frontpage.
newsnewestaskshowjobs

Made with ♥ by @iamnishanth

Open Source @Github

fp.

Open in hackernews

Study: 'Security Fatigue' May Weaken Digital Defenses

https://www.albany.edu/news-center/news/2026-study-security-fatigue-may-weaken-digital-defenses
62•giuliomagnifico•2h ago

Comments

dijit•1h ago
thats part of why NIST updated their password rotation recommendations from 90 days to indefinite: people pay lip service to security if it is too inconvenient. you have to try to meet people where they are.

Preaching is not a strong motivator for long.

carefree-bob•1h ago
It's not just about "convenience", it is hard for the human mind to remember a truly random password. You can try all the mnemonic tricks you want but at the end of the day it requires a lot of time and repetition before entering the password is effortless. So what people do is create a stream of derivable passwords. For example, I can think of a phrase "I love beach balls bouncing on the ocean!" and then make a password "ilBBbotocean!" and when it comes time to change that password, I'll just add a number "ilBBbotocean!1". Studies have shown this is what people do. But it is easy for attackers to also derive these passwords once one password in the chain has been compromised.

The effect of that is that by requiring frequent rotation, the organization is effectively training their users to have a single permanent password and to never change it, even after a compromise. That's extremely harmful. At least with permanent passwords that are force rotated after they show up in database or there has been an incident, you have a much higher percentage of compliance with making new passwords, and the organization is safer because everyone isn't using passwords derived from the previous password.

mysteria•1h ago
I remember a case where a company decided to assign employees random 16 character passwords with symbols and rotated them every 90 days or so. They were unchangeable and the idea was that everyone would be forced to use a secure password that changed regularly.

You can probably guess what happened, and that was that no one remembered their passwords and people wrote it down on their pads or sticky notes instead.

GoblinSlayer•56m ago
Also "app passwords". Not just change, you can't even append text to it.
SAI_Peregrinus•44m ago
Those are just API keys people can type.
bluGill•51m ago
Writing down a password is a great option. However you need to keep that paper in a secure location. Put it in your wallet and treat it like a $100 bill - don't paste it to a monitor or under the keyboard.

A password manager is better for most things, but you need to unlock the password manager somehow.

mystraline•46m ago
Most federal orgs still have 60 day password rotation requirements in place, even though NIST gave guidance almost 10 years ago not to do that.

What does that mean? Passwords are stored in textiles accessible by admin only, and shared. And everyone is worse for it.

compiler-guy•1h ago
I have seen this phenomenon especially at a couple of FAANGs over the past couple of years. Things are getting locked down so much, and so many special permissions are required that now people ask for permissions to systems or procedures preemptively. Because by the time they know if they will need it or not, it's too late.

And no one in the security business seems to consider the overall burden of yet another step. Each of which is simple in by itself, but cumulatively they are a giant hassle, and so people look for workarounds.

baby_souffle•1h ago
> And no one in the security business seems to consider the overall burden of yet another step. Each of which is simple in by itself, but cumulatively they are a giant hassle, and so people look for workarounds.

This is a tale as old as time. At a prior gig, IT took away touch ID for ... $reasons. ~40% of the engineering team was already big into mechanical keyboards so it only took one person to "just FYI, VIA allows you to program macros". Is it _as bad_ as password on a sticky note? Not quite but I can't imagine that touch ID was _more_ of a threat.

sam_lowry_•1h ago
A big use case for Yubikeys is the ability to emulate a keyboard and produce a string of chars on touch.
pimlottc•48m ago
It's a very handy fea-ccccccvklhfgjhckcnkdnhgkcdgbruuhlfbuednrjgjr-ture
Groxx•31m ago
gesundheit
HPsquared•13m ago
It can be a little touchy.hunter2
klooney•10m ago
Until the security team requires a password on the yubikey tap
JasperNoboxdev•1h ago
Curious, why remove Touch ID? Been moving everything into it seems like a really good mix of convenience + security (especially if the alternative is copying your key into AI :) )
whynotmaybe•1h ago
Not really new. A long time ago I had to wait 2 months to have access to a shared folder on a development server.

