TE
科技回声
首页24小时热榜最新最佳问答展示工作
GitHubTwitter
首页

科技回声

基于 Next.js 构建的科技新闻平台,提供全球科技新闻和讨论内容。

GitHubTwitter

首页

首页最新最佳问答展示工作

资源链接

HackerNews API原版 HackerNewsNext.js

© 2025 科技回声. 版权所有。

Ask HN: Why should I trust password managers?

174 点作者 acadapter超过 3 年前
This is a piece of tech that has slipped under my radar for a long time. I&#x27;ve been having my own methods for safe handling of passwords on the web.<p>Why do people trust password managers?

90 条评论

SkyMarshal超过 3 年前
I don’t trust or use SAAS password managers. They are massive honeypots just waiting to be pwned and everyones’ passwords to all their websites stolen. They have above average security, but unlike a typical website they can’t just store a one-way hash of passwords that remains secure even when stolen, they have to store the actual password.<p>I imagine nation state-supported malicious hackers are targeting them. Everything else is getting breached and leaked these days, there’s a non-trivial possibility these will too.<p>I just use KeePassXC instead, and periodically ‘sync’ the database across my workstations and laptop. And by ‘sync’, I mean manually export the database and rsync it around to my workstations and laptop and re-import it on each. But given how infrequently I create new web accounts, this isn’t a major hassle. It works fine, I don’t need some centralized service for this.
评论 #30376892 未加载
评论 #30377436 未加载
评论 #30377462 未加载
评论 #30378829 未加载
评论 #30376555 未加载
评论 #30377269 未加载
评论 #30378789 未加载
评论 #30381882 未加载
评论 #30379002 未加载
评论 #30386393 未加载
评论 #30380964 未加载
评论 #30377036 未加载
评论 #30377674 未加载
andrewaylett超过 3 年前
Something I&#x27;ve not seen come up yet: a password manager that&#x27;s integrated with your browser is a good defence against phishing.<p>Because it&#x27;ll only offer passwords for sites that match the entry, defaulting (most often) to being the same domain, if you come across a phish then it won&#x27;t offer the site at all. This is fairly similar to the &quot;trust on first use&quot; that SSH gives you, which some folk were wishing might have existed for SSL certificates the other day.<p>Unfortunately some sites require you to &quot;log in with your ... credentials&quot; rather than doing SSO. But you TOFU those, too, once you&#x27;ve verified they&#x27;re legit.<p>Happy Bitwarden user here: the software is all Free, but I trust the company to run their servers securely more than I trust myself to, so I pay them to do so. Extra benefit: if I lose all my infrastructure, I haven&#x27;t lost my passwords.
评论 #30377794 未加载
评论 #30377710 未加载
评论 #30377580 未加载
评论 #30377391 未加载
评论 #30381264 未加载
评论 #30379279 未加载
评论 #30379385 未加载
评论 #30379193 未加载
评论 #30379339 未加载
tristor超过 3 年前
I&#x27;m surprised by so many of the comments here out-of-hand dismissing or denigrating any password manager that stores data in the cloud. There are ways to store data securely, one of the simplest methods is to do zero-knowledge encryption of that data by way of key-generation from a password only the user knows at the time of decryption. This is essentially how the vault functionality of most password managers work, whether that vault is stored locally or not. They used something like PBKDF2 to generate the key used for encryption from your password.<p>There&#x27;s no such thing as perfect security, but as a security-minded person I see nothing there to concern me simply because the data is stored in a company&#x27;s S3 environment vs on Dropbox vs on my local disk. Presuming that the software itself has not been maliciously modified to leak the key, then regardless of where the data is stored it either requires breaking the encryption or finding the password that generated the key in order to access the data. My local disk is no more secure in that aspect, except that I may have the illusion of control. Availability is also an aspect of data security (in the CIA triangle) and a cloud provider that properly replicates and manages backups of data is more reliable than my local disk in this aspect and a fair trade-off for data I likely want to synchronize across systems and devices (phone and laptop, at minimum).<p>Why should you trust a password manager?<p>For me, it&#x27;s pretty simple. I don&#x27;t use social login, and I use unique usernames (most of the time) and passwords (every time) for hundreds of sites I&#x27;ve created accounts on over the years. This is because breaches &#x2F;will&#x2F; happen, and password re-use is probably the single largest issue for user security, including for &quot;power users&quot; like myself. A password manager of &#x2F;some kind&#x2F; is basically required to have unique passwords across hundreds to thousands of sites. Certainly, there&#x27;s more to it, and you need to figure out your own threat model and trust constraints, and I can&#x27;t solve that for you. But as far as I am concerned, if I have a reasonable assurance that the right algorithms are used and those algorithms are correctly implemented by the password manager software, I see no reason to distrust it.
