Why do people trust password managers?
I imagine nation state-supported malicious hackers are targeting them. Everything else is getting breached and leaked these days, there’s a non-trivial possibility these will too.
I just use KeePassXC instead, and periodically ‘sync’ the database across my workstations and laptop. And by ‘sync’, I mean manually export the database and rsync it around to my workstations and laptop and re-import it on each. But given how infrequently I create new web accounts, this isn’t a major hassle. It works fine, I don’t need some centralized service for this.
Because it'll only offer passwords for sites that match the entry, defaulting (most often) to being the same domain, if you come across a phish then it won't offer the site at all. This is fairly similar to the "trust on first use" that SSH gives you, which some folk were wishing might have existed for SSL certificates the other day.
Unfortunately some sites require you to "log in with your ... credentials" rather than doing SSO. But you TOFU those, too, once you've verified they're legit.
Happy Bitwarden user here: the software is all Free, but I trust the company to run their servers securely more than I trust myself to, so I pay them to do so. Extra benefit: if I lose all my infrastructure, I haven't lost my passwords.
There's no such thing as perfect security, but as a security-minded person I see nothing there to concern me simply because the data is stored in a company's S3 environment vs on Dropbox vs on my local disk. Presuming that the software itself has not been maliciously modified to leak the key, then regardless of where the data is stored it either requires breaking the encryption or finding the password that generated the key in order to access the data. My local disk is no more secure in that aspect, except that I may have the illusion of control. Availability is also an aspect of data security (in the CIA triangle) and a cloud provider that properly replicates and manages backups of data is more reliable than my local disk in this aspect and a fair trade-off for data I likely want to synchronize across systems and devices (phone and laptop, at minimum).
Why should you trust a password manager?
For me, it's pretty simple. I don't use social login, and I use unique usernames (most of the time) and passwords (every time) for hundreds of sites I've created accounts on over the years. This is because breaches /will/ happen, and password re-use is probably the single largest issue for user security, including for "power users" like myself. A password manager of /some kind/ is basically required to have unique passwords across hundreds to thousands of sites. Certainly, there's more to it, and you need to figure out your own threat model and trust constraints, and I can't solve that for you. But as far as I am concerned, if I have a reasonable assurance that the right algorithms are used and those algorithms are correctly implemented by the password manager software, I see no reason to distrust it.
gpg "make-key"
mkdir -p ~/.passwordstore/foo/bar
echo "hunter2\nusername: hunter@hunter.com\n" \ | gpg "sign" > ~/.passwordstore/foo/bar/entry.gpg
gpg "decrypt" ~/.passwordstore/foo/bar/entry.gpg
tree ~/.passwordstore/
--
Basically, "passwordstore" is pretty trustworthy, open source, reasonably inspectable, and kindof automates the above steps in a decent CLI (and has a nice git integration for syncing).
There's another plugin: "password-tomb" which basically adds in a "zip -r tomb.zip ~/.passwordstore && unzip tomb.zip" with some extra encryption blobbing around things.
I'm nudging towards wanting all that "junk" stored on a mostly-offline (or read-only USB, or doing something with fetching encrypted secrets over the network), and trying to figure out in a temporary ram-disk to try and reduce exposure-time.
The reason it feels pretty good for me is that it degrades gracefully and can be used with standard tooling. It's totally possible to have a script which does: "foreach password => unlock && dump && append-to-pdf && qr-code => print.pdf" and print that out at intervals, so it's got great survivability characteristics. It allows me to self-host even completely offline using git. If I have the GPG key, I can recover the passwords w/o any tooling. Really it's kindof my ideal situation for trustworthiness.
https://www.schneier.com/blog/archives/2019/02/on_the_securi...
https://www.schneier.com/blog/archives/2019/06/risks_of_pass...
Now, none of the above necessarily makes password managers safe. The increasing legal scrutiny that password manager providers face, means that they will tend to be relatively safe, but they're still a single point of failure. At some point you need to decide what trust level you want though, security is a lot about tradeoffs, and ease of access is always at odds with keeping things safe.
My most secure accounts use their own individual, memorable, secure password.
I do fear that even if my self-hosted password manager is secure today, there's nothing stopping a malicious update to that software which could exfiltrate all of my passwords.
* Layman who reuses passwords unless a techie friend convinces them to use a PW manager.
* HN user who either uses a SAAS password manager or sets up their own system to solve the issue of syncing a password store across devices.
