It’s 2023, why are websites actively preventing pasting into fields like passwords and credit card number boxes? I use a password manager for security, it’s recommended by my employer to use one, and it even avoids human error like accidentally fat-fingering keys, and best of all with the credit card number I don’t have to memorize anything or know a single digit/character!

I have to use the Don’t Fuck With Paste addon just to be able to paste my secrets into certain monthly billing websites; why is my electric provider and one of my banks so asinine that pasting cannot be allowed? I can only imagine downsides and zero upsides to this toxic dark-pattern behavior.

There is even a mention about this in NIST SP 800-63B, a standard for identity management that some companies must follow in the USA, which mentions forcefully rotating passwords and denying “password paste-in” as antiquated/bad advice:

Verifiers SHOULD permit claimants to use “paste” functionality when entering a memorized secret. This facilitates the use of password managers, which are widely used and in many cases increase the likelihood that users will choose stronger memorized secrets

Edit: I discovered that for Firefox users there’s a simpler way than exposing your secrets to someone’s third-party addon. Simply open about:config, search for dom.event.clipboardevents.enabled, and change it from true to false.

  • t0fr@lemmy.ca
    link
    fedilink
    English
    arrow-up
    92
    arrow-down
    2
    ·
    1 year ago

    Agree. It is a stupid and antiquated idea. Two things I’d like to say though:

    One: you can probably set up some form of auto-type from your password manager to get around this issue.

    Two: blocking pasting is probably because password managers and operating systems must be secure when it comes to the clipboard, and clipboard management. Because if that’s not safe, your passwords you are copying and pasting are not safe.

    • deweydecibel@lemmy.world
      link
      fedilink
      English
      arrow-up
      73
      arrow-down
      3
      ·
      edit-2
      1 year ago

      Two: blocking pasting is probably because password managers and operating systems must be secure when it comes to the clipboard, and clipboard management. Because if that’s not safe, your passwords you are copying and pasting are not safe.

      Yes, but it’s not their clipboard, it’s not their browser, it’s not their operating system, why are they breaking basic functionality when my password isn’t their responsibility until I have entered it into their field and sent it to them?

      This is the nannying bullshit I can’t stand. They made their shit more difficult to use, not to protect our private information on their servers or saved in their software, but solely because they’re concerned about how I’m using the clipboard on my own device.

    • manitcor@lemmy.intai.tech
      link
      fedilink
      English
      arrow-up
      26
      arrow-down
      3
      ·
      1 year ago

      these days password managers clear the clipboard, still the clipboard is not secure which would be why some still block it.

      really its an indication we need to drop User/Pass auth once and for all.

      • Muddybulldog@mylemmy.win
        link
        fedilink
        English
        arrow-up
        25
        ·
        edit-2
        1 year ago

        Which has always been an asinine point of view. By the time a site has blocked the paste the password is already in the clipboard. No security has been added in that regard, only frustration.

      • NewNewAccount@lemmy.world
        link
        fedilink
        English
        arrow-up
        14
        arrow-down
        1
        ·
        1 year ago

        really its an indication we need to drop User/Pass auth once and for all.

        What’s a suitable replacement here?

          • floofloof@lemmy.ca
            link
            fedilink
            English
            arrow-up
            8
            ·
            1 year ago

            I use it where it’s available, with a couple of Yubikey 5s. It’s the best solution I’ve come across.

          • railsdev@programming.dev
            link
            fedilink
            English
            arrow-up
            5
            ·
            1 year ago

            Wish it would be used in more places. Websites in 2023 just now adding OTP with SMS/email is embarrassing. Why would they jump to 10+ year old, insecure tech?

        • Established_Trial@lemm.ee
          link
          fedilink
          English
          arrow-up
          7
          ·
          1 year ago

          Google, Apple, and Microsoft are working on Passkeys. I don’t know the security behind it, but so far it’s been great for the few sites that support it.

        • manitcor@lemmy.intai.tech
          link
          fedilink
          English
          arrow-up
          7
          arrow-down
          1
          ·
          edit-2
          1 year ago

          The system mentioned by Established here is called VRF, there is also technology called Self-Sovereign Identity aka DiD (a w3c standard)

          To keep it simple, essentially we are moving to authenticators using systems that are similar to how a website identifies itself and secures your connection. For the user it will still be mostly the same, unlock device, unlock data (which I bet in some cases will STILL be password during the transition) do your thing. As time goes on and things like identity keys that we carry with us become a thing (think like a fancy version of the electronic door cards).

          In general it will be much easier and less an issue to get into most systems and all of your accounts become more secure as we move away from having any data on the provider that could be used to reconstruct your password. Ofc all of this is still a bit away from being fully realized, expect rollouts to become more serious by the end of the decade.

            • manitcor@lemmy.intai.tech
              link
              fedilink
              English
              arrow-up
              4
              ·
              edit-2
              1 year ago

              this is not dissimilar to how high security setups work for organizations now, really what this is is a scaling up of the kind of things IT administrators are already doing when locking down production among other systems (its a very common login pattern for Linux based systems for thier SSH terminals).

              The big difference here is that your password changes from a password to a digital signature bound to time, hardware and the user. If the user so chooses they can always put a many levels on top of that that they want, be it passwords, additional keys, biometrics, what-have-you.

              Since your credentials never leave your device data breeches do not compromise your account or access to it (only the data the provider failed to protect). This also enables even higher levels of security through the whole credential chain, want to end-to-end-encrypt your data and encode it with your own cipher while storing it in the providers database? This is not only possible it will end up changing how we develop some applications. As a developer I just want to give you the utility, if I can ensure strong encryption that I NEVER have access to, its a whole boat of liability I don’t even have to worry about.

              In short we are taking the mechanics of auth and making it entirely cryptographic with keys without any worry about compromising a simple text input box. The possible combinations of certificate data and system parameters alone increases the difficulty of a breech through login significantly.

              It will not stop everything of course, and the usual risks around a bad release, a failed audit and an admin bypassing things knowing or unknowingly are all still problems.

              The other thing this enables, should it get that far, decentralized replacement of Google/MS/Amazon auth systems many of us MUST gate our sites with, youll be able to accept logins from multiple systems without ever having to write any new code. As the standard becomes adopted and supported firing up a site with all the usual traditional logins combined with the more-modern cert-style setup will no longer be a game of dealing with app setups and IAM, you can just load and go.

              Example of difference here: I could paste my public key to my prod systems here on lemmy and it would not change a thing about access to my systems, no one with the key or any of my signatures could do anything. With certificate based auth we know both sides of the transaction as well so MITM is not a thing in most scenarios.

              • can@sh.itjust.works
                link
                fedilink
                English
                arrow-up
                2
                ·
                1 year ago

                Thank you for the detailed reply. I just had other things in mind. For important things, sure, but I kind of appreciate the ability to give some website a username, password, and maybe an email and that’s all the ask.

                I know IPs and browser fingerprinting kind of make this moot anyway.

                • manitcor@lemmy.intai.tech
                  link
                  fedilink
                  English
                  arrow-up
                  2
                  ·
                  1 year ago

                  you won’t even give them that in this kind of system. you will get a user hash that is based of your signature, the system your using’s key and some mux of time and entropy input. This hash will be how they track you in a database and as systems evolve could even be a way to communicate with the user directly (like email) without knowing or holding any PII/NPI

                  Anything you assign to them would be data they have (maybe a common display name). Anything truly important that needs to be up there can be encrypted with different techniques that would allow the provider to work with your data without ever having to access or decrypt your data.

                  so the idea of them “needing to have something” to function is true, but fundamentally, they don’t need as much to operate in this system and its possible to have standards that enforce security on your more sensitive details that are sent. Imagine the security of your data, on thier system, still being ruled by your security. Even if hackers get in and copy the entire database its effectively useless.

        • Pika@lemmy.world
          link
          fedilink
          English
          arrow-up
          3
          arrow-down
          1
          ·
          1 year ago

          some sites like Walmart are removing the password requirement completly in favor of OTP, mcdonalds does the same, you type your email/phone number it sends you a link and you click the link to gain access. I wouldn’t recommend that for a bank site but, a low risk site? why not.

          • koreth@lemm.ee
            link
            fedilink
            English
            arrow-up
            19
            ·
            1 year ago

            I find that setup an obnoxious user experience. Instead of one hotkey that tells my password manager to fill out the login form, now I have to switch to my mail app, wait for the login email to arrive (if my mail provider or the site’s mail provider is having trouble, no login for me!) then back to my browser where I need to close the original tab because clicking the email link opened a new one.

            If I am on a shared computer, now I need to either manually copy a long URL from my phone or read my email on that computer, a much bigger security risk than just entering a password and 2FA code.

            • Caaaaarrrrlll@lemmy.mlOP
              link
              fedilink
              English
              arrow-up
              3
              ·
              1 year ago

              This is an especially jarring experience when using a phone or mobile device, due to all of the task switching back and forth as mentioned.

    • gornius@lemmy.world
      link
      fedilink
      English
      arrow-up
      5
      ·
      1 year ago

      You can just as easily have keylogger running in backround as clipboard sniffer.

      Browsers don’t have permission to read clipboard, just change them (unless you specifically give them permission to read it).

      As you can see no benefits not using PM. It’s in fact safer, because if databade with non-hashed passwords leaks, your password doesn’t because it’s different for every service.

  • iamak@infosec.pub
    link
    fedilink
    English
    arrow-up
    55
    ·
    1 year ago

    This is one of the dumbest shit ngl. My bank also does this. However they go one step further. They force a maximum 12 letter password and 1 character of each type (capital, small, number, symbol) is necessary. This actively reduces password security smh

    • lenathaw@lemmy.ml
      link
      fedilink
      English
      arrow-up
      7
      ·
      1 year ago

      Mine truncated the first 8 characters, when I discovered that I sent them a request to their cyber security department and they told me.of was by design.

      I closed my account over that bs

    • dom@lemmy.ca
      link
      fedilink
      English
      arrow-up
      4
      arrow-down
      22
      ·
      1 year ago

      Because people would write down their passwords? I wonder how many people use their browser’s built in password manager

      • chinpokomon@lemmy.ml
        link
        fedilink
        English
        arrow-up
        29
        ·
        edit-2
        1 year ago

        That’s one way it is weaker, but moreso because it reduces the entropy. If a user can provide a password which uses 26 letters, upper and lowercase, 10 numbers, and an unrestricted set of symbols, but for the sake of argument we’ll say 10, then there are a lot of possible combinations. If you are limited to only 12 possible at max, it is 46^12. Now you impose an artificial requirement that it is one of each, then it actually weakens that further by making the hacker know that there is one of each in there so it is 26+26+10+10+46^8. Or roughly 910^19 vs. 210^13. I personally try to use passwords which are between 16-20 characters long, or roughly 2*10^33. By restricting the total number of characters and forcing specific combinations, then the password is significantly less cryptographically sound.

        Using this calculator, https://bitwarden.com/password-strength/, it is a difference of 3 hours vs. centuries using the bank’s mandate vs. only lowercase and 20 characters.

        • dom@lemmy.ca
          link
          fedilink
          English
          arrow-up
          7
          arrow-down
          1
          ·
          1 year ago

          The 20 character requirement is kind of a huge component though.

          Sure. Banks should be enforcing that instead of special characters. But the vast majority of people would just choose “football” or “password” as their passwords if they weren’t required to do something more complex.

          I disagree with the argument that it’s less secure to require symbols in passwords as a blanket statement . It’s less secure to require symbols in passwords than if you are also enforcing much longer minimum passwords as well.

          • zzz@feddit.de
            link
            fedilink
            English
            arrow-up
            3
            ·
            1 year ago

            Sure. Banks should be enforcing that instead of special characters. But the vast majority of people would just choose “football” or “password” as their passwords if they weren’t required to do something more complex.

            Ironically though, something like

            IveLovedUsingFootballAsMyPassword!EverSinceThe1980s.

            as a password would be miles ahead of even the most random character combination possible, but which is only 12-20 characters long.

            And as an added bonus, the above example is practically guaranteed to have never been used before, in addition to being correct horse battery staple (that is, tremendously easy to remember).

            I hate when a website/app in this day and age imposes an absurdly low upper password character limit like 30. (cough looking at you, PayPal, when I re-set my password a few years ago it was freaking 20, not exaggerating).

            Shouldn’t password length below like 100 (or realistically, any length until it starts crashing the js behind it?) not matter anyways, since it’s all salted, peppered and hashed before further processing anyways?

            • evatronic@lemm.ee
              link
              fedilink
              English
              arrow-up
              5
              ·
              edit-2
              1 year ago

              There is no technical reason for there to be a maximum length on the user’s password.

              Watch:

              Here’s a password bitwarden generated for me:

              Bonded-Reforest-Prenatal7-Spoken-Straggler-Catcall

              Here’s the base64-encoded SHA3-512 hash for that password:

              Q2WaVLdTAg5T4xi3VB5PMI7GkAv3np9Usa2+uTMglbMcDDAdYXzUNgAzzYLoSWku/e007vkKfvSotzoriSKt4Q==

              Here’s the has for the password password:

              6adUhnNqVQr0/qhh4jeDBcSlVaBQlN7h3KL2iv6knMOlDo3m6hMepSExH01vsFShRugoL441/y5jaMGmLpCXFg==

              Notice how the thing the website should be storing in their database is exactly the same length, regardless of the input?

              For extra fun, here’s the hash for your sample password:

              GbxnrQ31PInMSu2ik2ZR5TefgXIInSJBxZ5zwcYmkRxzw07tZoxPqJbEmcbuTBpzCZzwLrqqcxz04p8ToGszRQ==

              Here’s a tool to generate your own hashes: https://www.liavaag.org/English/SHA-Generator/

              • r1veRRR@feddit.de
                link
                fedilink
                English
                arrow-up
                4
                ·
                1 year ago

                I mean, if we’re being pedantic, there’s a reasonable technical limit once the password reaches multiple MBs of data.

                But yes, there’s no good reason for the actual limits we’re seeing out in the wild.

                • zzz@feddit.de
                  link
                  fedilink
                  English
                  arrow-up
                  1
                  ·
                  1 year ago

                  I mean, if we’re being pedantic, there’s a reasonable technical limit once the password reaches multiple MBs of data.

                  But yes, there’s no good reason for the actual limits we’re seeing out in the wild.

                  Yes @evatronic, this is of course what I meant with “except if the js starts crashing maybe”. I’m aware that hashes end up with the same length, no worries 😄

  • SolidGrue@lemmy.world
    link
    fedilink
    English
    arrow-up
    48
    arrow-down
    2
    ·
    1 year ago

    Clipboards (the buffer where copypasta is stored) are a weak link in security because ANY app can expect access to it. If there is malware on your system it generally has access to the clipboard buffer, and therefore any credentials you might paste.

    “OK, but usually you only paste the password and type the username?”

    Quite true. Keyloggers are also a thing and easy to install on desktop OS, maybe harder on mobile.OS.since (at least on android) you need to grant permissions for keyboard apps. Either way if a keylogger is installed then you’re fucked.

    It boils down to a bad risk assessment. Those services decided memorized credentials must be manually typed to prevent clipboard snooping at the (likely) cost of reduced password entropy and/or weak MFA (e.g., SMS or email based TOTP). In other words: stupid CISOs.

    • QuarterSwede@lemmy.world
      link
      fedilink
      English
      arrow-up
      72
      ·
      1 year ago

      The problem is, by the time you’ve figured out that you can’t paste your password you’ve already copied it …

    • R51@lemmy.ml
      link
      fedilink
      English
      arrow-up
      10
      ·
      1 year ago

      uh if you’ve got a keylogger on your system, clipboard access is not that far away

  • Transient Punk@sh.itjust.works
    link
    fedilink
    English
    arrow-up
    41
    ·
    1 year ago

    Just adding that financial institutions are very hesitant to adopt new technology, and therefore tend to abide by what tech enthusiasts would consider antiquated best practices.

    Source: Software engineer in Fintech

    • scytale@lemmy.world
      link
      fedilink
      English
      arrow-up
      10
      ·
      edit-2
      1 year ago

      Yup, that behavior is notorious with financial institutions. Using old and archaic programming languages and systems that they are too afraid to touch because they don’t know how to rebuild it if it crashes. What I do is use passphrases for cases like that, so I can easily type them myself as a last resort. I just check my password manager quickly and then manually enter the password.

    • bluGill@kbin.social
      link
      fedilink
      arrow-up
      8
      ·
      1 year ago

      Sure, but the NIST documents referenced in the post are admissible in court. With some creative thinking you can probably help a criminal break your weak password and then put the liability on them because if their webform was correct yoy would have pasted a strong password from your manager.

    • ShakeThatYam@lemmy.world
      link
      fedilink
      English
      arrow-up
      7
      ·
      1 year ago

      Only, last month Treasury Diirect finally removed the virtual keyboard as the only means of password entry 🙃

      I don’t believe their passwords are case sensitive yet.

    • Saneless@lemmy.world
      link
      fedilink
      English
      arrow-up
      1
      ·
      1 year ago

      Well, because it works “well enough” right now. Changing it is a monumental effort because they’re such slow ass big stupid companies anymore.