评论 #30376522 未加载
评论 #30377694 未加载
评论 #30379528 未加载
ramses0超过 3 年前
<a href="https:&#x2F;&#x2F;www.passwordstore.org&#x2F;" rel="nofollow">https:&#x2F;&#x2F;www.passwordstore.org&#x2F;</a><p>gpg &quot;make-key&quot;<p>mkdir -p ~&#x2F;.passwordstore&#x2F;foo&#x2F;bar<p>echo &quot;hunter2\nusername: hunter@hunter.com\n&quot; \ | gpg &quot;sign&quot; &gt; ~&#x2F;.passwordstore&#x2F;foo&#x2F;bar&#x2F;entry.gpg<p>gpg &quot;decrypt&quot; ~&#x2F;.passwordstore&#x2F;foo&#x2F;bar&#x2F;entry.gpg<p>tree ~&#x2F;.passwordstore&#x2F;<p>--<p>Basically, &quot;passwordstore&quot; is pretty trustworthy, open source, reasonably inspectable, and kindof automates the above steps in a decent CLI (and has a nice git integration for syncing).<p>There&#x27;s another plugin: &quot;password-tomb&quot; which basically adds in a &quot;zip -r tomb.zip ~&#x2F;.passwordstore &amp;&amp; unzip tomb.zip&quot; with some extra encryption blobbing around things.<p>I&#x27;m nudging towards wanting all that &quot;junk&quot; stored on a mostly-offline (or read-only USB, or doing something with fetching encrypted secrets over the network), and trying to figure out in a temporary ram-disk to try and reduce exposure-time.<p>The reason it feels pretty good for me is that it degrades gracefully and can be used with standard tooling. It&#x27;s totally possible to have a script which does: &quot;foreach password =&gt; unlock &amp;&amp; dump &amp;&amp; append-to-pdf &amp;&amp; qr-code =&gt; print.pdf&quot; and print that out at intervals, so it&#x27;s got great survivability characteristics. It allows me to self-host even completely offline using git. If I have the GPG key, I can recover the passwords w&#x2F;o any tooling. Really it&#x27;s kindof my ideal situation for trustworthiness.
评论 #30376923 未加载
评论 #30381164 未加载
评论 #30378135 未加载
评论 #30380160 未加载
评论 #30378149 未加载
theptip超过 3 年前
Bruce Schneier has written extensively on the subject (and has written a password manager so he knows what he&#x27;s talking about):<p><a href="https:&#x2F;&#x2F;www.schneier.com&#x2F;blog&#x2F;archives&#x2F;2019&#x2F;02&#x2F;on_the_security_1.html" rel="nofollow">https:&#x2F;&#x2F;www.schneier.com&#x2F;blog&#x2F;archives&#x2F;2019&#x2F;02&#x2F;on_the_securi...</a><p><a href="https:&#x2F;&#x2F;www.schneier.com&#x2F;blog&#x2F;archives&#x2F;2019&#x2F;06&#x2F;risks_of_passwo.html" rel="nofollow">https:&#x2F;&#x2F;www.schneier.com&#x2F;blog&#x2F;archives&#x2F;2019&#x2F;06&#x2F;risks_of_pass...</a>
评论 #30378923 未加载
milesvp超过 3 年前
I will tell you a good reason to trust password managers. I know a lawyer who does estate planning. When you start talking about &quot;what happens when I die&quot;, passwords are a class of problem that has only gotten worse in the last 2 decades. There are legal ways for estate executors to request passwords, but it is a pain, and can be time consuming. She tends to recommend password managers because they tend to be more consistent than written down passwords in a safe. Further, having a password manager, where someone can be designated as a trustee makes executing a will considerably easier.<p>Now, none of the above necessarily makes password managers safe. The increasing legal scrutiny that password manager providers face, means that they will tend to be relatively safe, but they&#x27;re still a single point of failure. At some point you need to decide what trust level you want though, security is a lot about tradeoffs, and ease of access is always at odds with keeping things safe.
评论 #30378976 未加载
0x0000000超过 3 年前
I use a password manager for the hundreds of accounts I have where security is not super important. Mostly as way to not have to reuse passwords (credential stuffing now makes up a significant amount of attack traffic), nor fight the varying password requirements (&quot;shoot, did this website require a special character?&quot;). Tbh, it&#x27;s nice to have one less thing to worry about. For the increasing number of sites which require 2fa, it also let&#x27;s me keep a totp token accessible from all my devices.<p>My most secure accounts use their own individual, memorable, secure password.<p>I do fear that even if my self-hosted password manager is secure today, there&#x27;s nothing stopping a malicious update to that software which could exfiltrate all of my passwords.
评论 #30378577 未加载
评论 #30378399 未加载
评论 #30377276 未加载
prophesi超过 3 年前
It sounds like to me that there are three types of people:<p>* Layman who reuses passwords unless a techie friend convinces them to use a PW manager.<p>* HN user who either uses a SAAS password manager or sets up their own system to solve the issue of syncing a password store across devices.<p>* Those who actually have state level secrets or living under an oppressive regime and thereby don&#x27;t trust even the networks they connect to.<p>Just an observation; not making any statements. But if I were to make one, it&#x27;s to know your own threat level and find the security vs convenience compromise that works for you, and educate your friends &amp; family.
评论 #30377547 未加载
评论 #30378182 未加载
josephcsible超过 3 年前
Because if you don&#x27;t use one, you&#x27;ll almost certainly instead either reuse passwords across sites, store passwords insecurely, or choose weak passwords.
评论 #30375977 未加载
ciphol超过 3 年前
Why are people talking like the choice is between cloud password managers (potentially insecure) and no password manager (impractical unless you reuse passwords)? There&#x27;s a third option - a local password manager like the one built into your browser. Its one disadvantage versus the cloud is that you have to reenter your password on each of your devices. For normal people who have maybe 2 or 3 devices and don&#x27;t change their passwords very often, this is a trivial obstacle.
