Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

My local, managed-by-me KeyPass database has never had a security incident or even come close.

That's all I'm gonna say about that.



not yet.

But there's actually a lot of surface attack area for those open source tools as well. If you're able to sneak into the supply chain and replace the _client_ with a modified, malicious version, you can make it send the master password AND the database to a remote server. No need to compromise the server. This is true for most commercial password managers as well: but I'd expect the security to be tighter there. No random maintainer should get access to the release page.

My idea was like this: * Use KeepassX built from source * Use Dropbox to sync the kdb files (always encrypted) * Use a firewall to prevent any network connection to keepassx; this way even a compromised client cannot connect and send the data somewhere else. * When updating KeepassX, always build from an older git commit; I assumed that in ~15-20 days if there's a fuckup on git source, it will be announced.

BUT: it was hard. Bitwarden just works better. I still build it from source on desktop computers, though, and take a look at the website before updating, just to stay sure. (And I think IOS app process will make it harder to submit malware there anyway).


Lots of good suggestions here.

> you can make it send the master password AND the database to a remote server.

I wish it was easier to completely restrict an executable from ever touching the network. Like, point and click.

Now, there’s ways around that (open the browser and a long hyperlink of secrets), but yeesh, it should be easier to block the direct links.



>If you're able to sneak into the supply chain and replace the _client_ with a modified, malicious version, you can make it send the master password AND the database to a remote server

I've heard about this as a possibility for as long as I can remember, but while this remains a possibility, major online providers get hacked every year or so.


Major providers are more valuable targets because the potential loot is bigger.

I wonder if major providers are also more likely to detect intrusions. This is the part that concerns me about non-cloud alternatives. For example, if KeePass got compromised, how long would it take for us to learn about it?

(Although I don’t have much faith left in LastPass, and I don’t have strong reasons to think that 1Password is better since as an outsider to their operations I know just about as much about either.)


And yet the impact is low since the databases are strongly encrypted. A client compromise would be devastating, instead.


Would you actually know?


By that logic you also wouldn't know if your keys/password database stored by Lastpass/others (in the browser extension or app) is stolen, it's all just local data.


Isn't that what this whole thread is about, it being discovered that LastPass had an actual breach?




Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: