More than $35 million has been stolen from over 150 victims since December — ‘nearly every victim’ was a LastPass user::Security experts believe some of the LastPass password vaults stolen during a security breach last year have now been cracked open following a string of cryptocurrency heists

  • @[email protected]
    cake
    link
    fedilink
    English
    502 years ago

    Pro Tip: You don’t need to give a private company all of your passwords. That literally defeats the purpose of having passwords.

    • @[email protected]
      link
      fedilink
      English
      172 years ago

      A-fucking-men… but I was always given shit for saying this.

      Anything can be hacked or stolen, I don’t trust any company to secure my information. :/

      • @[email protected]
        link
        fedilink
        English
        102 years ago

        I keep thinking of the people who make their passwords garbled random text impossible to memorize but then they trust an online service to keep it safe and private. When breaches happen, maybe even a post-it note at home would have been more secure.

          • @[email protected]
            link
            fedilink
            English
            12 years ago

            Unique passwords for every single account is an over-abundance of caution. Sensitive accounts: financials, medical, email, yes those should all be insulated from single-source failures. Your xbox live, netflix, and instagram are probably fine as a universal “entertainment” password.

    • @[email protected]
      link
      fedilink
      English
      11
      edit-2
      2 years ago

      Except you’re giving your passwords in an encrypted format. So if the company is trustworthy, it’s safe to let them store your passwords because it’s encrypted in such a way that even the company who own the password manager couldn’t access your passwords even if they wanted to.

      (Note the caveat of “IF the company is trustworthy”, which rules out Lastpass)

      Now I accept that there are legitimate arguments against storing passwords in the cloud via a password manager… so in that case, you may wish to use a local password manager (like Keepass) instead. But realistically, a typical person isn’t capable of memorising lots of unique, secure passwords… so the passwords need to be written down or stored in a password manager, just to avoid weak passwords or password reuse.

  • @[email protected]
    link
    fedilink
    English
    44
    edit-2
    2 years ago

    Man am I glad that I picked KeypassXC as my password manager some years ago. Super safe, easy to use, costs nothing, not dependant on internet/cloud, can export data to another app at any time, transparent because open source.

    I’m using Syncthing to synchronize across devices which arguably took some fiddling to set up but I only had to fiddle once and haven’t touched the configuration since; it just works automagically in the background.

      • @[email protected]
        link
        fedilink
        English
        52 years ago

        It’s a pretty common setup to be clear, easy setup, works like a charm.

        Just keep in mind that it’s not a backup solution, my Homeserver does that for me.

  • @[email protected]
    link
    fedilink
    English
    12 years ago

    The only password manager I trust to connect to the internet is the Firefox manager, Keypass for the important stuff.

  • @[email protected]
    link
    fedilink
    English
    942 years ago

    Switched to bitwarden as soon as they tried to charge a sub for multiple devices, I see that was the right choice

    • meseek #2982
      link
      fedilink
      English
      28
      edit-2
      2 years ago

      Are you not worried your vault is still on their servers? I feel most companies don’t delete shit. Most have ways to get around it saying they keep some info for taxes, accounting, etc.

      I wouldn’t sleep well knowing my passwords were on there at any given time.

      • @[email protected]
        link
        fedilink
        English
        82 years ago

        So just change whatever passwords you had saved to LastPass. That would mitigate any issues, right?

        • meseek #2982
          link
          fedilink
          English
          12 years ago

          Just. It’s not an insurmountable problem, but I wouldn’t be happy changing the login details, one by one, on the some 80 websites I have in my vault.

          Not to mention if you’re using an email anonymizer, you’ll have to regenerate new emails for them all too. I guess you could do it on demand, but knowing my batch of emails in floating around the dark web doesn’t sit well with me. Worse yet if it’s your actual email, then they have that now.

        • @[email protected]
          link
          fedilink
          English
          3
          edit-2
          2 years ago

          Pretty much. Though also any security questions or other private info you have saved, some of which is much more annoying to protect.

          Though one annoying thing is that even if you change everything, what they find might help them social engineer an attack.

          I second Bitwarden, BTW. Best password manager I’ve used.

        • 10EXP
          link
          fedilink
          English
          12 years ago

          Your username gives me PTSD for past Hades speedruns and I hate it.

      • qaz
        link
        fedilink
        English
        12 years ago

        It’s e2e and the code to do so is opensource, and you can always host Vaultwarden yourself.