* Those who actually have state level secrets or living under an oppressive regime and thereby don't trust even the networks they connect to.
Just an observation; not making any statements. But if I were to make one, it's to know your own threat level and find the security vs convenience compromise that works for you, and educate your friends & family.
I personally just use the Safari browser together with Apple's Keychain.
I use enpass, and am in charge of my own syncing and storing in the datastore of my choice. I personally prefer this model.
If one of those web services is compromised, the other accounts and credentials stay unaffected.
And humans on the other hand have maybe 2 or 3 passwords based on some imaginitive sense of "how secure and trustworthy" the website is...only to realize later that their paypal password ain't that secure, and that now all other "secured" accounts are compromised, too.
I mean, BreachCompilation and Collection No1-6 have shown us not only the passwords to accounts, but the patterns specific people use once their passwords have been compromised and what they add to their patterns when they are forced to change their passwords after a breach.
And let's just leave it with humans are not good at remembering special characters, and they do like counting a lot.
I share the git repos between different machines using my own servers. All remote mirrors are synced over SSH using git-remote-crypt[2], which additionally encrypts all remotely stored files - including the metadata (e.g. paths and file names of the files) of the remote git repo itself.
On mobile I like to torture myself and enter the passwords manually.
I definitely wouldn't trust any SaaS password manager.
[1] https://www.passwordstore.org/ [2] https://spwhitton.name/tech/code/git-remote-gcrypt/
If you have an application that you trust (be it track record, inspection or known-good controls), and that application happens to also be a password manager, then the trust in the manager itself should be fine. If, however, you use a third party service, i.e. something managed by a company that holds your data, that is a different topic because you're talking about trusting a company.
A password manager can be KeePass on your local FDE storage medium. A password manager can also be a web app hosted elsewhere. It can also be both. You can even mix it up and have the storage medium be remote storage in stead of local storage.
If you currently have a file called "passwords.txt" stored in a public S3 bucket, that would be your 'own method' but would that really be good? Or perhaps you have an RSA-wrapped AES-encrypted spreadsheet you store locally with no back-ups, also possible. Too many unknown parameters.
At the end of the day the solution that gets you strong unique passwords per entity in a way that you don't lose access to personally but also don't give unwanted access to towards third parties is better than not having a solution at all. (this includes physical paper password books, those are 'unhackable' after all)
Managing them in the cloud is the easiest way to keep the passwords with me. I trust those services because I am lazy, my own solution would just be obscure and self-managed solutions would probably give me headaches in multi-device or multi-user scenarios (I share many passwords with my wife).
With a payed subscription SaaS solution I can expect that the provider has a huge interest in keeping my data safe from criminals. It's their biggest selling point.
I have recently started putting some low-value (social media) passwords in the firefox password store, just for autofill convenience. Does anyone know if there are some massive landmines to this sort of thing?
The database is encrypted, so if someone were to hack them, they would at least have some (hopefully major) issues decrypting it all.
I would not trust something in the cloud.
But at one point you have to trust something, learn to let go or do without.
I'm too lazy to work on the "memory palace" thing, but it might be the best solution: portable, secure, free.
https://media.cultura.com/media/catalog/product/cache/1/imag...
A passsword manager (PM) makes random passwords easier. A PM keeps me from re-using passwords. A PM gives me a relatively secure place to store vital information, and it also lets me use it on multiple computers and stays in sync.
Do I trust them implicitly with everything? No. That would be foolish. It's a calculated risk, and the benefits outweigh the risks.
And you probably don't even need to trust a password manager with every password you have, you can keep just the random 200+ logins you probably have for weird websites. And keep banking, emailing and the other important stuff away from it. Also, you don't even need to have your password manager store the actual passwords there, you could "pepper" what is stored so you transform it after you paste it to the website.
Otherwise, no, I wouldn't trust a commercial password manager with automatic sync on to someone else's servers. I also don't trust the browser enough to put an extension in it that has the keys to my password database.
It's a tradeoff. I get a nice level of security, but it's not 100% seamless. Without autofill, I often need to start up the password manager, search for a site, copy and paste password into the browser. (I just had to do this to log into HN.)
For some sites, I let the browser also save the password, which I treat as just a cache of low-value passwords. And the encrypted password manager database gets occasionally synched into gdrive, so I can also access it from my smartphone using the appropriate app.
Been doing this for 5+ years at this point, and it works for me... can't even remember what on earth I did before. Probably passwords in tiny plain text files.
