Skip to content
  • Categories
  • Recent
  • Tags
  • Popular
  • World
  • Users
  • Groups
Skins
  • Light
  • Brite
  • Cerulean
  • Cosmo
  • Flatly
  • Journal
  • Litera
  • Lumen
  • Lux
  • Materia
  • Minty
  • Morph
  • Pulse
  • Sandstone
  • Simplex
  • Sketchy
  • Spacelab
  • United
  • Yeti
  • Zephyr
  • Dark
  • Cyborg
  • Darkly
  • Quartz
  • Slate
  • Solar
  • Superhero
  • Vapor

  • Default (Cyborg)
  • No Skin
Collapse
Brand Logo

CIRCLE WITH A DOT

  1. Home
  2. Uncategorized
  3. Contrary to what password managers say, a server compromise can mean game over.

Contrary to what password managers say, a server compromise can mean game over.

Scheduled Pinned Locked Moved Uncategorized
24 Posts 18 Posters 0 Views
  • Oldest to Newest
  • Newest to Oldest
  • Most Votes
Reply
  • Reply as topic
Log in to reply
This topic has been deleted. Only users with topic management privileges can see it.
  • slyborg@vmst.ioS slyborg@vmst.io

    @dangoodin https://1passwordstatic.com/files/security/1password-white-paper.pdf

    "At present there’s no practical method for a user to verify the public key they’re encrypting data to belongs to their intended recipient. As a consequence it would be possible for a malicious or compromised 1Password server to provide dishonest public keys to the user, and run a successful attack. Under such an attack, it would be possible for the 1Password server to acquire vault encryption keys with little ability for users to detect or prevent it.” (1/3)

    slyborg@vmst.ioS This user is from outside of this forum
    slyborg@vmst.ioS This user is from outside of this forum
    slyborg@vmst.io
    wrote last edited by
    #14

    So… “your data is safe even if the server is breached” and also “nothing can prevent data compromise if an attacker controls the server”. Subtle difference, I guess - maybe your vault is uncrackable if the data leaks/is stolen, but the actual worst case threat model is where an attacker has backdoored your infrastructure. (2/3)

    slyborg@vmst.ioS 1 Reply Last reply
    0
    • dangoodin@infosec.exchangeD dangoodin@infosec.exchange

      Contrary to what password managers say, a server compromise can mean game over.

      Link Preview Image
      Password managers' promise that they can't see your vaults isn't always true

      Contrary to what password managers say, a server compromise can mean game over.

      favicon

      Ars Technica (arstechnica.com)

      slyborg@vmst.ioS This user is from outside of this forum
      slyborg@vmst.ioS This user is from outside of this forum
      slyborg@vmst.io
      wrote last edited by
      #15

      @dangoodin https://1passwordstatic.com/files/security/1password-white-paper.pdf

      "At present there’s no practical method for a user to verify the public key they’re encrypting data to belongs to their intended recipient. As a consequence it would be possible for a malicious or compromised 1Password server to provide dishonest public keys to the user, and run a successful attack. Under such an attack, it would be possible for the 1Password server to acquire vault encryption keys with little ability for users to detect or prevent it.” (1/3)

      slyborg@vmst.ioS 1 Reply Last reply
      0
      • iveyline@mastodon.nzI iveyline@mastodon.nz

        @dangoodin I keep all my passwords on two separate external drive which are disconnected from my laptop ehen I don't need them

        x41h@infosec.exchangeX This user is from outside of this forum
        x41h@infosec.exchangeX This user is from outside of this forum
        x41h@infosec.exchange
        wrote last edited by
        #16

        @Iveyline @dangoodin only useful if you trust the 3P is actually encrypting your password on their server.

        1 Reply Last reply
        0
        • dangoodin@infosec.exchangeD dangoodin@infosec.exchange

          Contrary to what password managers say, a server compromise can mean game over.

          Link Preview Image
          Password managers' promise that they can't see your vaults isn't always true

          Contrary to what password managers say, a server compromise can mean game over.

          favicon

          Ars Technica (arstechnica.com)

          angelascholder@mastodon.energyA This user is from outside of this forum
          angelascholder@mastodon.energyA This user is from outside of this forum
          angelascholder@mastodon.energy
          wrote last edited by
          #17

          @dangoodin Yeah, great!
          Still happy to be using KeePass with the database on our own NAS with a copy in an online recoverable place for a big disaster where we would lose all our electronic devices.

          The desktops connect direct to the database file on the NAS. It's synchronised to our netbooks and laptop, and on the mobiles the file is synchronised via WebDAV. So, we have access on all our devices, and it's all under our own control.