      • @[email protected]
        link
        fedilink
        English
        262 years ago

        You can host a bitwarden vault yourself. They open sourced and audited. So, trustworthy that there’s no back door somewhere to some degree.

    • @[email protected]
      link
      fedilink
      English
      112 years ago

      same here. nuked my lastpass account and switched everything over to bitwarden. their paid offering was worse from the competition and now i’m very glad i moved from them

        • @[email protected]
          link
          fedilink
          English
          12 years ago

          Not painless at all. IIRC, I just exported from LastPass and imported (without change) to BitWarden. It worked fine.

  • AutoTL;DRB
    link
    fedilink
    English
    172 years ago

    This is the best summary I could come up with:


    Cybersecurity blogger Brian Krebs reports that several researchers have identified a “highly reliable set of clues” that seemingly connect over 150 victims of crypto theft with the LastPass service.

    Taylor Monahan, lead product manager at crypto wallet company MetaMask and one of the key researchers investigating the attacks, concluded that the common thread connecting the victims was that they’d previously used LastPass to store their “seed phrase” — a private digital key that’s required to access cryptocurrency investments.

    These keys are often stored on encrypted services like password managers to prevent bad actors from gaining access to crypto wallets.

    We have reached out to LastPass to confirm if any of the stolen password vaults have been cracked and will update this story if we hear back.

    Researcher Nick Bax, director of analytics at crypto wallet recovery company Unciphered, also reviewed the theft data and agreed with Monahan’s conclusions in an interview with KrebsOnSecurity:

    “I’m confident enough that this is a real problem that I’ve been urging my friends and family who use LastPass to change all of their passwords and migrate any crypto that may have been exposed, despite knowing full well how tedious that is.”


    The original article contains 363 words, the summary contains 196 words. Saved 46%. I’m a bot and I’m open source!

      • @[email protected]
        link
        fedilink
        English
        142 years ago

        I use Syncthing to keep my Keepass files synchronized on my devices. All the benefits of cloud storage, but my password file never leaves my control.

          • @[email protected]
            link
            fedilink
            English
            32 years ago

            Personally I don’t like to rely on anyone’s cloud services for mission critical applications like password storage, since they have a history of being discontinued without notice.

            I do trust Mozilla a lot more than Google, though.

            With Syncthing at least if the discovery servers go down you still have a local copy as well as off-site backups, and can easily migrate to some other sync solution as your password manager is not tied to your browser.

            • @[email protected]
              link
              fedilink
              English
              12 years ago

              I would argue that email is similarly as critical, yet Selfhosting email is a bad idea practically and from a security standpoint. Your argument does not apply in general.

    • @[email protected]
      link
      fedilink
      English
      162 years ago

      The idea is fine. Still trusting lastpass was the bad idea. Others have much better implementations to protector your vault and don’t drop the ball on security time after time.

      • @[email protected]
        link
        fedilink
        English
        12 years ago

        They might have better implementation, but that only means it will take longer time before a data breach happens, it doesn’t stop them.

        • @[email protected]
          link
          fedilink
          English
          52 years ago

          A data breach isn’t an issue by itself. It’s only an issue if it’s possible to decrypt your passwords.

    • @[email protected]
      link
      fedilink
      English
      132 years ago

      It’s OK as long as you’re the only one with the key to it.

      If your storage provider can decrypt it, so can anybody who hacks them or works for them.

      Sometimes these are the same people.

  • kadu
    link
    fedilink
    English
    412 years ago

    I know Lemmy’s classic “Google bad” but you know what? Google’s password manager and authenticators never lost my passwords, never charged a subscription, didn’t require me to invest money and effort into self hosting, never leaked, never disappeared, and always worked perfectly on any device within seconds of logging into my account.

    • @[email protected]
      link
      fedilink
      English
      142 years ago

      I’d be worried about losing access to the entirety of your passwords if Google up and decides that one day your account is suspended. There’s been a few reports historically where someone gets their Gmail account suspended for some mistaken reason and all their associated access gets pulled (e.g. from drive, sheets, etc)

      • kadu
        link
        fedilink
        English
        42 years ago

        That’s what happened to me once due to Bitwarden - it lost all my 2FA codes. It was an absolute pain getting access back to all accounts.

        My Google account has been rock solid from the day I created it as a child to today, even though my needs and their services changed dramatically over the years.

