this post was submitted on 27 Oct 2023
1301 points (98.0% liked)

Memes

45731 readers
789 users here now

Rules:

  1. Be civil and nice.
  2. Try not to excessively repost, as a rule of thumb, wait at least 2 months to do it if you have to.

founded 5 years ago
MODERATORS
 
you are viewing a single comment's thread
view the rest of the comments
[–] Paradachshund@lemmy.today 17 points 1 year ago (6 children)

Everyone talks about password managers these days, but isn't that telling the hackers exactly where to go to get all your passwords? Seems like a much higher chance of catastrophic failure to me if you have a single point of entry.

[–] moonmeow@lemmy.ml 18 points 1 year ago (2 children)

Yes that's definitely a concern to keep in mind.

The problem is that if someone doesn't use a password manager they're morenlikely to reuse weak ones.

Using a password manager is a better path, as long as there is awareness on how to keep it secured.

[–] Browning@lemmings.world 5 points 1 year ago (3 children)

I use the same password for every site, but I put the name of the site at the end of the password.
For example:
NotmypassB3ta.
NotmypassGoogle.
NotnypassLemmy. Etc.
I figure it might stop the most lazy of attacks.

[–] lud@lemm.ee 8 points 1 year ago

It will stop a lot of attacks but if someone figures it out, you're screwed. So I don't recommend it.

But years ago I used the same password everywhere except with a few differences due to different requirements (like special characters) and the weakest passwords I used got leaked on pastebin (or similar). And sure enough many accounts got compromised, not a huge deal and I didn't lose anything I cared about.

The interesting part is that no-one seemed to try the leaked password + 1234 or a capital letter in the beginning.

[–] Droechai@lemm.ee 1 points 1 year ago (1 children)

I had something similar but ran into issues with sites requiring specific symbols, disallowing certain symbols and limiting lengths or similar

[–] wewbull@iusearchlinux.fyi 3 points 1 year ago

That annoys me so much. Especially when the randomly generated line noise password I'm using doesn't happen to include one of the three punctuation characters they need to be "secure".

[–] moonmeow@lemmy.ml 1 points 1 year ago

That sounds not ya I'm sure it stops a , as long as the actual password is also strong. IMO there's still some vulnerability. If someone finds out your password and notices thepattern 'pass+Site', then they mighttryyon another site.

Also why it's a good idea to have a few emails yo use across multiple sites.

[–] Lunachocken@iusearchlinux.fyi 1 points 1 year ago

I can't wait till passkeys are predominant

[–] Hexarei@programming.dev 11 points 1 year ago (1 children)

Only if you're using a third-party password manager, rather than something stored/managed locally.

[–] Paradachshund@lemmy.today 3 points 1 year ago (3 children)

Is that hard to do? And how do you access it remotely from your phone for instance?

[–] itslilith@lemmy.blahaj.zone 3 points 1 year ago (2 children)

I'm using KeepassXC, which has a browser integration that is quite good, and a local database. I synchronize it to my devices (using Syncthing, so it's p2p). The database is encrypted with a pretty good password, and a key file. the key file has never and will hopefully never be transported via internet. The database is synced to a server I've rented as well, but never the key.

It's not perfect, but potential attackers would need to

a) have access to one of my daily devices (the server won't be enough, since they need the key file)

b) crack my password

Obviously, for someone dedicated this is still quite reasonable, but then again, I don't think that's my threat profile. The chance of getting caught up in a larger breach is a basically zero once you use your own solution, and it should be reasonably safe, if you don't do anything stupid.

[–] Paradachshund@lemmy.today 2 points 1 year ago (1 children)

Oof, I barely understand most of that so definitely over my head I think. It sounds like you've made a good system for yourself though, nice job!

[–] itslilith@lemmy.blahaj.zone 1 points 1 year ago (1 children)

I could've phrased some things simpler, haha

But yeah, I'm quite happy with it. KeepassXC is a local password manager, and Syncthing lets you synchronize files and folders across devices, and it uses Peer-to-Peer (p2p) technology, so unlike something like Google drive you're not relying on some could server, it just transfers between your devices directly.

It's not plug and play to install, but not that hard either. But still, I can see that commercial options are a lot easier for many people c:

[–] Paradachshund@lemmy.today 1 points 1 year ago

Syncthing sounds like a nice app in general. I might need to look into that.