评论 #30377541 未加载
评论 #30384526 未加载
ummonk超过 3 年前
At the bare minimum, you should trust the password manager that comes with your web browser. After all, you trust your browser enough to type your passwords into it.<p>I personally just use the Safari browser together with Apple&#x27;s Keychain.
awill超过 3 年前
IMO it&#x27;s strange that people use cloud-based password managers. Companies like 1Password have all your passwords in their cloud. So they are an enormous target.<p>I use enpass, and am in charge of my own syncing and storing in the datastore of my choice. I personally prefer this model.
评论 #30378401 未加载
评论 #30376361 未加载
评论 #30377258 未加载
cookiengineer超过 3 年前
The reason password managers help your opsec is not because they can store passwords..but because they can randomize passwords, too, and per website.<p>If one of those web services is compromised, the other accounts and credentials stay unaffected.<p>And humans on the other hand have maybe 2 or 3 passwords based on some imaginitive sense of &quot;how secure and trustworthy&quot; the website is...only to realize later that their paypal password ain&#x27;t that secure, and that now all other &quot;secured&quot; accounts are compromised, too.<p>I mean, BreachCompilation and Collection No1-6 have shown us not only the passwords to accounts, but the patterns specific people use once their passwords have been compromised and what they add to their patterns when they are forced to change their passwords after a breach.<p>And let&#x27;s just leave it with humans are not good at remembering special characters, and they do like counting a lot.
nor-and-or-not超过 3 年前
I use pass[1], which is a command line tool to store gpg encrypted passwords in a local git repo.<p>I share the git repos between different machines using my own servers. All remote mirrors are synced over SSH using git-remote-crypt[2], which additionally encrypts all remotely stored files - including the metadata (e.g. paths and file names of the files) of the remote git repo itself.<p>On mobile I like to torture myself and enter the passwords manually.<p>I definitely wouldn&#x27;t trust any SaaS password manager.<p>[1] <a href="https:&#x2F;&#x2F;www.passwordstore.org&#x2F;" rel="nofollow">https:&#x2F;&#x2F;www.passwordstore.org&#x2F;</a> [2] <a href="https:&#x2F;&#x2F;spwhitton.name&#x2F;tech&#x2F;code&#x2F;git-remote-gcrypt&#x2F;" rel="nofollow">https:&#x2F;&#x2F;spwhitton.name&#x2F;tech&#x2F;code&#x2F;git-remote-gcrypt&#x2F;</a>
评论 #30378402 未加载
oneplane超过 3 年前
It depends on what you mean by password managers and trust.<p>If you have an application that you trust (be it track record, inspection or known-good controls), and that application happens to also be a password manager, then the trust in the manager itself should be fine. If, however, you use a third party service, i.e. something managed by a company that holds your data, that is a different topic because you&#x27;re talking about trusting a company.<p>A password manager can be KeePass on your local FDE storage medium. A password manager can also be a web app hosted elsewhere. It can also be both. You can even mix it up and have the storage medium be remote storage in stead of local storage.<p>If you currently have a file called &quot;passwords.txt&quot; stored in a public S3 bucket, that would be your &#x27;own method&#x27; but would that really be good? Or perhaps you have an RSA-wrapped AES-encrypted spreadsheet you store locally with no back-ups, also possible. Too many unknown parameters.<p>At the end of the day the solution that gets you strong unique passwords per entity in a way that you don&#x27;t lose access to personally but also don&#x27;t give unwanted access to towards third parties is better than not having a solution at all. (this includes physical paper password books, those are &#x27;unhackable&#x27; after all)
chromanoid超过 3 年前
I once got an account hacked because I reused a password. Since then I only generate passwords and use a SaaS password manager. I got informed about leaked passwords multiple times by the service which saved me time and maybe even money.<p>Managing them in the cloud is the easiest way to keep the passwords with me. I trust those services because I am lazy, my own solution would just be obscure and self-managed solutions would probably give me headaches in multi-device or multi-user scenarios (I share many passwords with my wife).<p>With a payed subscription SaaS solution I can expect that the provider has a huge interest in keeping my data safe from criminals. It&#x27;s their biggest selling point.
bee_rider超过 3 年前
Like most of the posters here, I trust my local password manager (keepass) for the most part (well, if my personal machine is compromised to the point where I don&#x27;t trust programs running on it, I guess I&#x27;m truly boned).<p>I have recently started putting some low-value (social media) passwords in the firefox password store, just for autofill convenience. Does anyone know if there are some massive landmines to this sort of thing?
评论 #30380296 未加载
kutenai超过 3 年前
You don&#x27;t &quot;send&quot; your password to the manager, you enter it locally. Ideally, it never leaves your computer, so it is far less likely to &#x27;leak&#x27;<p>The database is encrypted, so if someone were to hack them, they would at least have some (hopefully major) issues decrypting it all.
