Stories
Slash Boxes
Comments

SoylentNews is people

posted by on Tuesday January 24 2017, @05:03AM   Printer-friendly
from the 1000-words-is-worth-a-picture dept.

As a software engineer and long time LastPass user, I've always been an advocate of password managers. With data breaches becoming more and more common these days, it's critical that we take steps to protect ourselves online. However, over the past year LastPass has made some decisions that have made me question their motives and ultimately has recently caused them to lose my business.

Last year LastPass introduced a new redesign of their vault in which they added nice pretty logos of all the sites in your vault.

This got me wondering, if LastPass is encrypting all of my data before it goes to their servers (like they claim) how are they able to show these logos to me when rendering the vault webpage? I turned to my browser's developer tools to find out.

The rest of the story relies fairly heavily on graphics to show what the author is doing. Worth a read to see the process in tracking down the problem.


Original Submission

 
This discussion has been archived. No new comments can be posted.
Display Options Threshold/Breakthrough Mark All as Read Mark All as Unread
The Fine Print: The following comments are owned by whoever posted them. We are not responsible for them in any way.
  • (Score: 3, Interesting) by esperto123 on Tuesday January 24 2017, @10:48AM

    by esperto123 (4303) on Tuesday January 24 2017, @10:48AM (#458041)

    I also use keepass with the .kbd file in a cloud service (spideroak in this case) and a .key file on the local device, this way even if someone can access my cloud account it would be extremely hard to break the encryption.
    Other alternative is spidekoak password manager encrypter, which according to them is zero-knowledge and easier to use than the keepass/cloud service combination.

    Starting Score:    1  point
    Moderation   +1  
       Interesting=1, Total=1
    Extra 'Interesting' Modifier   0  
    Karma-Bonus Modifier   +1  

    Total Score:   3  
  • (Score: 0) by Anonymous Coward on Tuesday January 24 2017, @11:25PM

    by Anonymous Coward on Tuesday January 24 2017, @11:25PM (#458319)

    You can also use a counter based (OATH HOTP standard) authenticator with the otpkeyprov plugin in keepass. Then keep the recovery key on a couple thumb drives in a safe somewhere just in case something goes wrong with the setup.