I don't know what's been going on lately but I'm finding that more and more webapps are just storing my password in plain text.
If an app seems sketchy to me in this regard I use a non-standard password and then do a password request to see how this is handled. Most of the time I will get emailed a link to reset my password but more often than I had expected I'm just getting my password emailed to me. (of course I understand getting a reset link doesn't necessarily mean the password is encrypted either)
This happened today with the new version of Hootsuite.com - I forgot I had an account and when I filled in the 'forgot password' form I got an email with one line "Password: XXXXXXXXX'
From all work I've done and developers I've talked with it's best to use some kind of protection on the passwords - even if it's just md5'ing it. Are there any major benefits to storing a password in plain text (from a development standpoint)?
I don't understand it, but it definitely happens. So, maybe the folks who are choosing to save passwords in plain text are accepting the tradeoff in order to avoid having to answer as many support emails.
We actually save plain text passwords within our management apps for a few circumstances; but not for emailing to users and never on world-facing web applications. We offer the user the ability to use passwords in place of SSH keys for hooking up to managed systems in our cloud computing management product and in our cluster modules (though we generally recommend keys and SSL certificates); we also store MySQL passwords on behalf of users so they can manage their own databases from the control panel (this is akin to having MySQL passwords stored in configuration files for web apps, though it's a bit safer since only root can read them directly from the file system). Our webmail client stores user passwords for authenticating to IMAP/POP3 services (much like Thunderbird or Outlook do, only we do it server-side). So, it isn't "benefits" per se, in our case, it's that there's functionality that users want that can be done no other way. They could be two-way hashed, but if an attacker has obtained root, they would have access to the key needed to decrypt the hashed passwords, anyway, so it seems pretty silly to pretend like something is encrypted if the attacks needed to be able to access the plain text would also grant access to the keys for decrypting.