      And when they fuck it up, and they will, no one wants to be the reason for it so it never happens

  • foo@withachanceof.com
    link
    fedilink
    English
    arrow-up
    35
    arrow-down
    1
    ·
    1 year ago

    Same reason some websites still have max password lengths of 12 characters: Bad programmers that don’t know what they’re doing when it comes to the most basic of security concepts.

    • deegeese@sopuli.xyz
      link
      fedilink
      English
      arrow-up
      32
      ·
      1 year ago

      Bullshit requirements like that come from product managers.

      Programmers would rather be lazy and not have to implement a limit anyway

    • Pechente@feddit.de
      link
      fedilink
      English
      arrow-up
      15
      ·
      1 year ago

      This one always surprises me. Who the fuck is not hashing passwords? What else is wrong with this site if such basic concepts are ignored?

      • Pika@lemmy.world
        link
        fedilink
        English
        arrow-up
        7
        ·
        1 year ago

        or sometime they do hash the password but they are just ignorant of how it works so they keep the limit regardless

      • Caaaaarrrrlll@lemmy.mlOP
        link
        fedilink
        English
        arrow-up
        6
        ·
        1 year ago

        There’s a website that an apartment I stayed at used for registering vehicle license plates. They have a towing company come around at night and tow anyone not registered on the website. The website emails me my password in plaintext when I go to reset it. I’ve complained to the apartment manager and the website’s contact points, but gotten nowhere, they still have this behavior today. It’s ridiculously stupid and ignorant.

      • argv_minus_one@beehaw.org
        link
        fedilink
        English
        arrow-up
        4
        ·
        edit-2
        1 year ago

        If you use a proper password hash function, and some joker submits a million-character password, you’ve got a denial-of-service attack.

        The limit doesn’t have to be 12 characters, but there does need to be a limit.

        • PlexSheep@feddit.de
          link
          fedilink
          English
          arrow-up
          1
          ·
          1 year ago

          Why would that be a DOS? The hash of something is always the same length. Might only take a bit more time to compute, but a million characters isn’t that much with modern hardware. If anything, the risk of collisions would be higher.

      • Flemmy@lemmy.world
        link
        fedilink
        English
        arrow-up
        2
        ·
        1 year ago

        That ship has sailed… So many sites don’t actually change pages, they just load different data - it’s way faster and looks better

        Problem is, the back button takes you off the site no matter where you are, so now you can change the URL and change the history through code to have the best of both worlds

        Then, there’s the people who do it badly, and there’s the people who think “hey, if you need pro StarCraft level clicking speed to back out of my site, maybe for some reason that will make them decide to stay”

  • dan@upvote.au
    link
    fedilink
    English
    arrow-up
    23
    ·
    1 year ago

    Edit: I discovered that for Firefox users there’s a simpler way than exposing your secrets to someone’s third-party addon. Simply open about:config, search for dom.event.clipboardevents.enabled, and change it from true to false

    Note that this disables all DOM/JavaScript clipboard events, so sites that need custom clipboard handling (like Google Docs) won’t work properly if you try to copy and paste.

    What you can instead do is:

    1. Right-click the password field
    2. Click on the “console” tab in the browser dev tools
    3. Type $0.value = 'password' and press enter, with the correct password of course.
  • HubertManne@kbin.social
    link
    fedilink
    arrow-up
    21
    ·
    1 year ago

    Thank you. Its wonderful to see someone else feesl this way. I feel there are less than there used to be like 5 or 10 years ago but man it urks me. I was really excited by the add on but honestly im not sure I want to give it that permission which stinks. Would love to disable that behavior. Its so stupid to force you to make an easy password.

    • Caaaaarrrrlll@lemmy.mlOP
      link
      fedilink
      arrow-up
      3
      ·
      edit-2
      1 year ago

      I’ve been using that specific addon for the last 5 or 6 years and haven’t had any issues or compromises I could identify that led to or came from it. It’s also on GitHub, which the author of that repository is the same publisher on Mozilla’s site (Aaron R), however it hasn’t been updated in a while so check out the forks if interested.

  • SuperIce@lemmy.world
    link
    fedilink
    English
    arrow-up
    13
    ·
    1 year ago

    Most password managers now have an option to ignore the no paste option for text fields because it became so common. I enabled that quite some time ago and haven’t had issues since.

