this post was submitted on 16 Feb 2026
262 points (90.4% liked)

Technology

82261 readers
4522 users here now

This is a most excellent place for technology news and articles.


Our Rules


  1. Follow the lemmy.world rules.
  2. Only tech related news or articles.
  3. Be excellent to each other!
  4. Mod approved content bots can post up to 10 articles per day.
  5. Threads asking for personal tech support may be deleted.
  6. Politics threads may be removed.
  7. No memes allowed as posts, OK to post as comments.
  8. Only approved bots from the list below, this includes using AI responses and summaries. To ask if your bot can be added please contact a mod.
  9. Check for duplicates before posting, duplicates may be removed
  10. Accounts 7 days and younger will have their posts automatically removed.

Approved Bots


founded 2 years ago
MODERATORS
 

cross-posted from: https://infosec.pub/post/42164102

Researchers demo weaknesses affecting some of the most popular options Academics say they found a series of flaws affecting three popular password managers, all of which claim to protect user credentials in the event that their servers are compromised.…

(page 2) 50 comments
sorted by: hot top controversial new old
[–] baduhai@sopuli.xyz 5 points 2 weeks ago
[–] cley_faye@lemmy.world 5 points 2 weeks ago

If the entire supply chain up to the software you're running to perform actual decryption is compromised, then the decrypted data is vulnerable. I mean, yeah? That's why we use open-source clients and check builds/use builds from separate source, so that the compromission of one actor does not compromise the whole chain. Server (if any) is managed by one entity and only manage access control + encrypted data, client from separate trusted source manage decryption, and the general safety of your whole system remain your responsibility.

Security requires a modicum of awareness and implication from the users, always. The only news here is that people apparently never consider supply chain attacks up until now?

[–] eleitl@lemmy.zip 5 points 2 weeks ago
[–] melsaskca@lemmy.ca 5 points 2 weeks ago

Let's expand that specifically generic headline. ""You probably can't trust anything if it's been compromised". More extra non-news at eleven.

[–] Toes@ani.social 4 points 2 weeks ago (2 children)

Did you know water is wet?

load more comments (2 replies)
[–] CubitOom@infosec.pub 4 points 2 weeks ago (2 children)
load more comments (2 replies)
[–] Grandwolf319@sh.itjust.works 3 points 2 weeks ago (4 children)

Anyone got a good suggestion for a self hosted option? Ideally one that has a good iOS app and a web interface.

[–] MonkderVierte@lemmy.zip 1 points 2 weeks ago

Web interface and secure are two things.

load more comments (3 replies)
[–] DeathByBigSad@sh.itjust.works 3 points 2 weeks ago* (last edited 2 weeks ago) (5 children)

Keepass, upload the database file to random free cloud accounts after making changes to the database.

This is foulproof as long as the end-user device doesn't get hacked, right?

Edit: Did I say something wrong? Why downvotes? Database file are encrypted, even if someone gets it, its encrypted and they don't have your password.

So its basically safe to upload your database. If you think I'm wrong then explain why I can't use free cloud accounts to store an encrypted file?

This is terrible advice, even if I assume you are also using a key-file on a removable usb. An attacker can brute force decrypt your db. There is no rate limiting when you literally have the database file, they could replicate it across thousands of servers each with dozens of cores, each core trying a dozen keyphrases per second. That's assuming a motivated attacker like a government or crypto scammers, but why open yourself to that possibility?

[–] blueberry_793@lemmings.world 2 points 2 weeks ago

Yes and no. You can store them in a free cloud account, provided you have local copies; there's a risk your access to the cloud storage could be denied. A security risk is that they could harvest these databases, and decrypt them later.

I think your best bet, if you were to use free services, is to delete old databases from the cloud. Encrypt the new databases with the updated password manager and a new master password.

load more comments (3 replies)
load more comments
view more: ‹ prev next ›