[–] Piemanding@sh.itjust.works 2 points 1 year ago (1 children)

They would also need to know what you are using in the first place. Since fewer people do this it does make it a bit safer.

[–] itslilith@lemmy.blahaj.zone 1 points 1 year ago

Exactly. As long as you don't have someone really determined or some three letter agency after you, it's going to be pretty safe

[–] Hexarei@programming.dev 1 points 1 year ago

I store mine in a selfhosted Nextcloud instance, KeepassDX on Android supports accessing it directly. Works perfectly and even provides an autofill service for Android. Very easy and very convenient.

[–] Rodeo@lemmy.ca 1 points 1 year ago (3 children)

That's the neat part, you don't.

Security and convenience are opposites. You have to decide if you want a local-only manager that is more secure, a sync service like syncthing that you can set up yourself, or a third-party cloud app like LastPass (which has been compromised at least once that I know of).

Personally I just do all my email and banking on my desktop at home, and it's actually only inconvenienced me a few times over the years.

[–] itslilith@lemmy.blahaj.zone 1 points 1 year ago

the only thing that gets less secure is more devices potentially compromised, but the act of syncing shouldn't make it more dangerous by itself (if using a key file or a master password too long to be reasonably cracked), right?

or am I missing something?

[–] Paradachshund@lemmy.today 1 points 1 year ago (1 children)

Sticking to desktop only wouldn't be realistic for me unfortunately. Sounds like the solutions aren't quite there yet for an average user.

[–] 0xD@infosec.pub 2 points 1 year ago* (last edited 1 year ago) (1 children)

They are, just use a normal one (I use bitwarden) that you can access from everywhere and protect it with 2FA.

The goal is to have varied, secure passwords across everything.

[–] Paradachshund@lemmy.today 1 points 1 year ago

I've heard a lot of people mention that one so I think I'll check it out. Thanks for recommendation.

[–] Hexarei@programming.dev 1 points 1 year ago

I store mine in a selfhosted Nextcloud instance accessible only via a Nebula overlay network (alternative to tailscale) and it's both convenient and secure.

[–] Fiivemacs@lemmy.ca 9 points 1 year ago (1 children)

I just use a password manager for my password managers password manager. 2fa on all of em. Takes me forever to login

[–] Paradachshund@lemmy.today 8 points 1 year ago (1 children)

I dunno, doesn't sound like enough layers to me. We can go deeper

[–] CurlyMoustache@lemmy.world 1 points 1 year ago (1 children)
[–] Honytawk@lemmy.zip 1 points 1 year ago (1 children)
[–] gornius@lemmy.world 7 points 1 year ago* (last edited 1 year ago)

The main argument to use password managers to prevent password leaks to all of your services (that you use with the same login/email). You can't trust any service to store your password securely, therefore you should use different ones everywhere.

Using a password manager gives you the convenience of using one, strong password that's being used very securely, and mitigating risk of password leaks spreading further.

If you abstract it that way, it by no means eliminates the risk of someone breaking into your database, but makes it harder and from a single entry point, instead of any service that uses your password.

Plus many of those password managers give you an option to use YubiKey for additional security.

Oh and also you won't ever need to press "forgot password" ever again due to the arbitrary requirements that your password doesn't pass, so you modify it slightly so it would.

[–] wewbull@iusearchlinux.fyi 2 points 1 year ago

The greatest threat is password databases being leaked from the services you use. Not your phone or laptop. Physical access to a device is a pretty high security bar.

If you don't let people make notes of passwords they use one crap memorable password for everything. Let them store it, and advise them to do it somewhere encrypted. Ta da! Password manager.

[–] SchizoDenji@lemm.ee 1 points 1 year ago (2 children)

Absolutely. LastPass and others have already had data breaches.

[–] Nintendo@lemmy.world 5 points 1 year ago

you literally described the exact use case for password managers. in security, it's not about IF you get breached, it's WHEN and how to recover from it. this includes cloud password managers. you can hack all the data you want from these companies but any reputable password manager company will employ a Zero Trust model where your data is stored encrypted. they can completely upend the company and destroy their whole infrastructure, but they still can't do shit unless they have your master pass or a time machine.