jmnicolas超过 3 年前
I&#x27;m very low tech : I use a small paper notebook (see link below, I don&#x27;t know the proper term in English). It&#x27;s absolutely unhackable unless someone breaks in my house which I&#x27;m not too much concerned for (my security profile is &quot;random Joe&quot;).<p>I would not trust something in the cloud.<p>But at one point you have to trust something, learn to let go or do without.<p>I&#x27;m too lazy to work on the &quot;memory palace&quot; thing, but it might be the best solution: portable, secure, free.<p><a href="https:&#x2F;&#x2F;media.cultura.com&#x2F;media&#x2F;catalog&#x2F;product&#x2F;cache&#x2F;1&#x2F;image&#x2F;1000x1000&#x2F;9df78eab33525d08d6e5fb8d27136e95&#x2F;r&#x2F;e&#x2F;repertoire-spirale-100p-170x22-repertoire-spirale-100p-170x220-5x5-3329680894905_1.jpg" rel="nofollow">https:&#x2F;&#x2F;media.cultura.com&#x2F;media&#x2F;catalog&#x2F;product&#x2F;cache&#x2F;1&#x2F;imag...</a>
geocrasher超过 3 年前
Because my passwords are stored in the cloud but they are only decrypted on my PC. If a nation state or another attacker gets into the password manager I use, they have my encrypted passwords just the same as if they rooted some Linux box I have an account on. The stakes are roughly the same.<p>A passsword manager (PM) makes random passwords easier. A PM keeps me from re-using passwords. A PM gives me a relatively secure place to store vital information, and it also lets me use it on multiple computers and stays in sync.<p>Do I trust them implicitly with everything? No. That would be foolish. It&#x27;s a calculated risk, and the benefits outweigh the risks.
评论 #30384341 未加载
评论 #30377086 未加载
dyingkneepad超过 3 年前
If you don&#x27;t trust password managers you&#x27;re trusting something else. You have to take that into consideration and weight in versus your threat model.<p>And you probably don&#x27;t even need to trust a password manager with every password you have, you can keep just the random 200+ logins you probably have for weird websites. And keep banking, emailing and the other important stuff away from it. Also, you don&#x27;t even need to have your password manager store the actual passwords there, you could &quot;pepper&quot; what is stored so you transform it after you paste it to the website.
评论 #30375471 未加载
mdellavo超过 3 年前
<a href="https:&#x2F;&#x2F;www.passwordstore.org&#x2F;" rel="nofollow">https:&#x2F;&#x2F;www.passwordstore.org&#x2F;</a>
评论 #30376382 未加载
downsplat超过 3 年前
I trust a local password manager, namely KeepassX running on my linux laptop. It&#x27;s an open source dedicated piece of tech running on the local box, so I figure my trust model extends at least this far.<p>Otherwise, no, I wouldn&#x27;t trust a commercial password manager with automatic sync on to someone else&#x27;s servers. I also don&#x27;t trust the browser enough to put an extension in it that has the keys to my password database.<p>It&#x27;s a tradeoff. I get a nice level of security, but it&#x27;s not 100% seamless. Without autofill, I often need to start up the password manager, search for a site, copy and paste password into the browser. (I just had to do this to log into HN.)<p>For some sites, I let the browser also save the password, which I treat as just a cache of low-value passwords. And the encrypted password manager database gets occasionally synched into gdrive, so I can also access it from my smartphone using the appropriate app.<p>Been doing this for 5+ years at this point, and it <i>works for me</i>... can&#x27;t even remember what on earth I did before. Probably passwords in tiny plain text files.
imwillofficial超过 3 年前
Everything is a risk reward calculation.<p>Convenience vs security.<p>The balance i struck with a self hosted instance of bitwarden has been good for me.<p>I run it.<p>It’s open source<p>It’s third party audited<p>Company has a good history generating trust<p>Did I mention I host it?
bananarchist超过 3 年前
&quot;Should&quot; is an impractical word. &quot;Would&quot; is better.<p>One would trust a password manager as a result of their obvious social media login getting all their friends spammed.<p>One would trust a password manager as a result of someone finding the post it documenting their bank credentials.<p>One would trust a password manager as a result of missing out on an opportunity for forgetting a login and having to wait an ungodly number of hours due to an inconveniently timed DNS upgrade leading to a long delay in the password rest email&#x27;s arrival.<p>Nobody trusts password managers because of something essential to the password manager or the concept thereof, we trust password managers because we have experience or can imagine experiencing the fallout of our own credential mismanagement in the face of increasingly complex security demands resulting not always directly from increasingly sophisticated attacks. It reduces our cognitive load slightly and focuses otherwise diffuse anxieties.
rossy超过 3 年前
I trust password managers more than my ability to remember a strong, unique password for each of the 200 sites in my password manager, and more than my ability to identify URL phishing attempts 100% of the time. I use Firefox&#x27; built-in password manager because it&#x27;s hard to write a secure content script in an add-on password manager[1], and because Firefox Sync encrypts passwords before uploading them to the web[2]. I also know that, if my password manager is ever breached, my most important accounts are also protected by 2FA.<p>[1]: <a href="https:&#x2F;&#x2F;lock.cmpxchg8b.com&#x2F;passmgrs.html" rel="nofollow">https:&#x2F;&#x2F;lock.cmpxchg8b.com&#x2F;passmgrs.html</a> [2]: <a href="https:&#x2F;&#x2F;hacks.mozilla.org&#x2F;2018&#x2F;11&#x2F;firefox-sync-privacy&#x2F;" rel="nofollow">https:&#x2F;&#x2F;hacks.mozilla.org&#x2F;2018&#x2F;11&#x2F;firefox-sync-privacy&#x2F;</a>
SloopJon超过 3 年前
This question is incomplete without expanding on your &quot;methods for safe handling of passwords on the web.&quot; Tell us what those methods are, and you&#x27;ll get some thoughts on whether you should or shouldn&#x27;t trust them.<p>Password manager anxiety is a thing. Maybe you&#x27;re worried that you&#x27;ll lose the vault, or that it will be hacked. I didn&#x27;t like the idea that I couldn&#x27;t log into something without it. The problem is, without a password manager, my passwords sucked. I had a core secret that I sort of salted for each site.<p>So my reason for using a password manager (KeePassXC with SyncThing, if you&#x27;re interested) is that it&#x27;s better than the alternative.
