I ran into this just the other day, a site wouldn't let me paste my password into the "confirm password" field when signing up. Had to resort to editing the HTML properties because there's no way I'm manually typing in my long-ass randomly generated password.
Don't fuck with copy too, my schools e-textbook thing won't let you copy text when quoting it for an essay.
Edit: I appreciate the help but this is on a school laptop, we can't install anything nor open inspect element. Also I already found a workaround by cntrl+c-ing before I lift the left click and it goes to highlight mode.
I'm guessing it's all from the same ad network but I've noticed an uptick in the number of sites hijacking the back button to show more ads. Even the Associated Press site has been doing it and it drives me crazy.
Does this work with any text on page (vs just inputs)?
Currently dealing with several digital textbooks - that I fucking purchased - from Elsevier that disable copy functions, which makes pulling chunks of text from a page to take notes a pain in the ass. I've resorted to just using the snipit tool to capture tiny screenshots of the text I want, but that's ofc significantly less ideal than just highlighting text and hitting Ctrl+C.
This add-on is not actively monitored for security by Mozilla. Make sure you trust it before installing.
It's pretty lame that Mozilla's addons site still doesn't show source code which is guaranteed to correspond to the binary you're installing.
Anyway, I went and read the source on github (which probably corresponds to the extension one can install) and while this part seems very straightforward this other part exceeds my understanding 😂 (i'm not suggesting it is malicious, i just don't understand everything it is doing there or why it is necessary).
What I was really looking at the source for was to see if they were simulating keystrokes (and inserting plausible delays between them) to defeat a more determined anti-pasting adversary, or if they were simply suppressing the hostile website's onPaste handler so that pastes can happen as normal. And: they are doing the latter.
I wonder if any paste-blocking websites detect and defeat this extension yet?
I had used a website that changed the max length of passwords, but ignored, that existing ones might already have been longer.... I overcame the client side validation, but the server side validated it, too...
Just not allowing the clipboard is a legitimate security measure though. A lot of apps can read that memory space, so it's kind of a security black hole.l