    • what@sh.itjust.works
      link
      fedilink
      English
      arrow-up
      3
      ·
      1 year ago

      My bank’s website clears the password field when it’s filled by my password manager

      • bluGill@kbin.social
        link
        fedilink
        arrow-up
        6
        ·
        1 year ago

        Send the nist documents above via certified mail to your banks lawyer and demand they fix their bugs before you sue them for being insecure…

  • protput@lemmy.world
    link
    fedilink
    English
    arrow-up
    12
    ·
    1 year ago

    I have a hotkey that types my clipboard instead of pasting it. Just for this problem.

  • dQw4w9WgXcQ@lemm.ee
    link
    fedilink
    English
    arrow-up
    9
    ·
    1 year ago

    I have a Windows VDI at my workplace which I completely stopped using when I started with a password manager. The Windows login screen disables paste, and I would have to type in a ~25 character long word of entropy in letters, numbers, casing and symbols.

    So I use the Linux VDI instead.

  • eth0p@iusearchlinux.fyi
    link
    fedilink
    English
    arrow-up
    6
    ·
    edit-2
    1 year ago

    A couple years back, I had some fun proof-of-concepting the terrible UX of preventing password managers or pasting passwords.

    It can get so much worse than just an alert() when right-clicking.

    The codepen.

    A small note: It doesn’t work with mobile virtual keyboards, since they don’t send keystrokes. Maybe that’s a bug, or maybe it’s a security feature ;)

    But yeah, best tried with a laptop or desktop computer.

    How it detects password managers:

    • Unexpected CSS or DOM changes to the input element, such as an icon overlay for LastPass.

    • Paste event listening.

    • Right clicking.

    • Detecting if more than one character is inserted or deleted at a time.

    In hindsight, it could be even worse by using Object.defineProperty to check if the value property is manipulated or if setAttribute is called with the value attribute.

  • Hangglide@lemmy.world
    link
    fedilink
    English
    arrow-up
    7
    arrow-down
    8
    ·
    edit-2
    1 year ago

    Apps like tic-toc can see the text that you are holding in your “copy” cache. If you are copying passwords to log in to your bank or other sensitive site and then later open tic-toc, you just inadvertently gave them your password.

    It is generally bad practice to ever “copy” your passwords, even if it is easier.

    • danhakimi@kbin.social
      link
      fedilink
      arrow-up
      13
      ·
      1 year ago

      People frustrated by this will just pick weaker passwords. Of course, the main solution is to allow password managers to insert passwords directly, but I’ve noticed a few sites don’t seem to work with those, either…

    • Max-P@lemmy.max-p.me
      link
      fedilink
      English
      arrow-up
      7
      ·
      1 year ago

      That’s why most password managers only put it in the clipboard for 5-10 seconds and then empties it.

      Modern Android also disallow pasting without interaction and it pops up a toast when an app pastes the content of your clipboard. TikTok stopped doing it as a result as it’s obvious when they do.

    • deathbird@mander.xyz
      link
      fedilink
      English
      arrow-up
      6
      arrow-down
      1
      ·
      1 year ago

      It seems like being able to view your copy cache or clipboard is an ability which should be blocked on all operating systems unless the user is literally initiating a paste.

    • dutchkimble@lemy.lol
      link
      fedilink
      English
      arrow-up
      2
      ·
      1 year ago

      Phones like Samsung, windows clipboard history, Linux depending on distro and what you install save clipboard history, so it is kinda unsafe

      • Caaaaarrrrlll@lemmy.mlOP
        link
        fedilink
        English
        arrow-up
        1
        ·
        1 year ago

        I specifically disabled clipboard history on my phone and the only device I have Windows on. It’s not 100% safe, but it’s better than the default.

    • Caaaaarrrrlll@lemmy.mlOP
      link
      fedilink
      English
      arrow-up
      2
      ·
      1 year ago

      I don’t have a TikTok account nor do I have the app installed on any device.

      Funnily enough actually, when I went to register early on a few years back, my email had already been registered by some bot and TikTok had banned my email, their tech support has never replied to anything I’ve asked them regarding it and I never had any correspondence about it in my email messages prior. So, I never opened an account. Sure, I could have used another email or given it a throwaway, but by that time I was already aware of the invasive nature of TikTok and I just didn’t care for it after that. I only wanted to register my account to stake my presence there before others with my name, and I didn’t succeed, so I gave up pretty quickly. It’s a dead site to me. I’m also not a fan of all of the cheap imitations like YouTube Shorts, or the re-posts that happened(still happen?) on Reddit.