midrus超过 3 年前
Honest question: Why browser&#x27;s integrated password managers (such as chrome&#x27;s) are not considered an option for most companies which ask you to use 1password, etc?<p>Taking out of the equation that maybe google can read your passwords... from the endpoint&#x2F;laptop point of view itself, is it any less secure than those 3rd party password managers? My understanding is that, for example on OSX, they store them in the OS keychain anyway, right? What&#x27;s so wrong with that?
tga超过 3 年前
I don’t trust password managers — I use them to store only half of each password. I have a changing algorithm to derive the other half from the site’s name in my head.<p>This allows me to securely copy paste the first part, then securely type the second part. Also, even if someone has my password database <i>and</i> a full password or two, they still wouldn’t trivially have all the other ones.
mlsmith超过 3 年前
I might be minority here, but I prefer Bitwarden because of it&#x27;s seamless ability to sync passwords with my wife. There&#x27;s no way she&#x27;s going to use something complicated or non-intuitive and she mostly uses iOS. We have nothing to hide from each other so all of our passwords are in the same vault. We also use the secure notes functionality to lookup important family info.
t-3超过 3 年前
It&#x27;s a convenience vs. security tradeoff. The fact is, most people can afford to adopt a flawed security model to give themselves greater convenience, because most people aren&#x27;t being specifically targeted and attacked. I doubt many people realize that they are making such a tradeoff, but that&#x27;s more about dishonest advertising...
评论 #30375213 未加载
评论 #30375711 未加载
abdullahkhalids超过 3 年前
I trust my password manager (keepassxc) because<p>(1) I believe in the fundamental goodness of humans.<p>(2) I believe that keepassxc being a Free Software, was made with honest intentions by competent people.<p>(3) That human society should be organized on the principle of mutual aid, and that involves trusting (initially at least) those who say they intend to aid you.
评论 #30377726 未加载
_dain_超过 3 年前
I use KeepassXC. It&#x27;s free and open source, and local-only: my password file never touches the cloud even in encrypted form. It has hundreds of account credentials in it, along with other notes like security questions and which email I used for signup. The random password generation feature is a godsend: we all hate those security policies that ask for &quot;at least one lowercase, at least one uppercase, at least one number, at least one special character, between 8 and 20 characters long&quot; or some such outdated nonsense. I can tell it to generate a random password meeting those requirements, saving me the hassle of doing it myself. Or I can ask it for a 6 word long diceware phrase, for sites enlightened enough to support that. It makes my online life massively more convenient and secure.
koenigdavidmj超过 3 年前
Your decision here is based on balancing security and convenience. It&#x27;s a tradeoff that you have to decide on based on your situation.<p>Most average users are willing to trade the upside of the SaaS apps (sync is easy and pretty secure) for the downside (have to trust a third party like 1Password, that they won&#x27;t send you a malicious client that slurps your master password).<p>We&#x27;re technical, so we can use Password Store[0] and avoid the downside of the SaaS programs (have to trust a third party) while still having sync. If you&#x27;re pissing off entities who might conceivably blackmail or hack 1Password, Password Store is the bare minimum.<p>[0] I&#x27;m not addressing that Password Store doesn&#x27;t encrypt the sites it has logins for, just the fact that it doesn&#x27;t require entering your master password in a web page.
fsflover超过 3 年前
I don&#x27;t trust them and use an offline virtual machine on Qubes OS to store my passwords instead.
kerblang超过 3 年前
If you are concerned about using unfamiliar and complex cloud software:<p>A very reasonable option is ccrypt, which gives you dirt-simple command-line password-based encryption for text files (or any other files). It&#x27;s available for most linux distros, cygwin, homebrew, etc.<p>Personally I use my own homemade text editor with built-in AES-256 password-based encryption. It&#x27;s about as trustworthy as I am, and a tad more friendly than ccrypt.<p>In either case cloud storage is easy; for example a github repo is nice (preferably a private one) because you have backups automatically in case you mess up, which I have done. I don&#x27;t use my phone for critical work in the first place (can&#x27;t trust &#x27;em) so I&#x27;m not worried about integrating that.
surfsvammel超过 3 年前
I run a self-hosted instance of a Bitwarden compatible server. It’s only available locally on my local network. So, when out and about, I VPN back home.<p>Not sure it’s the best way to do it, security wise, but it’s what I found works for me in a security&#x2F;convenience trade-off
0xTJ超过 3 年前
What other option is there? When you&#x27;ve got over a hundred different random passwords, at some point you&#x27;ve got to manage those, so you use a manager.<p>Though I would never recommend a service-based one, just use something like KeePass and sync that file.
timka超过 3 年前
Because others do. Or maybe they make themselves feel like they trust because of the convenience of password managers. After all, we have to draw a line somewhere or just quit using Internet.<p>IMO if we&#x27;re talking about security you should ask other questions. How much can you trust a device after Jonathan Brossard&#x27;s Rakshasa paper? What about evidence-based trust and bunnie&#x27;s Precursor? Would having a password manager app on Precursor be actually more secure taking into account that your stuff is going to be decrypted on a less protected device?
giancarlostoro超过 3 年前
There are offline capable ones that basically protect your passwords via an encrypted file you know the password for, I&#x27;ve seen this for Android and Desktop, not sure about iOS but I would be surprised if there wasn&#x27;t. There&#x27;s open source ones like BitWarden as well which I use. You can quite literally fully manage your password manager yourself. Then you have Firefox&#x27;s rolled out instance, where if you forget your password, the moment you reset it, you lose all the saved passwords. They can&#x27;t recover it because it is encrypted with your password.
kerneloftruth超过 3 年前
I trust the one I wrote for myself. I would have a hard time trusting a 3rd party tool without a lot of insight and feedback as to its design and implementation, and credible assessments of its trustworthiness.