It became so prevalent that whenever we were planning anything, if a task had to be done by someone outside of our team, we added 20 days.

Security through eternity I guess ?

SAI_Peregrinus•52m ago
I call this sort of thing a self-DoS. If the system is unusable enough, it's indistinguishable from a DoS attack. This sort of sabotage isn't restricted to the security team, anything that makes the system unreliable enough from bad design through bad performance can have the same effects as an external attack.
gz5•1h ago
Absolutely. Easier said than done, but the best security is structural security - as near to invisible for end users as possible. This needs to be the goal, imo, even if not fully achievable.
ctxc•1h ago
Fairly obvious? Or isn't it that way for everyone?
Lerc•57m ago
Very obvious, but things that seem obvious might not actually be true. It is worth verifying.

Getting organisations to act on the obvious if it requires changing is harder than you might think. Having research to point to and saying you are doing the wrong thing and now you've been told is like turning the lights on and off really quickly and moaning "Liability" in a spooky voice.

ctxc•48m ago
Fair enough. I had a hard time advocating for good password flows because "standards" said frequent rotation etc.

And tbh when you apply those standards with context and are faced with people bare-minimum pointing at the standards, you sometimes come off as less knowledgeable - such is the authority of research/standards.

Anyway, I skimmed your profile and learnt a new word, milquetoast - so thanks for that!

donatj•1h ago
The level of lockdown in current years is wild. With our 2FA requirements and SSO, signing into GitHub every morning takes me something like eight clicks and a solid minute. Everything has gotten so locked down in recent years, people are working so hard to protect what are largely basic CRUD apps
jimbokun•56m ago
That’s fine as long as you are kept logged in or at least have an abbreviated login process after successfully authenticating in the morning.

CRUD apps can contain very sensitive data, so not sure how that’s relevant.

magicalhippo•40m ago
Would have been less if GitHub had just allowed proper SSO instead of this hybrid account mixing.

I get that the hybrid method might be desirable for contractors or similar who have many hats, but for a regular employee it just adds friction for no benefit.

nightpool•14m ago
I've never had that issue with Github—I think their account mixing setup reduces the amount of work I have to do to sign in 100x compared to other SSO systems I use.
magicalhippo•3m ago
[delayed]
languagehacker•1h ago
Nice to see SUNY Albany on here!
onetimeusename•1h ago
I think security became part of compliance so security recommendations got detached from actual security. It seems like a lot of security recommendations are just busy work that justifies having a huge compliance industry. So an example of this might be security scanners for code where the output is not even useful. But using the tool, which searches for irrelevant findings, is required for compliance even if it basically does nothing for security.
general_reveal•1h ago
Just get off as many of these platform as you can. That’s about the only security that you’ll ever get. If you are still in the Matrix, listen the weirdos on here that take “don’t trust anything” seriously to the point of absurdity.

The Matrix was not fiction. Our modern internet is a system. You have to figure out how to live truly free from it, because it absolutely owns you.

__

Revelation 13:16–17

“And he causeth all, both small and great, rich and poor, free and bond, to receive a mark in their right hand, or in their foreheads: And that no man might buy or sell, save he that had the mark…”

nathan_compton•58m ago
The number of times I have to "single sign on" is truly maddening.
scuff3d•45m ago
Was talking with someone about this yesterday. From cold start, for me to get to the VM I do my actual work on I have to

1. Enter a password to decrypt the computer

2. Enter a username and password to log into my account

3. Enter another set of credentials to access the corporate VPN

4. Enter another username and password to access the network the VM is on

5. Enter another username and password to get to the actual machine

6. And then navigate a nest of authorization for docker/git/etc to actually do anything useful

kotaKat•39m ago
At some point I need to ask Corporate IT for my justification logs for every elevation request. I'm certainly sure I've submitted at least a couple hundred "because I said so"s and at least three Bee Movie scripts.
kstenerud•30m ago
And now we're at the threshold of the next level of security fatigue: permission fatigue.