        Most of the issues with people claiming their accounts got locked up “for some unknown error” are actually hosting and sharing copyrighted material, like creating public Google Drive links to a movie or sharing a game ROM via Gmail.

        • @[email protected]
          link
          fedilink
          English
          22 years ago

          Bitwarden offers an encrypted backup…

          Google has maybe a plain text export.

          Bitwarden has run flawless for me for multiple years.

        • Terrasque
          link
          fedilink
          English
          1
          edit-2
          2 years ago

          I got a Google account that was shut down after some spammer started using that email as the sender address (sometimes called a Joe job). I somehow got in contact with an employee (friend of a friend) that checked on the account and verified it wasn’t my fault and reopened it, but a week later it got closed automatically again, with no easy way to reopen it.

          The backscatter was hundreds of emails per day, so the email part of the account was useless anyway, but I used it for other things.

          So it can happen at no fault on your own, and impossible to do anything about.

          • kadu
            link
            fedilink
            English
            12 years ago

            I guess that’s true. But keep in mind, Bitwarden lost my 2FA codes through no fault of my own either, so it’s not like one service is less vulnerable to random failure

        • @[email protected]
          link
          fedilink
          English
          12 years ago

          My Google account has been rock solid from the day I created it as a child

          Hopefully you were of legal age to accept the Terms of Service, otherwise it might’ve been an irregular account all this time.

            • @[email protected]
              link
              fedilink
              English
              12 years ago

              If it was, and you haven’t accepted the ToS as of legal age, then you might want to make a new one.

              Google is getting ready to purge inactive accounts starting next year, and it wouldn’t be the first time when a service purged irregular accounts many years after the fact, so… better safe than sorry.

    • @[email protected]
      link
      fedilink
      English
      132 years ago

      Google only just recently introduced encrypted passwords… Before they were stored in plain text on your computer… Tho I’m not even sure how that encryption even works.

      So… It may not have leaked yet (or maybe it has but Google suppresses everything, who knows) but I wouldn’t trust it to keep something safe.

        • @[email protected]
          link
          fedilink
          English
          22 years ago

          There nothing to fix in an OS. Windows and chrome have vulnerabilities which are unfixable by regular people. What about malware? What about other people knowing the password to your pc?

          It’s impossible to trust an OS to not get hacked, because it’s always the hackers or OS running behind the other.

          • @[email protected]
            link
            fedilink
            English
            22 years ago

            You can replace the OS with one you trust more. Can also replace the browser, and “irregular people” can fix stuff in OpenSource OSs and browsers. Malware is easy to avoid, just don’t execute random stuff. Other people knowing the password to your PC, is up to you.

            Hackers generally don’t hack OSs, users are much easier to hack.

            • @[email protected]
              link
              fedilink
              English
              12 years ago

              And what is your point?

              That everyone should change to some Linux distro? First of all Linux is not immune, it only lacks interest from hackers. The second it’s not adapted to everyone. Even I who likes open source and learning new stuff is too annoyed by Linux because of compatibility reasons (mostly gaming).

              Just don’t execute random stuff? Wake up, or I’ll use only chrome and nothing else on my pc. You want open source you must execute random stuff.

              And people cannot be at their 100% at all time. There is a possible chance that some, even trained user, slips and executes some malware. In that case, antimalware come into play, but it’s not always the case. Companies still get hacked with ransomwares and data extractors.

              And your solution to the issue is just replacing the browser, like it would make a difference? At that point just use another password manager online…

              • @[email protected]
                link
                fedilink
                English
                1
                edit-2
                2 years ago

                My point is you start by using whichever OS you trust most: there is Windows, Mac OS, Chrome OS, Android, a bunch of Linux distros, BSD… your choice.

                If you don’t trust any OS… sorry, you’re SOL. Plug the thing off and smash it with a hammer, then dump into salt water to be safe.

                You want open source you must execute random stuff

                There are large OpenSource projects with security audits and security testing. There are random open and closed source projects with zero oversight by anyone.

                Execute the former, not the latter.

                people cannot be at their 100% at all time.

                Executable signing, anti-malware systems, and people running tests to rubber-stamp stuff exist (like distro repos, or app stores). Use those.

                Companies still get hacked with ransomwares and data extractors.