          1 Reply Last reply
          0
          • tartley@fosstodon.orgT tartley@fosstodon.org

            @dangoodin One of the reasons why ppl should simply use a non-cloud password manager like Keepassxc. Sync the encrypted file where you need it using something like syncthing. Own your data! And especially such a crucial thing as all your passwords. Why why why would you ever entrust that to someone else?

            angelascholder@mastodon.energyA This user is from outside of this forum
            angelascholder@mastodon.energyA This user is from outside of this forum
            angelascholder@mastodon.energy
            wrote last edited by
            #18

            @tartley @dangoodin I don't really like KeePassXC, but didn't manage to get KeePass back on my Ubuntu machine.

            1 Reply Last reply
            0
            • gullevek@famichiki.jpG gullevek@famichiki.jp

              @xlrobot @dangoodin Hahahaha. Poor ars fucked themselves over hard. Nobody will trust anything thy write anymore

              C This user is from outside of this forum
              C This user is from outside of this forum
              cafeinux@infosec.exchange
              wrote last edited by
              #19

              @gullevek
              Care to elaborate? I suppose Ars published some bad AI slop but I didn't get to witness the drama, so I don't know the details nor the extend of it.
              @xlrobot @dangoodin

              gullevek@famichiki.jpG 1 Reply Last reply
              0
              • C cafeinux@infosec.exchange

                @gullevek
                Care to elaborate? I suppose Ars published some bad AI slop but I didn't get to witness the drama, so I don't know the details nor the extend of it.
                @xlrobot @dangoodin

                gullevek@famichiki.jpG This user is from outside of this forum
                gullevek@famichiki.jpG This user is from outside of this forum
                gullevek@famichiki.jp
                wrote last edited by
                #20

                @cafeinux @xlrobot @dangoodin https://sfba.social/@jeridansky/116089180436195865

                Basically Ars published an article where most of the quotes where made up by AI and the article was about the Mathplot guy who “upset” an LLM agent that then wrote a hate post about beeing rejected from a pull request. The whole thing is just surreal. I lost all hope into the future

                1 Reply Last reply
                0
                • rrustema@mastodon.socialR This user is from outside of this forum
                  rrustema@mastodon.socialR This user is from outside of this forum
                  rrustema@mastodon.social
                  wrote last edited by
                  #21

                  @notyourfanboy @dangoodin That version is not supported anymore, is it? I was forced to use their cloud when upgrading from version 7 to 8.

                  1 Reply Last reply
                  0
                  • rrustema@mastodon.socialR This user is from outside of this forum
                    rrustema@mastodon.socialR This user is from outside of this forum
                    rrustema@mastodon.social
                    wrote last edited by
                    #22

                    @notyourfanboy @dangoodin I am sorry, I assumed 1Password. Will check out Password Safe!

                    1 Reply Last reply
                    0
                    • dangoodin@infosec.exchangeD dangoodin@infosec.exchange

                      @tehstu

                      Well, first it's entirely possible that your threat model doesn't really require a nation-state group hacking a Bitwarden server. Beyond that, turn off the key escrow and other features mentioned in the article and you're likely fine.

                      tab2space@mastodon.socialT This user is from outside of this forum
                      tab2space@mastodon.socialT This user is from outside of this forum
                      tab2space@mastodon.social
                      wrote last edited by
                      #23

                      @dangoodin @tehstu

                      Likely fine for now, until the next server-hosted "not really zero knowledge" problem is discovered. Very likely, it already has been discovered... So you're down to hoping the discoverer isn't hunting you and your secrets in particular.

                      1 Reply Last reply
                      0
                      • dangoodin@infosec.exchangeD dangoodin@infosec.exchange

                        Contrary to what password managers say, a server compromise can mean game over.

                        Link Preview Image
                        Password managers' promise that they can't see your vaults isn't always true

                        Contrary to what password managers say, a server compromise can mean game over.

                        favicon

                        Ars Technica (arstechnica.com)

                        cys@ohai.socialC This user is from outside of this forum
                        cys@ohai.socialC This user is from outside of this forum
                        cys@ohai.social
                        wrote last edited by
                        #24

                        @dangoodin @briankrebs How many cybersecurity terms have lost their original strong meaning over time? Two-factor authentication, one time pad, military grade encryption, and now zero knowledge. That’s off the top of my head. There must be other obvious ones I’ve missed.

                        1 Reply Last reply
                        0
                        Reply
                        • Reply as topic
                        Log in to reply
                        • Oldest to Newest
                        • Newest to Oldest
                        • Most Votes


                        • Login

                        • Login or register to search.
                        • First post
                          Last post
                        0
                        • Categories
                        • Recent
                        • Tags
                        • Popular
                        • World
                        • Users
                        • Groups