• jet@hackertalks.com
    link
    fedilink
    English
    arrow-up
    0
    ·
    edit-2
    6 months ago

    That’s down to you and your threat model. Look at the downside of a breach, and look at the convenience of the browser integration. And make the choice for yourself.

    For instance, if I was logging into a top secret military system, I would not use browser integration. That would be outside my threat model

    Not to mention copy and paste on many systems is very insecure. On desktop computers any application can copy from that buffer without you being aware of it. On telephones are getting better about letting you know when an app copied the copy and paste buffer. But it’s something you should model