ediculous@feddit.nl to Asklemmy@lemmy.ml · 1 year agoPeople have been cleaning their ears with cotton swabs for years. What other tools are being inadvertently used wrong?message-squaremessage-square221fedilinkarrow-up1179arrow-down120
arrow-up1159arrow-down1message-squarePeople have been cleaning their ears with cotton swabs for years. What other tools are being inadvertently used wrong?ediculous@feddit.nl to Asklemmy@lemmy.ml · 1 year agomessage-square221fedilink
minus-squareCall me Lenny/Leni@lemm.eelinkfedilinkEnglisharrow-up1arrow-down3·1 year agoI’m surprised no place uses IP addresses anymore to authenticate (I was around when Postopia did or whatever that candy themed game place was). Many IP-ban when it comes to identifying rulebreakers, you’d think they’d IP-authenticate too.
minus-squareahal@lemmy.calinkfedilinkarrow-up8·1 year agoImagine if your roommate could just get into all your accounts?
minus-squareCall me Lenny/Leni@lemm.eelinkfedilinkEnglisharrow-up1·1 year agoI know that’s untactical, but I mean as long as IP bans are already a thing…
minus-squaremackwinston@feddit.uklinkfedilinkarrow-up4·1 year agoCarrier grade NAT. For instance, on our local mobile phone network, thousands of handsets will have the same public IP address.
minus-squarevzq@lemmy.blahaj.zonelinkfedilinkarrow-up4·1 year agoAll major services do risk based authentication these days. I’m fairly certain network address factors into the risk calculations.
I’m surprised no place uses IP addresses anymore to authenticate (I was around when Postopia did or whatever that candy themed game place was). Many IP-ban when it comes to identifying rulebreakers, you’d think they’d IP-authenticate too.
Imagine if your roommate could just get into all your accounts?
I know that’s untactical, but I mean as long as IP bans are already a thing…
Carrier grade NAT. For instance, on our local mobile phone network, thousands of handsets will have the same public IP address.
All major services do risk based authentication these days. I’m fairly certain network address factors into the risk calculations.