258

cross-posted from: https://infosec.pub/post/42164102

Researchers demo weaknesses affecting some of the most popular options Academics say they found a series of flaws affecting three popular password managers, all of which claim to protect user credentials in the event that their servers are compromised.…

top 50 comments
sorted by: hot top new old
[-] melsaskca@lemmy.ca 4 points 6 hours ago

Let's expand that specifically generic headline. ""You probably can't trust anything if it's been compromised". More extra non-news at eleven.

[-] SCmSTR@lemmy.blahaj.zone 5 points 9 hours ago

Uhhhh.... What even is this headline

[-] eleitl@lemmy.zip 4 points 10 hours ago
[-] thedeadwalking4242@lemmy.world 6 points 19 hours ago
[-] cley_faye@lemmy.world 5 points 20 hours ago

If the entire supply chain up to the software you're running to perform actual decryption is compromised, then the decrypted data is vulnerable. I mean, yeah? That's why we use open-source clients and check builds/use builds from separate source, so that the compromission of one actor does not compromise the whole chain. Server (if any) is managed by one entity and only manage access control + encrypted data, client from separate trusted source manage decryption, and the general safety of your whole system remain your responsibility.

Security requires a modicum of awareness and implication from the users, always. The only news here is that people apparently never consider supply chain attacks up until now?

[-] imetators@lemmy.dbzer0.com 26 points 1 day ago

JFC this headline. BREAKING NEWS: Healthy people die off an old age.

[-] oopsgodisdeadmybad@lemmy.zip 1 points 6 hours ago

Jfc this headline is almost as bad.

[-] AnyOldName3@lemmy.world 5 points 1 day ago

Password managers are supposed to be designed to resist a situation where they're compromised, and are only ever supposed to see a mysterious blob of encrypted data without ever having access to any information that would help decrypt it. The headline's more like M1 Abrams Tanks Vulnerable to Small Arms Fire - it'd be totally expected that most things die when shot with bullets, but the point of a tank is that it doesn't, so it's a big deal if it does.

[-] 18107@aussie.zone 6 points 1 day ago

Things you should know: Your car won't drive after it's broken down.

I'll be honest, password managers are like the holy grail of desirable to breech. If you're using one it will be constantly under attack. It being breeched or vulnerable shouldn't be a surprise. There isn't really a secure way to store large amounts of passwords that doesn't have some vulnerability issues.

[-] corsicanguppy@lemmy.ca 2 points 21 hours ago

breech

breach, right?

[-] nieminen@lemmy.world 3 points 1 day ago

That's why I liked password store, no servers, just my encrypted password files on my own computer, that I sync over to my other devices.

Apparently it's dying soon through, so I need an alternative.

[-] Taleya@aussie.zone 2 points 10 hours ago

I use passwordsafe, no issues there

[-] nieminen@lemmy.world 1 points 6 hours ago* (last edited 6 hours ago)

Edit, sorry, misread your comment, my reply was irrelevant.

[-] vrighter@discuss.tchncs.de 7 points 1 day ago

i use keepassxc for the offline database part, and syncthing to sync it (among other things) between all my devices

[-] PodPerson@lemmy.zip 2 points 20 hours ago

I was enjoying 1Password until they went completely subscription, so I switched to Strongbox (based on Keepass) and it's been pretty good. DB stored locally and I use my own tools to sync that vault to my other devices.

[-] Auster@thebrainbin.org 356 points 1 day ago

You probably can't trust anything if it's compromised

[-] floofloof@lemmy.ca 70 points 1 day ago* (last edited 1 day ago)

Well the specific point here is that these companies claim that a server hack won't reveal your passwords since they're encrypted and decrypted on your local device so the server only sees the encrypted version. Apparently this isn't completely true.

[-] philpo@feddit.org 16 points 1 day ago

At the point someone pulls off a valid MIM attack - which is basically a requirement here unless the whole BW/Vaultwarden server gets compromised- that is the least of someones problems. MIMs are incredibily hard these days.

load more comments (2 replies)
[-] Pratai@piefed.ca 24 points 1 day ago

Are you trying to say the front fell off?

