Become a MacRumors Supporter for $50/year with no ads, ability to filter front page stories, and private forums.

Alpha Centauri

macrumors 65816
Oct 13, 2020
1,252
987
Yeah, I think it makes sense to store things separate. You wouldn’t put your keys in your filing cabinet.
Analogies can be skewed to any point really. Do you keep every single house, garage, letter box key separate or on a key bundle? End of the day it's whatever system works best consistently, easily updatable and without making things complicated for each user. We'll have to agree to disagree on this one as it's a case of whatever works best for each person.
 

svenmany

macrumors demi-god
Jun 19, 2011
2,053
1,331
Imo it logically makes more sense to store that sorta stuff in Notes rather than a password manger.

I would not trust sensitive credentials to applications which are not dedicated to securing them. If I had casual information that I just wanted to keep away from prying eyes, then encrypted notes would be good enough.

Sometimes I need to copy a password when sitting in a coffee shop, where someone might be looking over my shoulder. I would never expose a note in such an environment. With 1Password, anything sensitive is not displayed, but I can still copy it. That feature is super important to me.
 
  • Like
Reactions: chrfr and xpxp2002

MallardDuck

macrumors 68000
Jul 21, 2014
1,585
2,918
I work in cybersecurity, and have no concerns about using 1P8, and honestly it's by far the best option overall. Their encryption solution is such that it is impossible for them to decrypt the keychain. Just never use the in-browser option (plug in is ok), and your creds never leave your machine. With the secret key (aka cryptographic salt), even if an attacker gets your master passphrase, they still won't be able to decrypt it.

Now, you do have to use a browser to do the initial setup - so I did that with a fresh, clean installed browser on a known good machine (actually a brand new VM). But then again I also wear tinfoil hats for a living, so it was probably a bit overkill.

It goes without saying, to never, ever, login from a device you don't control (not just 1P - but any site).
 

svenmany

macrumors demi-god
Jun 19, 2011
2,053
1,331
Just never use the in-browser option (plug in is ok)

Not sure what you mean by that. What is the "in-browser option"? What is the "plug in"?

Are you saying it's ok to use the browser extension but to make sure some particular setting is turned off?
 

ThrowerGB

macrumors regular
Jun 11, 2014
237
81
With mSecure, you can store the vault locally, or online in either iCloud, Dropbox, or the mSecure cloud. Synchronization across devices works in each case.
 

MallardDuck

macrumors 68000
Jul 21, 2014
1,585
2,918
Not sure what you mean by that. What is the "in-browser option"? What is the "plug in"?

Are you saying it's ok to use the browser extension but to make sure some particular setting is turned off?
Using the plugin is fine, as that's all local to your machine, but don't go to 1password.com, login there, and use the web-interface itself to access your vault. In that case, then your creds are transmitted to the 1password servers.
 

xpxp2002

macrumors 65816
May 3, 2016
1,155
2,727
Using the plugin is fine, as that's all local to your machine, but don't go to 1password.com, login there, and use the web-interface itself to access your vault. In that case, then your creds are transmitted to the 1password servers.
That's interesting. Does simply logging into my.1password.com cause that?

I feel like it would since you have to use your secret key + password to log in there. Which sucks, because billing and some vault permissions can only be managed through the web.
 

svenmany

macrumors demi-god
Jun 19, 2011
2,053
1,331
Using the plugin is fine, as that's all local to your machine, but don't go to 1password.com, login there, and use the web-interface itself to access your vault. In that case, then your creds are transmitted to the 1password servers.

They claim that your credentials are not transmitted to the servers. The JavaScript that is running in your browser is a full application that does all the encryption work locally.

Do you know that to be false?
 
  • Like
Reactions: gilby101

seek3r

macrumors 68020
Aug 16, 2010
2,297
3,280
1Password is deprecating its browser extension in July. I can't upgrade to version 8 because I am using an older OS. Nor do I like their subscription model. This means I must migrate my passwords to a different program.

I guess I don't need a browser extension. I could cut and paste the password into a site when I need to. Tedious, of course.
It isn't that I don't mind paying for a product. It's that I want to keep my password vault local and secure on my computer, not broadcast over the internet to the cloud or some company's server. I realize I have some work ahead of me, but to me the privacy is more important the convenience of a browser extension.

Would anyone care to make a list of possible password managers that keep my vault local?
There's KeepassX and KeepassXC, but I don't know anything about them or any alternatives.
I'm in the same boat, though because I wanted to keep my local vaults not OS version issues so I'm stuck on 7, planning to switch to bitwarden
 

seek3r

macrumors 68020
Aug 16, 2010
2,297
3,280
I work in cybersecurity, and have no concerns about using 1P8, and honestly it's by far the best option overall. Their encryption solution is such that it is impossible for them to decrypt the keychain. Just never use the in-browser option (plug in is ok), and your creds never leave your machine. With the secret key (aka cryptographic salt), even if an attacker gets your master passphrase, they still won't be able to decrypt it.

Now, you do have to use a browser to do the initial setup - so I did that with a fresh, clean installed browser on a known good machine (actually a brand new VM). But then again I also wear tinfoil hats for a living, so it was probably a bit overkill.

