Hotspotshield is an ad bomber (at least for the free version) and its security/privacy is subpar from what I read/heard.Why?
True for the free version. I can testify not true for the premium version. As far as speed goes, in my limited trial of VPN services, it is the fastest.Hotspotshield is an ad bomber (at least for the free version) and its security/privacy is subpar from what I read/heard.
Time will tell.So this is bad or good ? I don’t understand![]()
Hello
I have been using 1Password couple years now, but I feel sadly for a change. What do you recommend? What is the state of Password Managers at 2019?
I see password managers like Keeper and Dashlane getting bigger? While Lastpass seems to have really slow development?
Oh sh!t?Password managers are great. But password managers themselves need to be super secure. Of course, if they are hacked, all your passwords are there for attackers to see and that would be a disaster.
So major password manager firms will be feeling the heat today after a report from Independent Security Evaluators (ISE) found fundamental flaws that expose user credentials in the computer memory while locked. According to researchers, this renders them “no more secure than saving passwords in a text file”.
The ISE evaluated 1Password, Dashlane, KeePass, and LastPass, which are used by a total of 60 Million users and 93,000 Businesses globally. It found that all the products failed to provide the security to safeguard a user’s passwords “as advertised”.
According to the ISE. Worryingly, the researchers found that in some circumstances, the master password was residing in the computer’s memory in a plain text readable format. And once the master password is available to the attacker, they can decrypt the password manager database.
These vulnerabilities were in the desktop apps and fixed quickly if I remember correctly.Oh sh!t?
I suspect the same, but to confirm it one have to backtrack updates, and because that report ( very interesting read ) is from February this year I rather pass and take a cup of coffee instead.These vulnerabilities were in the desktop apps and fixed quickly if I remember correctly.
I’m just remembering, possibly incorrectly, from reading the responses from the companies to the press. I could be conflating it with a different issue.I suspect the same, but to confirm it one have to backtrack updates, and because that report ( very interesting read ) is from February this year I rather pass and take a cup of coffee instead.![]()
Here's the link for anyone that's curious.
![]()
Password Managers: Under the Hood of Secrets Management - Independent Security Evaluators
Password managers allow the storage and retrieval of sensitive information from an encrypted database. Users rely on them to provide better security guarantees against trivial exfiltration than alternative ways of storing passwords, such as an unsecured flat text file. In this paper we propose...www.ise.io
Oh sh!t?
what you mean? you want create a space in the vault to keep your license keys? you can do it already, just create a folder and inside make an entry for each software, then put the license keys in the note area..Does anyone know if Bitwarden will ever become more polished ? I know you don't know what I am talking about I am talking about the GUI.
I want sections for license keys for my software.
You can put them in secure notes or the secure notes on a login.Does anyone know if Bitwarden will ever become more polished ? I know you don't know what I am talking about I am talking about the GUI.
I want sections for license keys for my software.
yes LOL , i never paid attention to this hahahahaYou can put them in secure notes or the secure notes on a login.
Password managers are great. But password managers themselves need to be super secure. Of course, if they are hacked, all your passwords are there for attackers to see and that would be a disaster.
So major password manager firms will be feeling the heat today after a report from Independent Security Evaluators (ISE) found fundamental flaws that expose user credentials in the computer memory while locked. According to researchers, this renders them “no more secure than saving passwords in a text file”.
The ISE evaluated 1Password, Dashlane, KeePass, and LastPass, which are used by a total of 60 Million users and 93,000 Businesses globally. It found that all the products failed to provide the security to safeguard a user’s passwords “as advertised”.
According to the ISE. Worryingly, the researchers found that in some circumstances, the master password was residing in the computer’s memory in a plain text readable format. And once the master password is available to the attacker, they can decrypt the password manager database.
This is the whole point of end-to-end encryption and hashing. Your "vault" is encrypted with your master password, only you know this password, the server sees a hashed version of it that your local client sends. In the case of Bitwarden it's hashed again server-side before checking if the hashes match.Of course, if they are hacked, all your passwords are there for attackers to see and that would be a disaster.
Bitwarden salts and hashes your master password with your email address on the client (your computer/device) before it is transmitted to our servers. Once the server receives the hashed password from your computer/device it is then salted again with a cryptographically secure random value, hashed again and stored in our database. This process is repeated and hashes are compared every time you log in.
The hashing functions that are used are one way hashes. This means that they cannot be reverse engineered by anyone at Bitwarden to reveal your true master password. In the hypothetical event that the Bitwarden servers were hacked and your data was leaked, the data would have no value to the hacker.
Does Bitwarden use a salted hash for my password?
Your OTP won't protect you if your password manager is hacked, or anything is hacked for that matter. Once the database is local your "vault" is encrypted with your master password in most password managers, and secret key as well in 1Password.True, but, all these password managers nowadays use 2FA, 1Password uses 3FA...
One is the master password
One is the Secret Key
One is the one time password from Google Authenticator, Authy, etc...
What about that scenario?
This is the whole point of end-to-end encryption and hashing. Your "vault" is encrypted with your master password, only you know this password, the server sees a hashed version of it that your local client sends. In the case of Bitwarden it's hashed again server-side before checking if the hashes match.
I'll use Bitwarden as an example:
I have 2FA even on my old throw away yahoo account. Someone finally tried to access it and I got an alert and denied it. Never seen it in action before other than authenticating a session I initiated, pretty useful.If you're hacked you're done, they take all the passwords from your local machine when you decrypt them with your master password - not from the remote server. To mitigate this
1) never store your 2FA codes for your accounts on the same password manager you use for your passwords (I'd go as far as don't use the same machine, to maximally decouple the 2nd factor from your passwords)
2) take measures to secure the machine to avoid compromise
3) don't sweat over it, if they only have the passwords without the 2FA codes for your logins nothing can happen and if you use a good security product this should not happen in the first place.