To protect our cleartext passwords.Why?
To protect our cleartext passwords.
I wonder if the servers could handle the load, though.
Passwords aren't transmitted in the clear. They're encrypted before they're even sent off (and then encrypted again).To protect our cleartext passwords.
I wonder if the servers could handle the load, though.
Passwords aren't transmitted in the clear. They're encrypted before they're even sent off (and then encrypted again).
Yeah, the cookies can be captured, I didn't say otherwise. The comment was about the password; passwords are never passed in the clear in vB.Doesn't matter. Snoops can just capture the whole cookie and keep the login state.
It's hard to believe that a "technical" website which writes IT "articles" (storage, servers, etc) they expect us to take seriously would lack this basic standard in 2013. I would think that would be an embarrassment for the owners.
Everything should be encrypted. It's good policy, and if nothing else, it helps hide truly sensitive data in a field of noise.
It's hard to believe that a "technical" website which writes IT "articles" (storage, servers, etc) they expect us to take seriously would lack this basic standard in 2013. I would think that would be an embarrassment for the owners.
I think that if someone was eavesdropping, the fact that packets are heading towards a forum site would be enough clue that there isn't anything interesting going on.
Passwords aren't transmitted in the clear. They're encrypted before they're even sent off (and then encrypted again).
Or maybe there is something interesting. Perhaps I'm sending a pm, or maybe I'm using an onsite chatbox. Perhaps that chatbox is pseudo-anonymous. Maybe the whole thing is open, but I don't want real world people of any kind to know my online identity.
There's many reasons to encrypt data. Some are important, and some are trivial, but it's just good practice and policy to encrypt everything.
...and IMHO from an eavesdropper POV (insert the usual state-type suspects here depending on your country), those are the important bits. As I said before, if the eavesdropper is more interested after that, then she should go after the source or the target of the data.
Adding workload (admin time as well as system resources) to provide a pointless service would be the only embarrassing element I can see here.
Well, no one here has accused you of being worth listening to. Your post shows a fundamental lack of understanding.