                In most cases by hacking people, not software. Follow the above rules, don’t trust that your CEO’s nephew needs remote access to your PC… tell your coworkers not to trust that either… … yeah, well, that’s impossible, it takes only one to ransomware everyone… but you can keep yourself safe 🤷

                Replacing the browser is optional, goes with the same trust issues as the OS.

      • @[email protected]
        link
        fedilink
        English
        92 years ago

        “Probably”? It’s the best! I never have to worry about memorizing 500 different passwords cause Firefox automatically syncs my passwords across every device I use without me even having to think about it.

        • Fushuan [he/him]
          link
          fedilink
          English
          32 years ago

          eh, it doesn’t work for credentials of phone apps, bitwarden does and you can access those passwords if you log in into the web version if you are on an unknown pc.

          • @[email protected]
            link
            fedilink
            English
            12 years ago

            It takes a few taps, but firefox’s password service appears when you click the autofill option for me.

              • @[email protected]
                link
                fedilink
                English
                1
                edit-2
                2 years ago

                Not sure about the banking apps but a few other apps have worked for me. Like the Lemmy ones for instance.

                • Fushuan [he/him]
                  link
                  fedilink
                  English
                  32 years ago

                  Then it should for all, cool. I still prefer bitwarden becaue I can store credit card info, generic secure notes, and I’m able to access it from anywhere, useful when logging in into my email from my mother’s PC and such, but it’s cool that it is integrated with the keyboard engine too.

    • @[email protected]
      link
      fedilink
      English
      122 years ago

      …so far.

      For those that don’t mind self-hosting, which can be as easy as just running syncthing or resilio sync on your NAS, I can really recommend keepass.

      • @[email protected]
        link
        fedilink
        English
        132 years ago

        Me with interest, but no technical knowledge reading your comment:

        which can be as easy as

        :-)

        running syncthing or resilio sync on your NAS

        :-(

        I didn’t understand any of those words

        • @[email protected]
          link
          fedilink
          English
          2
          edit-2
          2 years ago

          edit - nevermind I can’t even format a comment, let alone self host a… Thingie. What the other guy said.

        • @[email protected]
          link
          fedilink
          English
          22 years ago

          A NAS is a home storage server, like Synology that you can use to store images, videos and backups, etc on so you can access them from any computer or device in your home. With a couple of clicks, they can easily run applications like Syncthing or Resilio Sync, which are kinda like Dropbox, except you don’t have to pay Dropbox, you’ll just be storing the files on your own service.

          If that’s too much to handle, you can still just store your Keepass file in Dropbox, so that it’s available on all your devices. But in the end you’ll still be storing your personal data on someone else’s harddisk.

          So in short, is at easy as using a prefab service? No, you’ll have to invest some time, money, and knowledge yourself. But in the end, your data is not gathered in silo together with countless other users, which makes it a lot less attractive for hackers to try and steal it.

        • @[email protected]
          link
          fedilink
          English
          92 years ago

          Self hosting is less appealing for criminals, though. Especially if the protocol is “vanilla” like ssh.

          When you hack LastPass you know what you’ll find, millions of passwords. When you hack a dude ssh you have one chance over one million that there is one dude password wallet.

          It doesn’t make financial sense to hack self hosting (unless it’s specific server software)

          • @[email protected]
            link
            fedilink
            English
            2
            edit-2
            2 years ago

            There are plenty of use cases for going after self hosters. Bot farms are basically made up of “regular” computers infected with malware.

            While you’re at it and have access to tens of thousands computers, also grabbing their passwords is just a nice bonus.

            If anything, it doesn’t make financial sense not to do it. You’re right in that self hosters themselves are not the target per se. but they are targeted for other reasons, and that’s where it ends up becoming problematic.

            • @[email protected]
              link
              fedilink
              English
              22 years ago

              You need to aumatize any operation… It’s not conceivable that an human look at every device for stuff to steal. It would be even more expensive.

              Generally all these bit malware do is 1) using a vulnerability to replicate themselves 2) mine crypto or other kind of crap. Sometimes (1) involves also stealing ssh keys but it’s not the goal, it the mean.

              Self hosting password/code/photos/whatever niches you are almost guaranteed that no human will look at hit because the amount of IoT/Routers/etc with nothing valuable beyond themselves generally composes the majority of these compromised bots

              This is just the economic incentive

    • @[email protected]
      link
      fedilink
      English
      42 years ago

      As a non-Google user, Lemmy is only “Chrome bad”. They’re “Android is the only way”

      • @[email protected]
        link
        fedilink
        English
        3
        edit-2
        2 years ago

        Well chrome = bad. Just look at all the anti-competition things they are implementing just because they are the leaders on the market.

