TE
TechEcho
Home24h TopNewestBestAskShowJobs
GitHubTwitter
Home

TechEcho

A tech news platform built with Next.js, providing global tech news and discussions.

GitHubTwitter

Home

HomeNewestBestAskShowJobs

Resources

HackerNews APIOriginal HackerNewsNext.js

© 2025 TechEcho. All rights reserved.

You have secrets; we don’t. Why our data format is public

79 pointsby JereCohabout 12 years ago

8 comments

sneakabout 12 years ago
I love and use 1Password, but bear in mind that passwords are all it encrypts: the rest of the account details, such as URL, are stored in plaintext for an attacker to harvest. :(
评论 #5335817 未加载
评论 #5334972 未加载
评论 #5336740 未加载
评论 #5335443 未加载
gregdetreabout 12 years ago
I've been using 1Password for a few years now. I'm not qualified to comment on the security aspects of it - I'm trusting them and Apple to take care of that.<p>But I can comment on the superb quality of the user-facing aspects - it's a pleasure to use, has great iPhone and Dropbox support, and I really like the way they communicate as a company.
评论 #5336860 未加载
tlrobinsonabout 12 years ago
What's the difference between:<p>1) entering your 1Password master password in untrusted software<p>and<p>2) running untrusted software which could potentially keylog your 1Password master password?<p>Agilebits likes to talk about how 1Password protects against keylogging (<a href="http://help.agilebits.com/1Password3/security.html" rel="nofollow">http://help.agilebits.com/1Password3/security.html</a> and note the author here <a href="http://mackeyloggerprotection.com/" rel="nofollow">http://mackeyloggerprotection.com/</a> ) but what's stopping attackers/malware from keylogging your master password and exfiltrating your 1Password database and master password?
评论 #5340388 未加载
kirubakaranabout 12 years ago
What password manager would you recommend for Linux? I use KeePassX but I wish I didn't have to copy-paste passwords onto website login forms.
评论 #5335120 未加载
评论 #5334592 未加载
评论 #5334667 未加载
评论 #5335114 未加载
hsshahabout 12 years ago
In other words, Security through Obscurity does NOT work.
dexenabout 12 years ago
Also worth noting is the (linked) tongue-in-cheek <a href="http://blog.agilebits.com/2012/04/01/cipher-of-advanced-encryption-rotation-and-substitution/" rel="nofollow">http://blog.agilebits.com/2012/04/01/cipher-of-advanced-encr...</a>
makkesabout 12 years ago
Closed-source security software isn't worth very much in my eyes since you can never be sure that it does what the vendor says it does.
jonkneeabout 12 years ago
With the format being open I really wish a Linux client would happen already.