times and didn’t bother retaining it because it’s easy to figure out when you need it.

  • Praise IdlenessEnglish
    arrow-up
    12
    arrow-down
    0
    ·
    2 months ago
    link
    fedilink

    Harmful nudify websites used the Internet, electricity, computer(server) parts

  • Hotzilla
    arrow-up
    7
    arrow-down
    0
    ·
    2 months ago
    link
    fedilink

    Uh, someone really don’t know how OAuth works.