        Now they are blocking cookies, it’s great isn’t it? NO! now they are targeting you through your browser history while blocking competition.

        Manifest V3 introduced by Google, that’s amazing, now ad blockers won’t be able to update their list individually. It’s amazing isn’t it? Being able to hinder the adblockers when your revenues comes from ads.

  • @[email protected]
    link
    fedilink
    English
    292 years ago

    That’s an average of over 200k each. I’m wondering how they managed to target people with so much money.

    • @[email protected]
      link
      fedilink
      English
      172 years ago

      The excel spreadsheet can be read by anything. And if someone gets hold of it either through malware or access to the computer, they get all your passwords.

      A password manager allows to store the passwords in an encrypted file. The file being encrypted, if the password is strong, may not be accessed easily or fast enough to be worth the effort.

      • Square Singer
        link
        fedilink
        English
        22 years ago

        And thanks to online syncing of the password manager, not only can anyone who can access your PC read your password, but in case of Lastpass, anyone with access to the internet can!

      • Aram855
        link
        fedilink
        English
        12 years ago

        So then why not use pen and paper and be done with it? It’s basic opsec

        • @[email protected]
          link
          fedilink
          English
          32 years ago

          It’s a solution, but very inconvenient. There is also no backup, in case of destruction.

          It is also not encrypted. So anyone stealing it can read it.

          A password manager is great for storing sensitive information like password in a secure way, at least if the master password is good enough. And the password manager isn’t a shitty one (Lastpass). The online password managers allow syncing, and also often can export a file.

          Local password manager can also produce an encrypted backup file which can be stored on a server. While also offering some convenience to log in and storing many random passwords.

  • @[email protected]
    link
    fedilink
    English
    82 years ago

    After years as a family plan subscriber, I moved my personal (1k+) passwords off of LP after the last – and most egregious – breach. I have quite a bit self hosted in my environment but Proton Pass interests me as I can get my wife and son in it easily as we already have the family plan. Lemmy is loaded with tech savy, so my question is; same devil different form? I’ve tried BW but it wasn’t condusive to the whole familys use (at least not a few years ago).

    • @[email protected]
      link
      fedilink
      English
      22 years ago

      If it is cloud hosted then there is always a possibility. Programs like keypass run locally and are only in jeopardy once your system is compromised. The issue with keypass is implementing it for multiple users is probably a chore (never looked into it).

    • @[email protected]
      link
      fedilink
      English
      52 years ago

      This is my problem. I have a family that includes several elderly people. It was a HUGE accomplishment to get them onto LastPass. Nothing more complicated than that’s going to work. Hell I do not want to take the time figure out any self hosting crap.

      I’ve tried 1password and hated the UI.

      Any other suggestions?

  • Neptune
    link
    fedilink
    English
    82 years ago

    All that promotion/awards tagging as best password manager for nothing. Glad I picked up KeyPassXC and KeyPassDX and sync between my phone and PC with gdrive

    • @[email protected]
      link
      fedilink
      English
      72 years ago

      At first I was confused about why this was being downvoted, but then I noticed the “gdrive”. You’re using a different cloud to avoid this specific cloud.

      • @[email protected]
        link
        fedilink
        English
        32 years ago

        Not really a problem until aes-256 is broken, especially with an extra pass file and/or hardware Tokens.

        But yeah that’s suboptimal

      • Neptune
        link
        fedilink
        English
        22 years ago

        I know google sucks but it’s easier to sync across and I have separate key file locally on both devices… 🤷

  • @[email protected]
    link
    fedilink
    English
    782 years ago

    These guys saved their seed phrases to LastPass, not just account passwords. You can’t just change your seeds without moving funds to a new wallet.

    The main lesson here is never store your seeds in digital form, ever. Write it down by hand on paper at creation and then take additional efforts to safeguard it.

    • @[email protected]
      link
      fedilink
      English
      5
      edit-2
      2 years ago

      I wrote my seed information down for my poop coin wallet directly on Charmin double ply and then promptly wiped my ass with it and flushed.

      All my apes gone!

