• Undearius@lemmy.ca
    link
    fedilink
    arrow-up
    2
    ·
    1 year ago

    This looks like Hyundai Bluelink, and if it’s not, then it has the exact same issue. The old password was a generated password provided by support.

  • ViewSonik@lemmy.world
    link
    fedilink
    arrow-up
    2
    ·
    1 year ago

    Whatever site that is, make sure you use a burner email, burner pw (if you get it to work) and joe doe contact info.

    • bleistift2@feddit.de
      link
      fedilink
      English
      arrow-up
      0
      ·
      1 year ago

      To me it looks like their frontend guy just copy/pasted the password field with all validation over without thinking twice. I wouldn’t say this speaks to their general security competence.

      • ViewSonik@lemmy.world
        link
        fedilink
        arrow-up
        1
        ·
        1 year ago

        While that may be true(copy/🍝), it implies that their code quality and QA process is broken and some of the most important fields/data are not being closely looked it. It certainly DOES speak to their overall security competence.

      • Wrench@lemmy.world
        link
        fedilink
        arrow-up
        0
        ·
        1 year ago

        Could also be backend validation is broken, so FE just shows the user something useful rather than waiting for backend to reject and show a generic error message.

        • bleistift2@feddit.de
          link
          fedilink
          English
          arrow-up
          0
          ·
          1 year ago

          That would be actively malicious. I don’t know how anyone could get the idea to just show “something” if the backend sends a generic error message.

          I’m not sure what’s wrong, but have you checked if your tomatoes are fresh?