Skip to content
  • Categories
  • Recent
  • Tags
  • Popular
  • World
  • Users
  • Groups
Skins
  • Light
  • Brite
  • Cerulean
  • Cosmo
  • Flatly
  • Journal
  • Litera
  • Lumen
  • Lux
  • Materia
  • Minty
  • Morph
  • Pulse
  • Sandstone
  • Simplex
  • Sketchy
  • Spacelab
  • United
  • Yeti
  • Zephyr
  • Dark
  • Cyborg
  • Darkly
  • Quartz
  • Slate
  • Solar
  • Superhero
  • Vapor

  • Default (Cyborg)
  • No Skin
Collapse
Brand Logo

CIRCLE WITH A DOT

  1. Home
  2. Uncategorized
  3. Contrary to what password managers say, a server compromise can mean game over.

Contrary to what password managers say, a server compromise can mean game over.

Scheduled Pinned Locked Moved Uncategorized
24 Posts 18 Posters 0 Views
  • Oldest to Newest
  • Newest to Oldest
  • Most Votes
Reply
  • Reply as topic
Log in to reply
This topic has been deleted. Only users with topic management privileges can see it.
  • dangoodin@infosec.exchangeD dangoodin@infosec.exchange

    Contrary to what password managers say, a server compromise can mean game over.

    Link Preview Image
    Password managers' promise that they can't see your vaults isn't always true

    Contrary to what password managers say, a server compromise can mean game over.

    favicon

    Ars Technica (arstechnica.com)

    causeofbsod@wetdry.worldC This user is from outside of this forum
    causeofbsod@wetdry.worldC This user is from outside of this forum
    causeofbsod@wetdry.world
    wrote last edited by
    #8

    @dangoodin i mean if the server can deliver code (say, to a web-based version) then its simple to push some code that sends the actual encryption keys back

    1 Reply Last reply
    0
    • xlrobot@mastodon.socialX xlrobot@mastodon.social

      @dangoodin cool cool just remember that contrary to what Ars says, their articles aren't written by people

      gullevek@famichiki.jpG This user is from outside of this forum
      gullevek@famichiki.jpG This user is from outside of this forum
      gullevek@famichiki.jp
      wrote last edited by
      #9

      @xlrobot @dangoodin Hahahaha. Poor ars fucked themselves over hard. Nobody will trust anything thy write anymore

      C 1 Reply Last reply
      0
      • dangoodin@infosec.exchangeD dangoodin@infosec.exchange

        Contrary to what password managers say, a server compromise can mean game over.

        Link Preview Image
        Password managers' promise that they can't see your vaults isn't always true

        Contrary to what password managers say, a server compromise can mean game over.

        favicon

        Ars Technica (arstechnica.com)

        lupus_blackfur@mastodon.worldL This user is from outside of this forum
        lupus_blackfur@mastodon.worldL This user is from outside of this forum
        lupus_blackfur@mastodon.world
        wrote last edited by
        #10

        @dangoodin
        @briankrebs

        FFS...

        Have we not known this since...
        Oh, I don't know...

        Maybe since the cloud FUCKING has existed...???

        🤔🤔🙄🙄

        1 Reply Last reply
        0
        • dangoodin@infosec.exchangeD dangoodin@infosec.exchange

          Contrary to what password managers say, a server compromise can mean game over.

          Link Preview Image
          Password managers' promise that they can't see your vaults isn't always true

          Contrary to what password managers say, a server compromise can mean game over.

          favicon

          Ars Technica (arstechnica.com)

          tartley@fosstodon.orgT This user is from outside of this forum
          tartley@fosstodon.orgT This user is from outside of this forum
          tartley@fosstodon.org
          wrote last edited by
          #11

          @dangoodin One of the reasons why ppl should simply use a non-cloud password manager like Keepassxc. Sync the encrypted file where you need it using something like syncthing. Own your data! And especially such a crucial thing as all your passwords. Why why why would you ever entrust that to someone else?

          angelascholder@mastodon.energyA 1 Reply Last reply
          0
          • dangoodin@infosec.exchangeD dangoodin@infosec.exchange

            Contrary to what password managers say, a server compromise can mean game over.