    • @[email protected]
      link
      fedilink
      English
      92 years ago

      I just store recovery phrases of all kinds on an encrypted USB stick (which is obviously only connected to my PC when I need to put a new one in or use it (which so far has happened never)), I feel like that is secure enough for me, although if I could laminate at home I might print and make small cards in a separate a card wallet. Any other way I feel like I would eventually lose them, the particular USB drive ive had for over 15 years, it is 512 MB lol.

      • @[email protected]
        link
        fedilink
        English
        22 years ago

        I would duplicate to at least 2 sticks, and also a written form that you keep stored with important documents, like a safe with your SSN, birth certificate, etc.

      • @[email protected]
        link
        fedilink
        English
        12 years ago

        For any significant amount of money, the seed should never even touch a PC. No USBs, no printers.

      • @[email protected]
        link
        fedilink
        English
        352 years ago

        USB sticks are not very reliable and can become totally unreadable randomly. I hope you at least have a few backups of it

        • @[email protected]
          link
          fedilink
          English
          12 years ago

          USB sticks can be very different. I would recommend using small M.2 SSD in a stick enclosure.

        • @[email protected]
          link
          fedilink
          English
          16
          edit-2
          2 years ago

          Yeah, they are horribly unreliable.

          I got myself 5 sticks, put the same data on all 5.

          1st was dead within a month. 2nd & 3rd both dead in 4m, 4th dead in 6m. The 5th is still alive 3 years later.

          It’s a shit lottery, don’t play it, modern flash drives are absolutely garbage. Yet I still have a whole pile of 1,2, 4 GB flash drives from over a decade ago and they all still work.

          • @[email protected]
            link
            fedilink
            English
            32 years ago

            Old flash drives used to be all SLC.

            Newer ones, use the cheapest tech for the same capacity, with QLC being about 16 times less reliable than SLC.

        • @[email protected]
          link
          fedilink
          English
          82 years ago

          Carve it in granite and bury it underground so that future archaeologists can be confused over their meaning.

  • 🐱TheCat
    link
    fedilink
    English
    22 years ago

    So what makes lastpass untrustworthy and do we think competitors like 1pass are any different?

        • @[email protected]
          link
          fedilink
          English
          112 years ago

          It doesn’t have to be difficult.

          1. Download keepass to your computer.

          2. Keep the save file on a USB or private cloud backup.

          3. Done!

          As you get more comfortable with it, you’ll start using it in more complex ways. Like having a phone app, connected to a self hosted network. But keep it simple for now.

          • @[email protected]
            link
            fedilink
            English
            42 years ago

            Interesting, I’ll check it out, as it looks like it’ll cover what I need. Hopefully it’s simple enough, as always having an iPhone makes things more complicated lol.

            • @[email protected]
              link
              fedilink
              English
              32 years ago

              I host for my family which has a mix of Android and iPhone. So far, no complaints about Bitwarden on iOS. Hopefully it works out for you. If self hosting becomes a problem, I think premium is only $10/year and family is up to 6 people at $40/year.

        • @[email protected]
          link
          fedilink
          English
          6
          edit-2
          2 years ago

          If you wanna use KeePass, you just have to store your database in some secure location. It can be on your local drive or in the cloud, any location you trust really.

          • @[email protected]
            link
            fedilink
            English
            32 years ago

            You can set the encryption strength though, so I guess you could set it high and could even have it untrusted.

            Mine takes a while to open on my phone because of that

          • @[email protected]
            link
            fedilink
            English
            32 years ago

            Thanks for the suggestion, I’ll try checking out both options. Unfortunately, I have an iPhone, so sadly there’s no KeepassDX. 🤔

            • @[email protected]
              link
              fedilink
              English
              32 years ago

              I think there’s probably a Keepass compatible iPhone app out there but I haven’t vetted it. Worth looking for though.

          • @[email protected]
            link
            fedilink
            English
            32 years ago

            I started out with the Yubikey, which was such a relief all by itself. Even if you have my password, you need my physical USB key to plug in or NFC confirm for the 2fa. I did later move to self-hosting, but I def have a backup of a backup for that since space is cheap-ish.

          • @[email protected]
            link
            fedilink
            English
            22 years ago

            Not sure about that software specifically but most yubikey 2FA implementations allow you to set up more than one key. That way you don’t lose access if you lose your key. I personally have three keys.

