- Millions of people use password managers. They make accessing online services and bank accounts easy and simplify credit card payments.
- Many providers promise absolute security – the data is said to be so encrypted that even the providers themselves cannot access it.
- However, researchers from ETH Zurich have shown that it is possible for hackers to view and even change passwords.
OMFG can people please fucking go away with this stupid “password managers are worthless” bullshit today. They are exactly as secure as promised, unless you went to the obviously shady ones that use web interfaces. People have been saying this for years, if you want security, keep your password manager offline.
So by that logic BitWarden is unsafe?
Yes, if you arent self hosting the web interface or using the desktop client.
But these issues were patched before even publishing the findings, right?
There is no way to patch the inherent flaw that comes with delivering client software through a web browser. If the entire client is delivered as a web page from a server you dont control, then that server can modify the software however it pleases. Same applies to e2ee encrypted chat clients that run as a web page like element-web (browser based matrix client).
This feels a bit extreme though. Can you even trust anything online at that point? Do you also never leave your home carrying your wallet in case someone might rob you?
Bro i have my bank details, all my private 2FA, work 2FA, health insurance access, my families master passwords, steam access, and more in there. Its literally the most important piece of software that can exist in this day and age. No im not taking chances with that. The only thing you can do with my physical wallet if you rob me is buy something up to 20€ beyond which you need the cards pin. Everything else i can just deactivate by calling the relevant parties.
But on another note, websites have never really been resistant to MITM attacks. So you dont just have to trust the hoster but also everything in between you and them.
I assume you follow proper backup protocol it you are using offline password management.
How do you sync though? You keep one copy on your phone or something, I imagine? What apps and managers are you using?
This comment shows that you know less about computers, than you may think. You can definetly make end to end encryption work using a Website. JavaScript runs client side. So as long as you trust the encryption algorithm (which in elements case you definetly can, because it is OSS), the encryption is safe and your unencrypted data never leaves the device.
The point is you are trusting the JavaScript that the server delivered to you. If the server is compromised, it hands you compromised JavaScript and you’re screwed. It’s the exact same thing as going to evil.com and entering your master password. I think that you inherently understand that evil.com is untrusted. However, if passwordmanager.com is compromised by the same people who own evil.com. there’s really no difference.
I understand, but wouldn’t the same problem occur, if the server for the website you download your software from or the server for your package manager would be compromised? Even if you would buy your software physically on a CD, there would be a chance someone has messed with the content on a CD.
So I don’t really see this as a flaw unique to browsers. Am I wrong?
Yes of course you CAN make it safe in theory, but unless you run the web interface locally or on your own server, you cant be certain that the javascript delivered to you from the hoster hasnt been modified. Its like having autoupdates on but you have zero control over when or how the updates take place, because every time you open the page it could be different code from the last time.
So as long as you trust the encryption algorithm (which in elements case you definetly can, because it is OSS)
How do you know that the code on elements github repo is actually the same code that you get delivered from your homeserver that is hosting the web client? Your homeserver can just modify the web clients code however it wants and deliver a backdoored or faulty version to you. Which means you dont just have to trust the open source code, but also the admin who is managing the homeserver and also the hosting provider.
Is this really so hard to understand? Literally the entire client is delivered on demand from a remote server, obviously that is insecure if you dont control that server.
according to recent findings, it is.
But the findings were patched before it was even published from my understanding?
not all of them, and some changes only apply to new passwords saved: https://lemmy.ml/comment/24008121
Use a offline password manager. Problem solved.
Solves the security issue. Destroys the accessibility part
I just sync it using my Nextcloud instance. No issues.
I use an offline password manager, and sync an encrypted database with nextcloud. It’s convenient enough, and secure enough for me. Easy to sync between my phone, desktop, and laptop. And I only need to remember two passwords, the nextcloud one, and the manager one. I don’t think you can have it more secure and convenient all the same, at least not with current tech.
Just use Syncthing with your trusted host
Bitwarden with a vaultwarden docker container on my home server. Access over a VPS.
Many will argue that they need the convenience of an online password manager not knowing that what you stated is the safest form
I pitty the fool that stores anything important on
the cloudsomebody elses computer.deleted by creator
Many providers promise absolute security
This struck me as wrong, because that would be a technically impossible and liability-inviting thing to promise.
And after checking the homepages of the 3 services they tested, yep, none of them promise “absolute security.”
i really wasnt expecting a password manager related tech fearmongering on lemmy today
With pretty much every major company being hacked at some point, credit card companies being hacked, everyone selling our details and data, doge and palantir. Feels like post it notes under the keyboard isn’t that bad of an idea.