评论 #30376263 未加载
princevegeta89超过 3 年前
You don&#x27;t need to trust all of them. You might have been wrong to trust lastpass a few years ago as they got hacked, however something fully open source like bitwarden builds trust through sheer code. It is truly end-end transparency. You&#x27;re welcome to look at it if you&#x27;d like.<p>I count on their cloud to host my data but might as well switch to the hosted version. If you have multiple devices with the app installed you should be able to have at least one device that still holds all your data should bitwarden ever go down.
lmilcin超过 3 年前
You should not trust password managers with critical stuff.<p>Even if the product is secure. Even if it actually does end-to-end encryption. Even if it is open-source and you can audit code.<p>Even if all of the above are met, somebody still can upload a malicious package or commit malicious change that gets propagated to you.<p>It is probably fine to use password managers for stuff where damage would be limited (accounts to low value things).<p>But for stuff that matters I know of no better system than a piece of paper, a tamper evident envelope and a logbook.
Berniek超过 3 年前
A Password manager that only has a local &quot;vault&quot; and simply syncs an encrypted file a much safer security wise way to operate. The BIG question is whether the remote server does any processing of the websites (for spam, malware etc) in which case it decrypts the website name. That becomes a big temptation to log and on sell. Not the logon password just the address. Having an emergency access code or method is just another security hole.
hitpointdrew超过 3 年前
I have the exact same question for these ad blocker browser plugins. You go to install one of these things and get a warning that the plugin will:<p><pre><code> Access your data for all websites Read and modify privacy settings Access browser tabs Access browser activity </code></pre> No thanks, I just use a pi-hole, something that I own and control.<p>I am less concerned with the password managers, as I actually pay for those.<p>Remember if it’s free, you are the product.
HermanMartinus超过 3 年前
I don&#x27;t trust password managers at all. I ended up creating a trust-less password manager for myself (which generates passwords based on a master password and a service name one-way hashed). You can check it out here (but probably don&#x27;t use it, I don&#x27;t want to be responsible for your password security): <a href="https:&#x2F;&#x2F;horuspass.com" rel="nofollow">https:&#x2F;&#x2F;horuspass.com</a>
评论 #30384355 未加载
xlaacid超过 3 年前
Why do you trust that your car wont explode when you turn it on in the morning? Or, that you food is not actually poisoned? Same reasons apply.
nathanaldensr超过 3 年前
I self-host Vaultwarden[1] on a $6&#x2F;mo DigitalOcean droplet. It took awhile to set up, but I know that I control the data, the backups, and the security. I made this decision after trying LastPass, which turned out to be a buggy piece of shit.<p>[1] <a href="https:&#x2F;&#x2F;github.com&#x2F;dani-garcia&#x2F;vaultwarden" rel="nofollow">https:&#x2F;&#x2F;github.com&#x2F;dani-garcia&#x2F;vaultwarden</a>
jviotti超过 3 年前
You don&#x27;t need to trust them. I use &quot;pass&quot; (<a href="https:&#x2F;&#x2F;www.passwordstore.org" rel="nofollow">https:&#x2F;&#x2F;www.passwordstore.org</a>), a simple CLI password manager that operates using a GPG key you control (which I have on a Yubikey). Then, you can upload the GPG-encrypted password store wherever your want in order to sync-up your passwords.
tw600040超过 3 年前
Well, if one&#x27;s using a Mac and iCloud one already trusts Apple. so no additional trust needed to use iCloud Keychain I guess.
评论 #30379260 未加载
throwawayffffas超过 3 年前
Password managers that respect their users, will encrypt their data on their device and prove they do so by being open source.<p>I personally wrote my own <a href="https:&#x2F;&#x2F;almondpass.com&#x2F;" rel="nofollow">https:&#x2F;&#x2F;almondpass.com&#x2F;</a><p>I have implemented a syncing solution but registrations are not public yet.
_Algernon_超过 3 年前
I just checked my Keepass database and it has 192 entries. 192 unique, actually secure passwords. Without a password manager it would be a necessity to reuse passwords or have otherwise insecure passwords in some form.<p>That&#x27;s why I use a password manager. The small annoyance it is to keep the db file synced is well worth it.
评论 #30377401 未加载
getcrunk超过 3 年前
Personally, I use pwd managers as a convenience thing. My main accounts (bank, email, git, domain, or any other admin lvl thing) I either memorize or write down irl and use 2fa. Other than that yea I use password managers with the acknowledgement that it may get hacked but so would I at any point too.
xfer超过 3 年前
Never do any kind of clever scheme with passwords, the other side might be storing in plaintext, have misconfigured logging etc.<p>My isp does store them in plaintext :), the support person read my password to me while fixing an issue with the account(you can guess which language their webpage is in).
