TE
科技回声
首页24小时热榜最新最佳问答展示工作
GitHubTwitter
首页

科技回声

基于 Next.js 构建的科技新闻平台,提供全球科技新闻和讨论内容。

GitHubTwitter

首页

首页最新最佳问答展示工作

资源链接

HackerNews API原版 HackerNewsNext.js

© 2025 科技回声. 版权所有。

Smartphone password managers are largely insecure

52 点作者 skimbrel大约 13 年前

7 条评论

mef大约 13 年前
Response from Agilebits (publisher of 1Password) to this paper: <a href="http://blog.agilebits.com/2012/03/16/strong-security-requires-strong-passwords/" rel="nofollow">http://blog.agilebits.com/2012/03/16/strong-security-require...</a>
评论 #3725108 未加载
jsight大约 13 年前
Wow, some of these are amazingly insecure. It's really incredible that at least one of the developers of a paid security app stores the master-password encrypted (not-hashed) using a hardcoded private key.
mdc大约 13 年前
Sorry to see iKeePass missing from the analysis.
评论 #3726564 未加载
评论 #3725066 未加载
评论 #3724943 未加载
krupan大约 13 年前
In short, protect your device from physical access by untrusted people, and don't connect it to untrusted machines. Use a PIN or device password just in case someone else does get ahold of your device.
评论 #3726142 未加载
ValG大约 13 年前
One Ring to Rule Them All... but seriously, interesting article; I think more interesting is the phone log-in password that all smart phones now have. I just read an article where the DOJ subpenaed Google to unlock an Android based phone because after several weeks of working on the log-in, they still couldn't get in. If you think about it, Password management software for your phone is really protected by 2 systems, the one native to your phone and the apps own security systems. Although, yes, some of these apps are essentially bunk.
评论 #3726244 未加载
acqq大约 13 年前
Conclusion from the article:<p>"Many password management apps offered on the market do not provide adequate level of security. We strongly encourage users not to rely on their protections but rather use iOS or BlackBerry security features.<p>For Apple users: set up a passcode, and a (complex!) backup password. Do not plug the unlocked device to computers you do not trust to prevent creation of pairing. If you can't encrypt backup for some reason, restrict access to it as much as possible."
drewwwwww大约 13 年前
does anybody know how the cpu and gpu rates are derived in the summary table?<p>i'd like to know how parallelized the computation is assumed to be.