this post was submitted on 06 Sep 2023
70 points (100.0% liked)

Technology

37353 readers
298 users here now

Rumors, happenings, and innovations in the technology sphere. If it's technological news or discussion of technology, it probably belongs here.

Subcommunities on Beehaw:


This community's icon was made by Aaron Schneider, under the CC-BY-NC-SA 4.0 license.

founded 2 years ago
MODERATORS
 

In November 2022, the password manager service LastPass disclosed a breach in which hackers stole password vaults containing both encrypted and plaintext data for more than 25 million users. Since then, a steady trickle of six-figure cryptocurrency heists targeting security-conscious people throughout the tech industry has led some security experts to conclude that crooks likely have succeeded at cracking open some of the stolen LastPass vaults.

you are viewing a single comment's thread
view the rest of the comments
[–] [email protected] 6 points 10 months ago (6 children)

KeePass has its vulnerabilities too. The good thing though is that it is not networked so one has to break into your device or your backups to even start an attack.

[–] [email protected] 6 points 10 months ago (5 children)

Exactly. Every password manager has its vulnerabilities, so there's always a trade-off between different security measures. The lack of networking is KeePass's big draw.

[–] [email protected] 4 points 10 months ago* (last edited 10 months ago) (4 children)

The big issue I have is syncing. Do you happen to know if there are any differencing tools keepass.

I like to have only various subsets of my data on some devices and accounts. So way to partition, difference, and merge would be nice.

[–] [email protected] 1 points 10 months ago (1 children)

You'd need to have different files for different subsets, then, and use some sort of cloud storage for sync

[–] [email protected] 1 points 10 months ago* (last edited 10 months ago)

No need for cloud storage, just use a peer to peer data replication product like Syncthing. Fully encrypted, data is only stored on the end devices, entirely controlled by the user.

load more comments (2 replies)
load more comments (2 replies)
load more comments (2 replies)