33Backpack33超过 3 年前
You could do that salt and pepper thing found here: <a href="https:&#x2F;&#x2F;passwordbits.com&#x2F;salting-passwords&#x2F;" rel="nofollow">https:&#x2F;&#x2F;passwordbits.com&#x2F;salting-passwords&#x2F;</a><p>This way you don&#x27;t store your full password in your password manager.
oezi超过 3 年前
My biggest fear with a local password manager is a keylogger stealing the master password. I wished local password managers had a way that they would only disclose a single password when using a yubikey rather than opening&#x2F;decrypting the whole vault.
评论 #30379065 未加载
ahmaman超过 3 年前
I use 1password for the convenience they offer.<p>However for important accounts, I use 2FA with yubikeys or codes that are not stored on 1password. Just in case.<p>Especially for non-tech family members and friends. Its either an easy password manager or using the same password everywhere.
philonoist超过 3 年前
This is why people design password managers with &quot;Zero Trust Architecture&quot; and it is open source and auditable. Now what have you to lose?<p>The comment section is full of false dichotomy of no PM vs vulnerable ones like SaaS based ones.
auslegung超过 3 年前
You need a unique, strong password for every service. Humans are bad at creating unique passwords and bad at memorizing hundreds of unique passwords. Machines are good at both of these. So why would you trust your methods?
stronglikedan超过 3 年前
Because I too had &quot;my own methods for safe handling of passwords on the web&quot;, but eventually realized that&#x27;s a fallacy. Unless you&#x27;re some memory palace super champion, you&#x27;re probably using an underlying pattern to remember all your various passwords, perhaps without even realizing it. I didn&#x27;t realize it until I started using separate passwords for everything, and &quot;everything&quot; started multiplying exponentially year over year. Only then did the pattern emerge to me, and only then did I realize it would emerge to a computer algorithm in about 1 femtosecond flat.<p>There is no more convenient &quot;safe handling of passwords on the web&quot; than a password manager, in my experience. That said, if you know of a better, but at least as safe, way, then please share.<p>Insert shameless Bitwarden plug here.
hakube超过 3 年前
I use SaaS password managers and I don&#x27;t trust them. That&#x27;s why I have MFA enabled on all of my accounts and logins can only be authorized through the authenticator app installed on my phone
drivebycomment超过 3 年前
Why do you trust your cpu, firmware, OS, and all the layers of code then ?
diffeomorphism超过 3 年前
Keepass is offline, opensource and quite simple: an encrypted list of passwords you can open and copy&amp;paste from. No lock-in, easy backups, simple threat scenario and hence easy to trust.
Vixel超过 3 年前
I trust password managers more than I trust my ability to write down every password I might need again, and somehow not lose that notebook or leave it somewhere for someone to read it.
zeepzeep超过 3 年前
If they hack my PC, they can keylog my passwords, so I do not fear this single point of failure. And without that, password managers just allow me to generate secure passwords
alexk307超过 3 年前
I don&#x27;t. You can easily set up your own.<p><a href="https:&#x2F;&#x2F;github.com&#x2F;dani-garcia&#x2F;vaultwarden" rel="nofollow">https:&#x2F;&#x2F;github.com&#x2F;dani-garcia&#x2F;vaultwarden</a>
aborsy超过 3 年前
Pass is a small bash script<p><a href="https:&#x2F;&#x2F;www.passwordstore.org&#x2F;" rel="nofollow">https:&#x2F;&#x2F;www.passwordstore.org&#x2F;</a><p>You can read it and make sure you are comfortable with it.
peakaboo超过 3 年前
You can host Bitwarden yourself if you want to and trust no one.
评论 #30376136 未加载
autoexec超过 3 年前
I use an offline only open source password manager so I don&#x27;t have to trust it. That and backing up the database solves the issue entirely
gabkins超过 3 年前
I&#x27;m actually scared about trying password managers, they might actually be infiltrated and release your sensitive information?
dusted超过 3 年前
I really don&#x27;t know. I barely trust the one I built myself, especially for the automatic, cloud based ones, I just don&#x27;t know.
andrecarini超过 3 年前
You shouldn&#x27;t [trust SaaS password managers].<p>Trust local password managers working on local files that are synced via Google Drive&#x2F;Dropbox.
hamedheidarian超过 3 年前
I think best and safest practice would be using memorizable, random password such as those created by passgen.
aborsy超过 3 年前
The question also applies to other software.<p>Do you trust your backup software placing your encrypted data at the feet of NSA (cloud storage)?
u2077超过 3 年前
Keepassxc and strongbox (iOS). Both are open-source, I manually sync with iCloud + local backups on each device.
2-718-281-828超过 3 年前
&gt; passwords on the web<p>password safe isnt on the web.
makeworld超过 3 年前
I trust hosted Bitwarden because it is open source and uses zero-access&#x2F;end-to-end encryption.
mstef超过 3 年前
i am the author of a password manager which you don&#x27;t have to trust: <a href="https:&#x2F;&#x2F;www.ctrlc.hu&#x2F;~stef&#x2F;blog&#x2F;posts&#x2F;sphinx.html" rel="nofollow">https:&#x2F;&#x2F;www.ctrlc.hu&#x2F;~stef&#x2F;blog&#x2F;posts&#x2F;sphinx.html</a>
jiveturkey超过 3 年前
autofill is the most important bit.
ausbah超过 3 年前
I trust a centralized solution more than anything I could do myself, plus the convenience ig
Trystans超过 3 年前
Never think of this before but I just get used to the pw ms of google...
paulpauper超过 3 年前
They are fine as long as you don&#x27;t have anything crypto-related tied to them
everydayDonut超过 3 年前
Why do people use paid password managers when you can just use firefox&#x27;s?
