• pingveno@kbin.social
      link
      fedilink
      arrow-up
      51
      ·
      1 year ago

      Regardless, I’m glad they are being open about this. I use 1password, so I want to know absolutely anything that could be a threat, especially after the debacle with LastPass.

      • ziggurism@lemmy.world
        link
        fedilink
        English
        arrow-up
        12
        arrow-down
        1
        ·
        1 year ago

        1password user data is encrypted, right? so even if a hack had allowed a bad actor access to user pw databases, it’s not like they would’ve just scored everyone’s passwords… right?

          • tippl@lemmy.world
            link
            fedilink
            English
            arrow-up
            4
            ·
            1 year ago

            To be accurate, they don’t know either. A login key and a decryption key are derived from password and secret key client-side.

        • bamboo@lemmy.blahaj.zone
          link
          fedilink
          English
          arrow-up
          8
          arrow-down
          1
          ·
          1 year ago

          I’m not sure about 1password, but with Lastpass, the passwords were encrypted, but not the URLs for each site. Whoever has the lastpass vault knows what sites were associated with each account, and can start targeting accounts which look valuable.

          • dasgoat@lemmy.world
            link
            fedilink
            English
            arrow-up
            6
            ·
            edit-2
            1 year ago

            Also, and I don’t mean to scare the people who use 1password, they (LastPass) lied about the extent of the encryption. Many technical details they either omitted or lied about until they HAD to reveal the true extent of the hacks that had occurred. I know, I was a LP user unfortunately. Now comfortable at Bitwarden, but 1password was an option I considered.

        • pulaskiwasright
          link
          fedilink
          English
          arrow-up
          6
          arrow-down
          4
          ·
          1 year ago

          If they have vaults downloaded, then they can rapidly brute force the vault passwords and would like be able to decrypt a lot of them.

            • pulaskiwasright
              link
              fedilink
              English
              arrow-up
              2
              ·
              1 year ago

              Good point. It’s been such a long time since I’ve had to use the secret that I forgot it existed.

          • KairuByte@lemmy.dbzer0.com
            link
            fedilink
            English
            arrow-up
            4
            ·
            1 year ago

            It’s not as simple as brute forcing the password, it’s also encrypted using a secret key. You essentially have 2 factor encryption on the vaults.

            • Appoxo@lemmy.dbzer0.com
              link
              fedilink
              English
              arrow-up
              2
              arrow-down
              3
              ·
              1 year ago

              If a user was social engineered, not very tech savy to catch on to it and revealed the master password, you’d only need to guess the encryption key, no?