It's shocking how little people are paying attention to this upcoming security nightmare. It wouldn't take much for a bad actor to poison an AI session to wait for you to start selecting yes, yes, yes and then slip in something bad.

randusername•22m ago
This is a much bigger problem than just security.

Incidents are inevitable at scale, but risk management at scale is an append-only operation that eventually becomes so complex and suffocating the only recourse is noncompliance.

Even going to the doctor I find myself pleading with the staff to just let me see my PCP instead of going through the full process. It takes 30 minutes now to get through the opening interrogation about overseas travel, human trafficking, vaccine awareness, anxiety and depression panels, domestic violence questions, multi-part questions about recent falls, and everything else that they keep tacking on. Usually in triplicate, waiting room forms, questions from the nurse, questions from the doctor.

And I know behind each of these individual decisions there is a horror story or someone proactively trying to prevent one, but altogether they create their own.

lloydatkinson•15m ago
Who could have guess bombarding users with 2FA, 3FA, MFA requests to their phone 20 times a day would cause fatigue!

Some personal highlights spread across multiple jobs:

- IT decided they'd make some awful SharePoint page the browser homepage for Chrome via group policy. That page required you to login to your Microsoft account. If it was a Monday morning you'd have to authenticate via SMS just to see your homepage, or, what I did usually was ignore it. Every time I opened a new browser tab I'd get a new SMS. This went on for weeks at a time, maybe 50 SMS per day, out of spite. Eventually they disabled that crap. Anyone that deals with Microsoft logins knows that "Remember me" is almost totally a fake option that does nothing on purpose. [1]

- VPN that requires logging into your Microsoft account, which then sends you a notification to Microsoft Authenticator app, which requires a face scan, followed by typing in a code, followed by another face scan. At no point in the design process of that did someone think typing the code was redundant.

- Despite being a software engineer, able to produce executable binaries at will, which all seem to be trusted by our security software, I still need to talk to IT maybe 5 times a month to get <very popular well known widespread development tool> approved by the security software.

- Bonus points for the previous one, I often need to manually provide the exact DLL's used by the above. Every update means new file hashes, meaning repeating it all over again.

- Local admin rights to my work machine and yet for whatever reason IT make us type a password to open Windows Task Manager.

- Telling us all they have bought Copilot licenses we should use, only for IT to ring you almost immediately after using it because their corpo-garbage firewall starts throwing a fit about Copilot's requests to github.com, despite us already using GitHub.

[1]: https://www.bbc.com/future/article/20150415-the-buttons-that...

charlieboardman•8m ago
My Steam password is one short weird phrase that I can remember. I haven't changed it since high school, ~15 years ago. Never had any security issues.

The modern landscape is frustrating because that setup actually works. Passwords, from a technical perspective, are actually great and are are bulletproof as long as they don't leak. No 2FA required. The entire issue is data leaks and phishing.

iPhone 17 Pro Demonstrated Running a 400B LLM

https://twitter.com/anemll/status/2035901335984611412
136•anemll•2h ago•86 comments

Is it a pint?

https://isitapint.com/
63•cainxinth•53m ago•56 comments

Show HN: Threadprocs – executables sharing one address space (0-copy pointers)

https://github.com/jer-irl/threadprocs
20•jer-irl•59m ago•13 comments

Bombadil: Property-based testing for web UIs

https://github.com/antithesishq/bombadil
157•Klaster_1•4d ago•64 comments

Cyber.mil serving file downloads using TLS certificate which expired 3 days ago

https://www.cyber.mil/stigs/downloads
58•Eduard•1h ago•58 comments

If DSPy is so great, why isn't anyone using it?

https://skylarbpayne.com/posts/dspy-engineering-patterns/
121•sbpayne•2h ago•75 comments

An unsolicited guide to being a researcher [pdf]

https://emerge-lab.github.io/papers/an-unsolicited-guide-to-good-research.pdf
87•sebg•4d ago•11 comments