            Link Preview Image
            Password managers' promise that they can't see your vaults isn't always true

            Contrary to what password managers say, a server compromise can mean game over.

            favicon

            Ars Technica (arstechnica.com)

            iveyline@mastodon.nzI This user is from outside of this forum
            iveyline@mastodon.nzI This user is from outside of this forum
            iveyline@mastodon.nz
            wrote last edited by
            #12

            @dangoodin I keep all my passwords on two separate external drive which are disconnected from my laptop ehen I don't need them

            x41h@infosec.exchangeX 1 Reply Last reply
            0
            • slyborg@vmst.ioS slyborg@vmst.io

              So… “your data is safe even if the server is breached” and also “nothing can prevent data compromise if an attacker controls the server”. Subtle difference, I guess - maybe your vault is uncrackable if the data leaks/is stolen, but the actual worst case threat model is where an attacker has backdoored your infrastructure. (2/3)

              slyborg@vmst.ioS This user is from outside of this forum
              slyborg@vmst.ioS This user is from outside of this forum
              slyborg@vmst.io
              wrote last edited by
              #13

              The only way to win is not to play - and 1Password removed the ability to have local vaults in order to increase shareholder value. I cringe every time I see that page of theirs that proudly claims that “1Password has never been breached” because the headline revealing a massive 1Password breach is simply inevitable. (3/3)

              1 Reply Last reply
              0
              • slyborg@vmst.ioS slyborg@vmst.io

                @dangoodin https://1passwordstatic.com/files/security/1password-white-paper.pdf

                "At present there’s no practical method for a user to verify the public key they’re encrypting data to belongs to their intended recipient. As a consequence it would be possible for a malicious or compromised 1Password server to provide dishonest public keys to the user, and run a successful attack. Under such an attack, it would be possible for the 1Password server to acquire vault encryption keys with little ability for users to detect or prevent it.” (1/3)

                slyborg@vmst.ioS This user is from outside of this forum
                slyborg@vmst.ioS This user is from outside of this forum
                slyborg@vmst.io
                wrote last edited by
                #14

                So… “your data is safe even if the server is breached” and also “nothing can prevent data compromise if an attacker controls the server”. Subtle difference, I guess - maybe your vault is uncrackable if the data leaks/is stolen, but the actual worst case threat model is where an attacker has backdoored your infrastructure. (2/3)

                slyborg@vmst.ioS 1 Reply Last reply
                0
                • dangoodin@infosec.exchangeD dangoodin@infosec.exchange

                  Contrary to what password managers say, a server compromise can mean game over.

                  Link Preview Image
                  Password managers' promise that they can't see your vaults isn't always true

                  Contrary to what password managers say, a server compromise can mean game over.

                  favicon

                  Ars Technica (arstechnica.com)

                  slyborg@vmst.ioS This user is from outside of this forum
                  slyborg@vmst.ioS This user is from outside of this forum
                  slyborg@vmst.io
                  wrote last edited by
                  #15

                  @dangoodin https://1passwordstatic.com/files/security/1password-white-paper.pdf

                  "At present there’s no practical method for a user to verify the public key they’re encrypting data to belongs to their intended recipient. As a consequence it would be possible for a malicious or compromised 1Password server to provide dishonest public keys to the user, and run a successful attack. Under such an attack, it would be possible for the 1Password server to acquire vault encryption keys with little ability for users to detect or prevent it.” (1/3)

                  slyborg@vmst.ioS 1 Reply Last reply
                  0
                  • iveyline@mastodon.nzI iveyline@mastodon.nz

                    @dangoodin I keep all my passwords on two separate external drive which are disconnected from my laptop ehen I don't need them

                    x41h@infosec.exchangeX This user is from outside of this forum
                    x41h@infosec.exchangeX This user is from outside of this forum
                    x41h@infosec.exchange
                    wrote last edited by
                    #16

                    @Iveyline @dangoodin only useful if you trust the 3P is actually encrypting your password on their server.

                    1 Reply Last reply
                    0
                    • dangoodin@infosec.exchangeD dangoodin@infosec.exchange

                      Contrary to what password managers say, a server compromise can mean game over.

                      Link Preview Image
                      Password managers' promise that they can't see your vaults isn't always true

                      Contrary to what password managers say, a server compromise can mean game over.

                      favicon

                      Ars Technica (arstechnica.com)

                      angelascholder@mastodon.energyA This user is from outside of this forum
                      angelascholder@mastodon.energyA This user is from outside of this forum
                      angelascholder@mastodon.energy
                      wrote last edited by
                      #17

                      @dangoodin Yeah, great!
                      Still happy to be using KeePass with the database on our own NAS with a copy in an online recoverable place for a big disaster where we would lose all our electronic devices.

                      The desktops connect direct to the database file on the NAS. It's synchronised to our netbooks and laptop, and on the mobiles the file is synchronised via WebDAV. So, we have access on all our devices, and it's all under our own control.

                      1 Reply Last reply
                      0
                      • tartley@fosstodon.orgT tartley@fosstodon.org

                        @dangoodin One of the reasons why ppl should simply use a non-cloud password manager like Keepassxc. Sync the encrypted file where you need it using something like syncthing. Own your data! And especially such a crucial thing as all your passwords. Why why why would you ever entrust that to someone else?