If someone breaks into my house to read them I have big problems already.
You have no idea how many times I’ve made that exact statement.
Let’s start a club
Post its have their problems but at least they can’t be read half a globe away
Don’t store your stuff in the cloud unless you don’t mind someone else accessing it.
If you store things in the cloud that you don’t want other people to access, you better be encrypting it yourself and only opening it locally.
This has been a cardinal rule since day 1.
I don’t want people to access my files but I wouldn’t really care if they did. I don’t understand people who keep things like compromising photos of themselves online, who’s benefit is that for, and why do you need quick access to your nudies?
If it’s something that you don’t really care about others seeing, that’s a prime candidate for cloud storage and more power to you.
This topic is about password lockers. I’m pretty sure you don’t want some schlub who happens to work at Cloud Password Lockers Inc. to be able to get at your PayPal account.
Would having a synced Keepass database with a composite key protect against this?
When I made my database I created a composite key file that never goes online. I locally copy it to any device that needs to access the database. The idea was even if the password got compromised you can’t access the database without the key file
What if you have a house fire and lose all devices with the key
What if there’s a nuclear war end the house gets vaporized?
To protect against this scenario I have this small portable computer that I keep in my pocket. They’re quite popular these days.
“We want our work to help bring about change in this industry,” says Paterson. “The providers of password managers should not make false promises to their customers about security but instead communicate more clearly and precisely what security guarantees their solutions actually offer.”
Great.
Now which password vault was the most cooperative and clear in their security communication and which one wasnt?
The author said that they have given the providers time to fix the issues. Now highlight the ones that did it the best… >_>They did gove some advice. They said to go with a vendor that is transparent about problems and reveals the results of their third party security audits. I’m sure if you read between the lines it means they likely reviewed several vendors and chose to spend their time attacking ones that are opaque about their security stance and used outdated encryption or bad implementations of E2E encryption. So all three are likely suspect. Like if 1Password were developed similarly to LastPass wouldn’t they have spent time attacking it?
Edit: https://support.1password.com/security-assessments/
1Password are posting the results of their external pen testing now.
About 1password publishing their pentesting results. Why put it behind a ‘give me your email address’ wall?

That alone is enough for me to instantly disregard them as an option.
Bitwarden did so too.
But IMO your assumption is a bit of interpreting bad/malicious faith into it.
I see it more like they are the more publicly known brands/services that do this and underwent the audit.
I have read the TLDR by the authors (linked a few times in the comments) and the answer by bitwarden.
Bitwarden said the, fixed the issue, are in the progress of doing it or are accepting it as “this is intended/a trade-off”.
What is a bit sad is that they had more vulnerabilities than other vendors. But I trust them more as they are mostly OSS.
That’s why mine is a physical book.
Really depends on your threat model whether this is a good idea. If cops raiding your home is part of it, a physical book might not be your best bet.
If you’re at the point where that’s a possibility that you need to defend against then you probably already have better security than using a password manager.
That’s very true.
I use one of the password managers mentioned in the article, purely for the convenience of apps on all my devices, syncing and complex individual passwords. Should I be looking to move to self hosting something instead? Would my host (likely a synology Nas or raspberry pi) not then have the same risks?
I self host via vault warden. And I have it locked behind tailscale vpn. Aside from your server itself getting hacked, which is a risk, this is more secure than having passwords on the public internet.
I host a pi hole via diet pi already, vault warden is packaged for diet pi already, project for the weekend!
Love the raspis, just make sure the passwords are not stored on the sd card because those fail all the time hah.
Good shout! Easy to mount a folder from my Nas on it though
I believe Proton Pass does not have the design flaws shown in the article. For instance, if you lose your password, you lose your data. Your data is encrypted and decrypted on your device.
This is what all the listed password manager claim.
What was done here was tricking the client through the server to do things. So the fixes went into the client application.
Security through layers. The flaws found here are about compromised server, so hosting your own server is a good first step. Next step is making the server only accessible via your own VPN. And of course hardening the server.
I use local for important stuff (financial) and online ones for things that are not to important.
Interesting paper and I agree with the researchers to consider full server compromise in scope for online password managers. Maybe I missed it, but I’d have liked a section on the response by vendors. Mistakes happen, but the response and actions taken are very important for (continued) trust in a vendor.
Hardware TOTP Authenticator & Password Manager SecureGen
Russian origin?
Maybe I don’t know, but I liked his idea and would like to assemble it myself.
Let us know if you get hacked!
I’m slowly moving over to my own manager, I’m still struggling to get it to all work properly on all my devices though.















