mastodon.world is one of the many independent Mastodon servers you can use to participate in the fediverse.
Generic Mastodon server for anyone to use.

Server stats:

8.2K
active users

#PasswordManager

18 posts15 participants1 post today

Google Password Manager Ahora es una Aplicación Independiente en la Play Store

Google ha lanzado una aplicación independiente para su gestor de contraseñas en la Play Store, un movimiento que busca facilitar el acceso y la gestión de contraseñas en Android, independizándolo del navegador Chrome y de los servicios de Google Play (Acceso a la App desde Android).

El gestor de contraseñas de Google, una herramienta integrada en Chrome y en los servicios de Google Play, ahora se encuentra disponible como una aplicación independiente en la Play Store. Esta decisión de Google tiene como objetivo mejorar la experiencia de usuario, permitiendo un acceso más rápido y directo a todas las contraseñas, direcciones de correo y datos de tarjetas de crédito guardados en la cuenta de Google.

Aunque la funcionalidad principal del gestor de contraseñas no cambia, su disponibilidad como una aplicación dedicada simplifica el proceso de inicio de sesión y de administración de credenciales en los dispositivos Android.

La nueva aplicación, que ya puede ser descargada por los usuarios, elimina la necesidad de navegar a través de los menús de la configuración del sistema o del navegador para acceder a los datos de inicio de sesión. La interfaz de la aplicación es limpia e intuitiva, y está organizada para que los usuarios puedan encontrar y gestionar sus contraseñas de manera sencilla.

Google ha estado trabajando para unificar su ecosistema de productos y servicios, y el lanzamiento del gestor de contraseñas como una aplicación independiente es otro paso en esa dirección.

⚠️ Major password manager extensions—1Password, Bitwarden, LastPass, Enpass, iCloud Passwords & LogMeOnce—are vulnerable to clickjacking attacks that risk exposing login credentials & sensitive data. 🔐🕵️‍♂️

Bitwarden patched the flaw ✅; others lag behind. Users should update extensions & disable autofill until fixes. 🛡️🔄

@1password
@bitwarden

techspot.com/news/109149-lastp

I går var jeg i en købmandsbutik langt ude på landet på Mors. Ved kassen foran mig stod en ældre dame ( nej hun var faktisk gammel!) som ikke kunne betale det hundefoder hun havde i kurven, fordi hun ikke kunne huske PIN koden til hendes Dankort. Ekspeditienten kunne hjælpe: de havde simpelthen en liste med PIN koder fra deres trofaste gamle medborgere!
#dankort #passwords #passwordmanager

Yikes, some of the responses by these companies to a vulnerability in their password managers would inspire me to never do business with them. 1Password has two replies:

"As noted in our bug bounty brief: "Clickjacking the autofill action for the personal identification item has also already been reported in previous programs, and will not be reconsidered at this time."

"Nobody is denying that there is the potential for clickjacking. We understand that the presence of XSS vulnerabilities can potentially increase the impact of clickjacking attempts, this is a general security principle that applies universally and is not unique to our application. Our stance is that if a user visits a vulnerable website, that is outside of our control, just like if a user visits a malicious website or has a compromised device."

Bitwarden and some others are working on solutions to this potential problem, instead of happily taking the money of others without trying to patch potentially dangerous vulnerabilities like 1Password.

Even though I don't browse dangerous sites, I have uninstalled the Bitwarden extension and will use the desktop version, as malicious actors can be clever and hijack a legit site due to some weird flaw.

socket.dev/blog/password-manag

reddit.com/r/ProtonPass/commen

I usually don't spend a lot of time on Reddit, or especially forwarding/posting Reddit stuff, but this one caught my eye.

If you are a 1Password user, there is a currently known vulnerability, that they are refusing to fix, and other Password Managers have already addressed.

More info on the exploit here: marektoth.com/blog/dom-based-e

The comments contain links to test your current password manager & more.

Replied in thread

@nekodojo @jik : thank you for sharing your thoughts!

To add to them: a TOTP app is a stupid password manager. Most people do not understand that it more than doubles your risk of account lockout.

And that is apart from other risks excellently described Conor Gilsenan (@conorgil ) et al. in usenix.org/conference/usenixse (and github.com/blues-lab/totp-app-).

Twilio Authy being one of the worst (echoed by bleepingcomputer.com/news/secu).

And, like SMS, TOTP apps do not protect against non-dumb AitM * attacks (Microsoft's endlessly repeated 99.9% reduction in change of getting hacked when using 2FA, extremely irritates me - considering techcommunity.microsoft.com/bl from 2019 - and, although an advertisement, IMO a good article: bleepingcomputer.com/news/secu).

* Attacker/Adversary in the Middle.

IMO, the nr. 1 advantage of passkeys is the "built in" domain name check - which makes phishing attacks a *lot* harder (albeit not impossible: infosec.exchange/@ErikvanStrat).

The fact that stealing private keys is next to impossible, does not protect against device or browser compromise: after logging in using your ultra-secure MFA, your authentication gets replaced by a 1FA session cookie (or something similar). Most websites do NOT bind such cookies to the client's IP-address, making them prime "copytheft" targets (labs.beazley.security/articles).

Also, for an attacker with access to your credentials record on a webserver, indeed there's no point in "copystealing" your passkey's/YubiKey's public key. However, the attacker can REPLACE your pubkey with theirs, or add their own. Those pubkeys are NOT wrapped in a certificate (signed by a *trustworthy* third party) proving who generated the keypair. And there are no revocation facilities in case your device gets stolen.

Furthermore, passkey downgrade-to-weaker-auth attacks pose a threat BECAUSE you MAY lose them (or access to them).

For example, on Android, if you want to change (or remove) your "sync passprase", Google tells you to tap "Delete data" (see the screenshot below). Adam Langley's (@agl ) pathetic joke "This might delete some data from your devices" [1] actually means that "you'll lose all of your passkeys" (on all of your synced Android devices; contrary to popular belief, Android passkeys are cloud based).

[1] seclists.org/fulldisclosure/20

A decent password manager that checks for the domain name (i.e. using AutoFill on Android or iOS/iPadOS) is not a bad idea after all.

Online auth is HARD. Let's not lie that it can be made simple.

#Weak2FA#TOTP#SMS2FA

Twoday, in addition to starting the switch from Proton to Tuta, I have deleted a bunch of useless accounts, and sent some deletion requests to some that choose not to make it easy. Now I need to find a new password manager and cloud storage provider. It seems that pCloud is the only good one (?) without any US-connections, but apparently there are plans to compromise the so far very good Swiss privacy laws. I hate this. Modern Life Is Rubbish. #Privacy #Email #CloudStorage #PasswordManager