Convenience vs security.
The balance i struck with a self hosted instance of bitwarden has been good for me.
I run it.
It’s open source
It’s third party audited
Company has a good history generating trust
Did I mention I host it?
One would trust a password manager as a result of their obvious social media login getting all their friends spammed.
One would trust a password manager as a result of someone finding the post it documenting their bank credentials.
One would trust a password manager as a result of missing out on an opportunity for forgetting a login and having to wait an ungodly number of hours due to an inconveniently timed DNS upgrade leading to a long delay in the password rest email's arrival.
Nobody trusts password managers because of something essential to the password manager or the concept thereof, we trust password managers because we have experience or can imagine experiencing the fallout of our own credential mismanagement in the face of increasingly complex security demands resulting not always directly from increasingly sophisticated attacks. It reduces our cognitive load slightly and focuses otherwise diffuse anxieties.
[1]: https://lock.cmpxchg8b.com/passmgrs.html [2]: https://hacks.mozilla.org/2018/11/firefox-sync-privacy/
Password manager anxiety is a thing. Maybe you're worried that you'll lose the vault, or that it will be hacked. I didn't like the idea that I couldn't log into something without it. The problem is, without a password manager, my passwords sucked. I had a core secret that I sort of salted for each site.
So my reason for using a password manager (KeePassXC with SyncThing, if you're interested) is that it's better than the alternative.
Taking out of the equation that maybe google can read your passwords... from the endpoint/laptop point of view itself, is it any less secure than those 3rd party password managers? My understanding is that, for example on OSX, they store them in the OS keychain anyway, right? What's so wrong with that?
This allows me to securely copy paste the first part, then securely type the second part. Also, even if someone has my password database and a full password or two, they still wouldn’t trivially have all the other ones.
(1) I believe in the fundamental goodness of humans.
(2) I believe that keepassxc being a Free Software, was made with honest intentions by competent people.
(3) That human society should be organized on the principle of mutual aid, and that involves trusting (initially at least) those who say they intend to aid you.
Most average users are willing to trade the upside of the SaaS apps (sync is easy and pretty secure) for the downside (have to trust a third party like 1Password, that they won't send you a malicious client that slurps your master password).
We're technical, so we can use Password Store[0] and avoid the downside of the SaaS programs (have to trust a third party) while still having sync. If you're pissing off entities who might conceivably blackmail or hack 1Password, Password Store is the bare minimum.
[0] I'm not addressing that Password Store doesn't encrypt the sites it has logins for, just the fact that it doesn't require entering your master password in a web page.
A very reasonable option is ccrypt, which gives you dirt-simple command-line password-based encryption for text files (or any other files). It's available for most linux distros, cygwin, homebrew, etc.
Personally I use my own homemade text editor with built-in AES-256 password-based encryption. It's about as trustworthy as I am, and a tad more friendly than ccrypt.
In either case cloud storage is easy; for example a github repo is nice (preferably a private one) because you have backups automatically in case you mess up, which I have done. I don't use my phone for critical work in the first place (can't trust 'em) so I'm not worried about integrating that.
Not sure it’s the best way to do it, security wise, but it’s what I found works for me in a security/convenience trade-off
Though I would never recommend a service-based one, just use something like KeePass and sync that file.
IMO if we're talking about security you should ask other questions. How much can you trust a device after Jonathan Brossard's Rakshasa paper? What about evidence-based trust and bunnie's Precursor? Would having a password manager app on Precursor be actually more secure taking into account that your stuff is going to be decrypted on a less protected device?
I count on their cloud to host my data but might as well switch to the hosted version. If you have multiple devices with the app installed you should be able to have at least one device that still holds all your data should bitwarden ever go down.
Even if the product is secure. Even if it actually does end-to-end encryption. Even if it is open-source and you can audit code.
Even if all of the above are met, somebody still can upload a malicious package or commit malicious change that gets propagated to you.
It is probably fine to use password managers for stuff where damage would be limited (accounts to low value things).
But for stuff that matters I know of no better system than a piece of paper, a tamper evident envelope and a logbook.
Access your data for all websites
Read and modify privacy settings
Access browser tabs
Access browser activity
No thanks, I just use a pi-hole, something that I own and control.I am less concerned with the password managers, as I actually pay for those.
Remember if it’s free, you are the product.
I personally wrote my own https://almondpass.com/
I have implemented a syncing solution but registrations are not public yet.
That's why I use a password manager. The small annoyance it is to keep the db file synced is well worth it.