评论 #30378650 未加载
sdevonoes超过 3 年前
I don&#x27;t trust them. I store passwords locally on my machine (encrypted).
minroot超过 3 年前
Differently, why do people trust closed source password managers?
KronisLV超过 3 年前
&gt; I&#x27;ve been having my own methods for safe handling of passwords on the web.<p>I use a local password manager, KeePass: <a href="https:&#x2F;&#x2F;keepass.info&#x2F;" rel="nofollow">https:&#x2F;&#x2F;keepass.info&#x2F;</a><p>It&#x27;s probably the only good middle ground for keeping track of passwords, SSH certificates and other data: a password protected local database that i can move to USB sticks or SD cards for backups, or keep inside of an encrypted 7z archive, or a VeraCrypt file if i cared that much.<p>You not only get to have a simple way to use it (it&#x27;s just a file that&#x27;s compatible with the software, like SQLite is also really easy to use), but also get to pick where&#x2F;how you want to store that data in an easy to understand manner.<p>Right now it&#x27;s great for all of my vaguely relevant access credentials, from numerous e-mail accounts, to online shopping accounts, to even access data for online platforms, hosting solutions, servers etc. with as many separate databases as i choose.<p>In my eyes, it&#x27;s also really great for letting you randomly generate secure passwords - i don&#x27;t know almost any of the non-essential service passwords and because it&#x27;s so easy to generate new ones for accounts, i&#x27;m not plagued by &quot;password-reuse-itis&quot; either. When coupled with 2FA, it&#x27;s pretty decent from a security standpoint.<p>It also has a clearly understandable attack surface - infected password manager binaries, stealing passwords when in memory or malware on the system (like keyloggers, clipboard watchers), someone stealing the database AND the master password, asking me nicely for it with a 5$ wrench: <a href="https:&#x2F;&#x2F;xkcd.com&#x2F;538&#x2F;" rel="nofollow">https:&#x2F;&#x2F;xkcd.com&#x2F;538&#x2F;</a><p>For why people use web based ones which aren&#x27;t so clearly understood or dependable (your list of risks would be a lot longer with those), i&#x27;m not sure. It&#x27;s probably just convenience.
ejb999超过 3 年前
I am in the minority I know, but I don&#x27;t trust them.
hi5eyes超过 3 年前
icloud&#x2F;keychain and KeePass, im surprised people trust other pwd managers
WalterBright超过 3 年前
A password manager creates a single point of failure of all your passwords.<p>Nope.
评论 #30378381 未加载
Shank超过 3 年前
So, I think in-general, the answer is that for a question like this, you need to start from doing threat modelling, and work outward. Threat modelling is the first step that must be conducted, and then you can find solutions that fit your needs from that.<p>For most people, the biggest threats that come from passwords are: data breaches (compromising reused passwords), human memory limits (you can&#x27;t remember high entropy passwords easily, in general), and an ever-increasing demand for both high quality passwords and unique passwords.<p>If you look at these threats from the perspective of most people, a password manager works well! You don&#x27;t have to worry about breaches, memory limits, or even password generation. You can just generate-and-store random passwords for every site that meets their requirements, and walk away.<p>But that doesn&#x27;t mean that that&#x27;s the end of threat modeling. Other risks that you&#x27;re probably thinking of are the security of the cryptosystem involved, bugs in the application, and fear of backdoors. These are valid threats, but for the vast majority of people, they&#x27;re mitigated by other reasons, or are non-factors.<p>To give an example: a password manager that most cryptographers would laugh at is writing your passwords on a sticky note. Yes, that&#x27;s bad from a cryptography standpoint, but if you make a new unique password for each site, and each one is sufficiently long and complex, you&#x27;ve actually mitigated the threats involved with password reuse, memory, and complexity. But you&#x27;ve also made it impossible to steal from a cryptography backdoor, and the barrier-to-compromise involves your physical space being violated. But again, if you ask a cryptographer, or even most security professionals, this is a bad idea, because you&#x27;re still risking physical compromise if...you work in an office, have kids, don&#x27;t guard your home, etc.<p>A lot of people dislike 1Password&#x27;s decision to store passwords in cloud storage. This is a real risk, because a cryptosystem backdoor <i>would</i> create danger. If you use a password storage app with strong cryptography, and store the passwords in a completely benign location (e.g., a network share, some random cloud storage provider), you can decouple the cryptography from the storage, which brings some safety.<p>Now, back briefly to your question: why would people trust a completely SaaS password storage provider? Well, for me, it&#x27;s that I know that Google Project Zero exists, and they do a lot of research into third party apps. I sleep easier at night knowing that lots of smart people are invested in trying to break 1Password&#x27;s cryptography, and have thus-far been unsuccessful. Sure, a government might have a secret backdoor that I don&#x27;t know about. But in my threat model, the government could just come arrest me for violating a non-disclosure agreement I&#x27;ve signed, and hit me with a wrench.<p>In summary: for the vast majority of people, the threats that come from &quot;memorizing passwords&quot; are mitigated by password managers. Heck, you even say you have your &quot;own methods for safe handling of passwords&quot;. I would argue that you have a password manager, it&#x27;s just more DIY than something off-the-shelf, and that&#x27;s fine!