[-] wreckedcarzz@lemmy.world 13 points 1 day ago
[-] sunbeam60@feddit.uk 8 points 1 day ago

It wasn’t designed for the front to fall off, that’s for sure!

[-] QuadratureSurfer@piefed.social 3 points 1 day ago

Well, what sort of standards are these tools built to?

[-] sunbeam60@feddit.uk 3 points 21 hours ago

For the front to stay on!

[-] tal@lemmy.today 47 points 1 day ago

Yeah, the title there really doesn't reflect the article text. It should be "you probably can't trust your password manager if the remote servers it uses are compromised".

load more comments (1 replies)
load more comments (6 replies)
[-] ArrowMax@feddit.org 21 points 1 day ago

Additional vendor responses by Bitwarden to put the remediations and threat models into perspective:

Bitwarden blog post

Bitwarden cryptography report

[-] Engywuck@lemmy.zip 62 points 1 day ago
[-] lena@gregtech.eu 11 points 1 day ago* (last edited 1 day ago)

These password managers claim your passwords are secure, even if their servers get compromised, which is what is expected from a security standpoint. But that is apparently not the case.

[-] mastod0n@lemmy.world 27 points 1 day ago

What a headline

[-] Lushed_Lungfish@lemmy.ca 11 points 1 day ago

I just write down password hints on a scrap of paper.

[-] floofloof@lemmy.ca 6 points 1 day ago* (last edited 1 day ago)

If you don't have to use your passwords from multiple locations, your hints are intelligible only to you, and you don't leave the paper anywhere too obvious, this isn't a bad solution.

[-] ryper@lemmy.ca 91 points 1 day ago

Since the summary doesn't say which three popular password managers:

As one of the most popular alternatives to Apple and Google's own password managers, which together dominate the market, the researchers found Bitwarden was most susceptible to attacks, with 12 working against the open-source product. Seven distinct attacks worked against LastPass, and six succeeded in Dashlane.

[-] Clent@lemmy.dbzer0.com 5 points 1 day ago

And glosses over what it claims are the two that dominate market (combined market share of 55%) which negates their headline, since it's likely the reader is using one of those two password managers.

Source

load more comments (4 replies)
[-] eodur@piefed.social 47 points 1 day ago
load more comments (4 replies)
[-] chocrates@piefed.world 48 points 1 day ago
[-] COASTER1921@lemmy.ml 67 points 1 day ago

These attacks are more around the encryption and all require a fully malicious server. It sounds like Bitwarden is taking these seriously and personally I'd still strongly prefer it to any closed source solution where there could be many more unknown but undiscovered security concerns.

Using a local solution is always most secure, but imo you should first ask yourself if you trust your own security practices and whether you have sufficient hardware redundancy to be actually better. I managed to lose the private key to some Bitcoin about a decade ago due to trying to be clever with encryption and local redundant copies.

Further, with the prevalence of 2FA even if their server was somehow fully compromised as long as you use a different authenticator app than Bitwarden you're not at major risk anyways. With how poorly the average person manages their password security this hurdle alone is likely enough to stop all but attacks targeted specifically at you as an individual.

load more comments (6 replies)
load more comments (6 replies)
load more comments
view more: next ›
this post was submitted on 16 Feb 2026
258 points (90.6% liked)

Technology

81373 readers
4884 users here now

This is a most excellent place for technology news and articles.


Our Rules


  1. Follow the lemmy.world rules.
  2. Only tech related news or articles.
  3. Be excellent to each other!
  4. Mod approved content bots can post up to 10 articles per day.
  5. Threads asking for personal tech support may be deleted.
  6. Politics threads may be removed.
  7. No memes allowed as posts, OK to post as comments.
  8. Only approved bots from the list below, this includes using AI responses and summaries. To ask if your bot can be added please contact a mod.
  9. Check for duplicates before posting, duplicates may be removed
  10. Accounts 7 days and younger will have their posts automatically removed.

Approved Bots


founded 2 years ago
MODERATORS