Migrating to the EU

https://rz01.org/eu-migration/
627•exitnode•6h ago•514 comments

Study: 'Security Fatigue' May Weaken Digital Defenses

https://www.albany.edu/news-center/news/2026-study-security-fatigue-may-weaken-digital-defenses
62•giuliomagnifico•2h ago•37 comments

POSSE – Publish on your Own Site, Syndicate Elsewhere

https://indieweb.org/POSSE
344•tosh•8h ago•75 comments

PC Gamer recommends RSS readers in a 37mb article that just keeps downloading

https://stuartbreckenridge.net/2026-03-19-pc-gamer-recommends-rss-readers-in-a-37mb-article/
756•JumpCrisscross•22h ago•349 comments

GitHub appears to be struggling with measly three nines availability

https://www.theregister.com/2026/02/10/github_outages/
317•richtr•6h ago•171 comments

America tells private firms to "hack back"

https://www.economist.com/united-states/2026/03/22/america-tells-private-firms-to-hack-back
31•andsoitis•3h ago•25 comments

I built an AI receptionist for a mechanic shop

https://www.itsthatlady.dev/blog/building-an-ai-receptionist-for-my-brother/
52•mooreds•6h ago•70 comments

Two pilots dead after plane and ground vehicle collide at LaGuardia

https://www.bbc.com/news/articles/cy01g522ww4o
79•mememememememo•9h ago•118 comments

Trivy under attack again: Widespread GitHub Actions tag compromise secrets

https://socket.dev/blog/trivy-under-attack-again-github-actions-compromise
3•jicea•1d ago•1 comments

Orbán's top opponent says Hungary's alleged Russian backchannel 'treason'

https://www.thetelegraph.com/news/world/article/orb-n-s-top-opponent-says-hungary-s-alleged-22091...
17•vrganj•50m ago•1 comments

Walmart: ChatGPT checkout converted 3x worse than website

https://searchengineland.com/walmart-chatgpt-checkout-converted-worse-472071
272•speckx•3d ago•194 comments

General Motors is assisting with the restoration of a rare EV1

https://evinfo.net/2026/03/general-motors-is-assisting-with-the-restoration-of-an-1996-ev1/
58•betacollector64•2d ago•59 comments

The gold standard of optimization: A look under the hood of RollerCoaster Tycoon

https://larstofus.com/2026/03/22/the-gold-standard-of-optimization-a-look-under-the-hood-of-rolle...
506•mariuz•22h ago•138 comments

Side-Effectful Expressions in C (2023)

https://blog.xoria.org/expr-stmt-c/
7•surprisetalk•5d ago•0 comments

Tin Can, a 'landline' for kids

https://www.businessinsider.com/tin-can-landline-kids-cellphone-cell-alternative-how-2025-9
263•tejohnso•3d ago•213 comments

Reports of code's death are greatly exaggerated

https://stevekrouse.com/precision
519•stevekrouse•1d ago•384 comments

The future of version control

https://bramcohen.com/p/manyana
610•c17r•1d ago•344 comments

Cyberattack on vehicle breathalyzer company leaves drivers stranded in the US

https://techcrunch.com/2026/03/20/cyberattack-on-vehicle-breathalyzer-company-leaves-drivers-stra...
80•speckx•3h ago•94 comments

“Collaboration” is bullshit

https://www.joanwestenberg.com/collaboration-is-bullshit/
135•mitchbob•15h ago•62 comments

Can you get root with only a cigarette lighter? (2024)

https://www.da.vidbuchanan.co.uk/blog/dram-emfi.html
143•HeliumHydride•3d ago•29 comments

Nanopositioning Metrology, Gödel, and Bootstraps

https://www.pi-usa.us/en/tech-blog/nanopositioning-metrology-goedel-and-bootstraps
12•nill0•4d ago•2 comments

Why I love NixOS

https://www.birkey.co/2026-03-22-why-i-love-nixos.html
401•birkey•23h ago•272 comments

GoGoGrandparent (YC S16) is hiring Back end Engineers

https://www.ycombinator.com/companies/gogograndparent/jobs/2vbzAw8-backend-engineer
1•davidchl•13h ago