                        angelascholder@mastodon.energyA This user is from outside of this forum
                        angelascholder@mastodon.energyA This user is from outside of this forum
                        angelascholder@mastodon.energy
                        wrote last edited by
                        #18

                        @tartley @dangoodin I don't really like KeePassXC, but didn't manage to get KeePass back on my Ubuntu machine.

                        1 Reply Last reply
                        0
                        • gullevek@famichiki.jpG gullevek@famichiki.jp

                          @xlrobot @dangoodin Hahahaha. Poor ars fucked themselves over hard. Nobody will trust anything thy write anymore

                          C This user is from outside of this forum
                          C This user is from outside of this forum
                          cafeinux@infosec.exchange
                          wrote last edited by
                          #19

                          @gullevek
                          Care to elaborate? I suppose Ars published some bad AI slop but I didn't get to witness the drama, so I don't know the details nor the extend of it.
                          @xlrobot @dangoodin

                          gullevek@famichiki.jpG 1 Reply Last reply
                          0
                          • C cafeinux@infosec.exchange

                            @gullevek
                            Care to elaborate? I suppose Ars published some bad AI slop but I didn't get to witness the drama, so I don't know the details nor the extend of it.
                            @xlrobot @dangoodin

                            gullevek@famichiki.jpG This user is from outside of this forum
                            gullevek@famichiki.jpG This user is from outside of this forum
                            gullevek@famichiki.jp
                            wrote last edited by
                            #20

                            @cafeinux @xlrobot @dangoodin https://sfba.social/@jeridansky/116089180436195865

                            Basically Ars published an article where most of the quotes where made up by AI and the article was about the Mathplot guy who “upset” an LLM agent that then wrote a hate post about beeing rejected from a pull request. The whole thing is just surreal. I lost all hope into the future

                            1 Reply Last reply
                            0
                            • rrustema@mastodon.socialR This user is from outside of this forum
                              rrustema@mastodon.socialR This user is from outside of this forum
                              rrustema@mastodon.social
                              wrote last edited by
                              #21

                              @notyourfanboy @dangoodin That version is not supported anymore, is it? I was forced to use their cloud when upgrading from version 7 to 8.

                              1 Reply Last reply
                              0
                              • rrustema@mastodon.socialR This user is from outside of this forum
                                rrustema@mastodon.socialR This user is from outside of this forum
                                rrustema@mastodon.social
                                wrote last edited by
                                #22

                                @notyourfanboy @dangoodin I am sorry, I assumed 1Password. Will check out Password Safe!

                                1 Reply Last reply
                                0
                                • dangoodin@infosec.exchangeD dangoodin@infosec.exchange

                                  @tehstu

                                  Well, first it's entirely possible that your threat model doesn't really require a nation-state group hacking a Bitwarden server. Beyond that, turn off the key escrow and other features mentioned in the article and you're likely fine.

                                  tab2space@mastodon.socialT This user is from outside of this forum
                                  tab2space@mastodon.socialT This user is from outside of this forum
                                  tab2space@mastodon.social
                                  wrote last edited by
                                  #23

                                  @dangoodin @tehstu

                                  Likely fine for now, until the next server-hosted "not really zero knowledge" problem is discovered. Very likely, it already has been discovered... So you're down to hoping the discoverer isn't hunting you and your secrets in particular.

                                  1 Reply Last reply
                                  0
                                  • dangoodin@infosec.exchangeD dangoodin@infosec.exchange

                                    Contrary to what password managers say, a server compromise can mean game over.

                                    Link Preview Image
                                    Password managers' promise that they can't see your vaults isn't always true

                                    Contrary to what password managers say, a server compromise can mean game over.

                                    favicon

                                    Ars Technica (arstechnica.com)

                                    cys@ohai.socialC This user is from outside of this forum
                                    cys@ohai.socialC This user is from outside of this forum
                                    cys@ohai.social
                                    wrote last edited by
                                    #24

                                    @dangoodin @briankrebs How many cybersecurity terms have lost their original strong meaning over time? Two-factor authentication, one time pad, military grade encryption, and now zero knowledge. That’s off the top of my head. There must be other obvious ones I’ve missed.

                                    1 Reply Last reply
                                    0
                                    Reply
                                    • Reply as topic
                                    Log in to reply
                                    • Oldest to Newest
                                    • Newest to Oldest
                                    • Most Votes


                                    • Login

                                    • Login or register to search.
                                    • First post
                                      Last post
                                    0
                                    • Categories
                                    • Recent
                                    • Tags
                                    • Popular
                                    • World
                                    • Users
                                    • Groups