<div dir="ltr"><div><div><div>Hi all;<br>it seems some (google?) DBUS sso service is leaking pw's in cleartext.<br></div>Please see here : <br><br>signal sender=:1.1322 -> dest=(null destination) serial=13 path=/com/google/code/AccountsSSO/SingleSignOn/AuthSession_0; interface=com.google.code.AccountsSSO.SingleSignOn.AuthSession; member=stateChanged<br>
int32 8<br> string "The request is started successfully"<br>method return sender=:1.1322 -> dest=:1.36 reply_serial=4633<br> array [<br> dict entry(<br> string "Secret"<br> variant string "mypasswordincleartext"<br>
)<br> dict entry(<br> string "UserName"<br> variant string "ktone"<br> )<br> ]<br><br></div><div>I myself am not worried on the google origin, but rather on the cleartext password.<br>
</div><div>Giving it was leaking one of my working mail's password, I assume it could be the <br>Exchangle plugin?<br></div><div>Can jolla please confirm / deny?<br></div><br></div><div><br></div>Best,<br>tk<br></div>