My isp does store them in plaintext :), the support person read my password to me while fixing an issue with the account(you can guess which language their webpage is in).
This way you don't store your full password in your password manager.
However for important accounts, I use 2FA with yubikeys or codes that are not stored on 1password. Just in case.
Especially for non-tech family members and friends. Its either an easy password manager or using the same password everywhere.
The comment section is full of false dichotomy of no PM vs vulnerable ones like SaaS based ones.
There is no more convenient "safe handling of passwords on the web" than a password manager, in my experience. That said, if you know of a better, but at least as safe, way, then please share.
Insert shameless Bitwarden plug here.
https://www.passwordstore.org/
You can read it and make sure you are comfortable with it.
Trust local password managers working on local files that are synced via Google Drive/Dropbox.
Do you trust your backup software placing your encrypted data at the feet of NSA (cloud storage)?
password safe isnt on the web.
I use a local password manager, KeePass: https://keepass.info/
It's probably the only good middle ground for keeping track of passwords, SSH certificates and other data: a password protected local database that i can move to USB sticks or SD cards for backups, or keep inside of an encrypted 7z archive, or a VeraCrypt file if i cared that much.
You not only get to have a simple way to use it (it's just a file that's compatible with the software, like SQLite is also really easy to use), but also get to pick where/how you want to store that data in an easy to understand manner.
Right now it's great for all of my vaguely relevant access credentials, from numerous e-mail accounts, to online shopping accounts, to even access data for online platforms, hosting solutions, servers etc. with as many separate databases as i choose.
In my eyes, it's also really great for letting you randomly generate secure passwords - i don't know almost any of the non-essential service passwords and because it's so easy to generate new ones for accounts, i'm not plagued by "password-reuse-itis" either. When coupled with 2FA, it's pretty decent from a security standpoint.
It also has a clearly understandable attack surface - infected password manager binaries, stealing passwords when in memory or malware on the system (like keyloggers, clipboard watchers), someone stealing the database AND the master password, asking me nicely for it with a 5$ wrench: https://xkcd.com/538/
For why people use web based ones which aren't so clearly understood or dependable (your list of risks would be a lot longer with those), i'm not sure. It's probably just convenience.
Nope.
For most people, the biggest threats that come from passwords are: data breaches (compromising reused passwords), human memory limits (you can't remember high entropy passwords easily, in general), and an ever-increasing demand for both high quality passwords and unique passwords.
If you look at these threats from the perspective of most people, a password manager works well! You don't have to worry about breaches, memory limits, or even password generation. You can just generate-and-store random passwords for every site that meets their requirements, and walk away.
But that doesn't mean that that's the end of threat modeling. Other risks that you're probably thinking of are the security of the cryptosystem involved, bugs in the application, and fear of backdoors. These are valid threats, but for the vast majority of people, they're mitigated by other reasons, or are non-factors.
To give an example: a password manager that most cryptographers would laugh at is writing your passwords on a sticky note. Yes, that's bad from a cryptography standpoint, but if you make a new unique password for each site, and each one is sufficiently long and complex, you've actually mitigated the threats involved with password reuse, memory, and complexity. But you've also made it impossible to steal from a cryptography backdoor, and the barrier-to-compromise involves your physical space being violated. But again, if you ask a cryptographer, or even most security professionals, this is a bad idea, because you're still risking physical compromise if...you work in an office, have kids, don't guard your home, etc.
A lot of people dislike 1Password's decision to store passwords in cloud storage. This is a real risk, because a cryptosystem backdoor would create danger. If you use a password storage app with strong cryptography, and store the passwords in a completely benign location (e.g., a network share, some random cloud storage provider), you can decouple the cryptography from the storage, which brings some safety.
Now, back briefly to your question: why would people trust a completely SaaS password storage provider? Well, for me, it's that I know that Google Project Zero exists, and they do a lot of research into third party apps. I sleep easier at night knowing that lots of smart people are invested in trying to break 1Password's cryptography, and have thus-far been unsuccessful. Sure, a government might have a secret backdoor that I don't know about. But in my threat model, the government could just come arrest me for violating a non-disclosure agreement I've signed, and hit me with a wrench.
In summary: for the vast majority of people, the threats that come from "memorizing passwords" are mitigated by password managers. Heck, you even say you have your "own methods for safe handling of passwords". I would argue that you have a password manager, it's just more DIY than something off-the-shelf, and that's fine!