A CNBC Columnist Asked Readers For Their Passwords

A CNBC Columnist Asked Readers For Their Passwords

I like a good strong password just as much as anyone else. But CNBC’s stunty idea for a tool that tested the strength of people’s passwords is one of the stupidest things I’ve seen in days — possibly weeks!

A columnist for CNBC’s The Big Crunch tried to make a misguided point about the FBI’s iPhone situation with an interactive tool that asked readers to input their password to see how secure they were. The post is now down, but if you did comply with the CNBC request, it might be a good idea to change your password. You should do this from time to time anyway.

A CNBC Columnist Asked Readers For Their Passwords

The post asked you to type your password into a field, hit enter and voila! CNBC’s expertly coded widget provided detailed analysis of that password, telling you whether it was strong, and if not, what was wrong with it.

I know what you’re thinking: Come on, this was only for “entertainment and educational purposes”, as the widget clearly stated in official-looking italic text. What could go wrong? Well…

A few people on Twitter claimed the widget is an insecure form that actually submits the characters you enter into the text field to third parties. Whether they’re right or not, you should never enter your password into some random internet form.

But is CNBC actually putting people at risk? I asked our in-house expert Adam Pash, the developer who runs Gawker Media’s Editorial Labs, for his take. He said although it’s unlikely, yes, someone could use this tool to get your password.

Since it’s a form field, it reloads the page when you hit “enter”, changing the url and, in effect, saving the password you just typed in.

So for example the original URL is:

http://www.cnbc.com/2016/03/29/apple-and-the-construction-of-secure-passwords.html

After you enter asdfasdf, the page refreshes and the url is:

http://www.cnbc.com/2016/03/29/apple-and-the-construction-of-secure-passwords.html?name=asdfasdf

“In theory, if there’s someone sniffing traffic on your network, they could see these urls being requested in plain text, and then try sniffing on other traffic coming from you that might indicate some account information,” Pash told me. This could be as easy as finding out your email address. And it wouldn’t be hard for these ad trackers to collect a bunch of people’s passwords in their logs.

So while CNBC’s cool tool is not necessarily malicious, it’s more just sloppy. “I’m not sure it’s a serious threat,” says Pash. “But it’s definitely dumb.”

It appears CNBC has realised it’s dumb too, because this is what you get when you try to find the story now:

A CNBC Columnist Asked Readers For Their Passwords

We’ve reached out to CNBC for comment but had not heard back at time of writing.

Meanwhile, this tool seems totally legit.

[CNBC]


The Cheapest NBN 50 Plans

It’s the most popular NBN speed in Australia for a reason. Here are the cheapest plans available.

At Gizmodo, we independently select and write about stuff we love and think you'll like too. We have affiliate and advertising partnerships, which means we may collect a share of sales or other compensation from the links on this page. BTW – prices are accurate and items in stock at the time of posting.