    • @[email protected]
      link
      fedilink
      English
      22 years ago

      There’s no such thing as an impenetrable password manager. I keep my most secure passwords in my head, and so should everyone.

      Even if the software were perfect, people aren’t. Anyone can be fooled under the right circumstances. It’s better to expose one service than all of them at once.

    • @[email protected]
      link
      fedilink
      English
      122 years ago

      So what makes Bitwarden better than LastPass if you’re using Bitwarden’s hosted option (I know you can keep it locally).

      • @[email protected]
        link
        fedilink
        English
        202 years ago

        I’m not 100% but I think Bitwarden actual encrypt the entire ‘password object’. So the url, username, password, and any notes. Lastpass didn’t/doesn’t encrypt the url so if anyone gets access to the vault, they have a list of websites where the person will have an account and can more accurately send phishing emails.

        • Fushuan [he/him]
          link
          fedilink
          English
          12 years ago

          It encrypts the entire vault iirc, not the objects themselves. The only thing a breach cound gain access to is the encrypted vault, the hashed master password and the master email.

      • @[email protected]
        link
        fedilink
        English
        232 years ago

        From what I remember (take this with a grain of salt since it’s all from when the big LastPass breach happened,) LastPass didn’t actually encrypt your entire vault. They only encrypted the passwords. The rest of the vault, (which would be comprised of usernames and the sites that are associated with them, notes, images, etc) were unencrypted. So even without cracking any vaults, hackers got access to gigantic lists of usernames and their associated email addresses. That’s valuable in and of itself, because it allows them to spear-phish those users.

        For example, you may not fall for a regular phishing scam. But you may fall for it if the email has your username and recovery info in it. Because they know every email you’ve used to sign up for something and all of your different usernames that you used on that site, so they can craft convincing phishing emails that are specifically tailored to you.

        It also allows them to search for specific users. Maybe there is a user on a crypto forum who is particularly noteworthy. Their username is already known on the site, and hackers are able to cross-reference that with the list of known usernames/emails and see if that user’s vault was part of the breach. If it was, they can focus on breaching that one user’s vault, instead of aimlessly trying random vaults.

        • @[email protected]
          link
          fedilink
          English
          5
          edit-2
          2 years ago

          LastPass didn’t actually encrypt your entire vault. They only encrypted the passwords. The rest of the vault, (which would be comprised of usernames and the sites that are associated with them, notes

          Wait a moment… now I wonder how many people kept their crypto wallet recovery word lists as notes instead of as passwords.

        • @[email protected]
          link
          fedilink
          English
          82 years ago

          That’s valuable in and of itself, because it allows them to spear-phish those users.

          I’m sorry, this is the first time I’m hearing the term spear-phish and I love it. It’s hilarious.

          • @[email protected]
            link
            fedilink
            English
            92 years ago

            It refers to targeting phishing attacks. With traditional phishing, scammers simply cast an ultra wide net and catch whichever one’s happen to respond. They don’t really care who it is, because they’re playing a numbers game. Even if only 0.1% of people respond, sending out a thousand phishing emails means you still got a response.

            But with spear phishing, it’s a targeted attack. They’ll call you at your desk with a spoofed work number, and pretend to be the CEO’s assistant. The CEO needs you to go buy gift cards for a big sales event coming up. Don’t worry, it can all be expensed later, but he needs the cards now and doesn’t have time to deal with vendors and purchase orders. And now you’re reading gift card numbers to a scammer, because they knew enough about your workplace to be able to reasonably impersonate the CEO’s assistant.

            It can also be used to refer to targeted attacks against company leaders or notable figures. Maybe someone has a fat crypto wallet, so someone targets them. Or maybe they try to trick the CEO into giving away a trade secret. Regardless of the reasons, the attack is still the same basic principle; Find a target, meticulously research them enough to be able to fool them, then attack. Most people will be good at avoiding regular phishing. But very few people are prepared for a coordinated and laser-guided spear phishing attack.

  • @[email protected]
    link
    fedilink
    English
    162 years ago

    I mean, they’ve had more than long enough to change passwords.

    Nobody is after your password for the Moravian rug weaving forum but in this day and age it’s on you, if you know there’s a breach and you don’t change your banking / crypto passwords.

    • UFO
      link
      fedilink
      English
      92 years ago

      Cannot change crypto seed phrases (but that can be mitigated). Cannot change addresses, social security numbers etc