โJun-25-2015 10:26 AM
โJun-25-2015 07:55 PM
SCR wrote:Yup, that's the one. I've been using it for over 15 years.tvman44 wrote:
I have been trying to find a good password program that is local, on my computer or a jump drive.
The safest password vault is the one located directly behind your eyes.
Otherwise RoboForm works pretty well.
โJun-25-2015 05:11 PM
bcsdguy wrote:SCR wrote:tvman44 wrote:
I have been trying to find a good password program that is local, on my computer or a jump drive.
The safest password vault is the one located directly behind your eyes.
Otherwise RoboForm works pretty well.
Thank you! I would never put my passwords on a website no matter what they claim.
โJun-25-2015 03:56 PM
bcsdguy wrote:bwanshoom wrote:
This is relatively old news at this point, but the reasoning in your post behind changing your master password is flawed. The master password is used to protect the encryption key for the password vault - where all your various passwords are stored. If the intruders got a copy of the vaults, changing your master password after the fact will have no affect. That will only create a new encrypted copy of the vault stored with LastPass - the old encrypted copy using the master password whose hash was stolen remains unchanged. It would remain vulnerable to offline brute force attack. But because each password has a unique salt (a bit of random information added to a password to defeat dictionary attacks) added to it the intruders cannot brute force every stolen password - each password would take a ridiculous amount of time and computing power to break.
LastPass has more information on the breach here.
This isn't my information, it is from Lastpass. So if it is flawed like you say, then it is their problem.
โJun-25-2015 03:19 PM
bwanshoom wrote:
This is relatively old news at this point, but the reasoning in your post behind changing your master password is flawed. The master password is used to protect the encryption key for the password vault - where all your various passwords are stored. If the intruders got a copy of the vaults, changing your master password after the fact will have no affect. That will only create a new encrypted copy of the vault stored with LastPass - the old encrypted copy using the master password whose hash was stolen remains unchanged. It would remain vulnerable to offline brute force attack. But because each password has a unique salt (a bit of random information added to a password to defeat dictionary attacks) added to it the intruders cannot brute force every stolen password - each password would take a ridiculous amount of time and computing power to break.
LastPass has more information on the breach here.
โJun-25-2015 03:09 PM
SCR wrote:tvman44 wrote:
I have been trying to find a good password program that is local, on my computer or a jump drive.
The safest password vault is the one located directly behind your eyes.
Otherwise RoboForm works pretty well.
โJun-25-2015 03:01 PM
tvman44 wrote:
I have been trying to find a good password program that is local, on my computer or a jump drive.
โJun-25-2015 02:52 PM
โJun-25-2015 02:29 PM
โJun-25-2015 01:39 PM
โJun-25-2015 10:57 AM
โJun-25-2015 10:49 AM