3 dominant themes| Theme | Summary | Representative quotes |
|------|---------|------------------------|
| 1. “Store” ≠ “Load” – semantics matter | Participants stress that “stores in memory” is a misleading phrasing; passwords are loaded temporarily, not persisted, and “stored” conventionally means on‑disk. | “When someone says passwords are ‘stored’, the assumption will always be ‘stored on disk’.” – mfro
“> When someone says passwords are ‘stored’, the assumption will always be ‘stored on disk’.” – saghm |
| 2. In‑memory exposure is unavoidable; only marginal defenses exist | Even with encryption or obfuscation, plaintext passwords must reside in RAM while used, and if an attacker can read process memory they can dump them. Extra layers (guard pages, Credential Guard) help only against limited threat models. | “If an attacker gains administrative access on a terminal server, they can access the memory of all logged‑on user processes.” – gruez
“There’s little hope of protecting against a snooper seeing the passwords you actually use, since they have to exist in plaintext at some point.” – dvt |
| 3. Push toward passkeys/hardware‑based auth; usability trade‑offs | Many see browser‑vendored passkeys as the next step, but they bring forced UI prompts, limited cross‑device portability, and vendor lock‑in concerns. | “One more reason to use hardware‑bound passkeys and not passwords.” – jazzyjackson
“I've been avoiding passkeys but more and more websites are trying to push them … it just goes ahead and triggers my browser passkey creation mechanism without my consent.” – StilesCrisis |