It goes without saying, to never, ever, login from a device you don't control (not just 1P - but any site).
I use completely separate storage for vaults for work, personal, and shared and scope what devices have access to what based on what they need. I can't do that with 8. That by itself represents a major downgrade in security posture for me to switch off 7 to 8
 

MallardDuck

macrumors 68000
Jul 21, 2014
1,585
2,918
That's interesting. Does simply logging into my.1password.com cause that?

I feel like it would since you have to use your secret key + password to log in there. Which sucks, because billing and some vault permissions can only be managed through the web.
Yup, and that's a design point I don't like.

It does have some protection, and times out the access after a period of time. But if your browser is compromised, it's a bad day.

So when I do have to do those things, I go back to a clean browser (I keep edge on my machine just for this kind of thing), with no plugins, locked down in private browsing, do the task I need to do, then wipe the cache and cookies.
 
  • Like
Reactions: xpxp2002

VineRider

macrumors 65816
May 24, 2018
1,344
1,155
This article would seem to indicate that the users password is never sent to 1Password servers as they use the Secure Remote Password protocol. This article states that the password is never sent to 1Password.

 
  • Like
Reactions: kitKAC

MallardDuck

macrumors 68000
Jul 21, 2014
1,585
2,918
They claim that your credentials are not transmitted to the servers. The JavaScript that is running in your browser is a full application that does all the encryption work locally.

Do you know that to be false?

Yeah, I was too loose with my language there. Assuming that 1) it's the real site and not typosquatting, and 2) that your browser - and all the plugins - are secure, then that's true. But that's still is something I'd prefer to be able to do in the application itself versus a browser, as the latter is a much broader threat vector. Besides, other than actually administrating your account, there's very few reasons to ever do it.

From a security standpoint, how is 1P8 superior to those of us who store our vaults locally?

It's not superior, it's on par. My point was that 1P8 is superior to competitive products, as many of those lack key features for usability or have sub-par encryption schemes (e.g. many simply encrypt with the password and no secret key/salt). BTW, I presume here we're talking about true local vaults (wifi sync) and not dropbox - because the latter is the worst of all worlds (dropbox has access to the files), and that icloud sync is disabled, there's no cloud backup, or any other cloud copies of the local vault itself), etc.

Is there a theoretical risk if someone compromises the 1P servers and extracts copies of all the vaults? Yes, absolutely. It's greatly mitigated by the secret key, and as long as you use a strong passphrase (not password!) then brute force attacks are highly unlikely to result in cracking the vault given the current state of the art. If nothing else, you'd have time to take action.

So, if, someday, all the vaults are stolen, what would I do? First, I'd immediately change my master passphrase for all the accounts. Second, I'd go change my email password, since that's the most critical one as it's used for all other password resets. Then I probably would change all my bank passwords, but mostly from a belt, suspenders, boxers, briefs, raincoat, trenchcoat from a better safe than sorry perspective. Last, I'd take a deep breath and stop - and think - about the real risk, and decide what, if any, other ones I needed to change, and when. I probably would change them all at some point, just to be safe against some future advance in cryptanalysis (e.g. quantum computing).

So my decision (and that of many large, sophisticated, and highly regulated companies that have approved 1P cloud for internal use) is that the ease of use and convenience of cloud syncing and the other modern features, is worth the tradeoff against manual syncing with a local vault and -possibly- someday have to change all my passwords (over time, and not in a panic like some of the competing cloud products that do have access to the contents).

Now talk to me about 1P8 using Electron, I'm not happy at all :).
 
Last edited:

svenmany

macrumors demi-god
Jun 19, 2011
2,053
1,331
I would like to find a reference where 1Password talks about their web interface. I recall seeing their discussion of this in the past. Short of that, I don't see any significant concerns using their website.

The only real concern is that a browser can be compromised. They do talk about their checks that the browser is a trusted one and signed by the developer, but I can't tell if they are talking about when their extension is running in the browser or when you're using a browser to access their website.

But, no matter what, they do not send credentials to their servers. That would border on insanity.
 

turbineseaplane

macrumors G5
Mar 19, 2008
14,982
32,092
I wish Apple would get more serious about Passwords.

Break it into its own App .. make a Windows App version also

…and put the service into the Apple One bundle

That would get me off 1password
 
  • Like
Reactions: seek3r

svenmany

macrumors demi-god
Jun 19, 2011
2,053
1,331
I seem to recall them discussing the relative strengths of the encryption libraries used in their web application versus their desktop application. Jeepers, I wish I could find that.
 

MallardDuck

macrumors 68000
Jul 21, 2014
1,585
2,918
  • Like
Reactions: VineRider

VineRider

macrumors 65816
May 24, 2018
1,344
1,155
I seem to recall them discussing the relative strengths of the encryption libraries used in their web application versus their desktop application. Jeepers, I wish I could find that.
Does this not cover the issue? Between the article below and their security whitepaper, it states that the password and secret key are never transmitted to their servers. Admittedly, I am not a security expert so maybe you all are referencing something I am not familiar with.

 

MallardDuck

macrumors 68000
Jul 21, 2014
1,585
2,918
I wish Apple would get more serious about Passwords.

Break it into its own App .. make a Windows App version also

…and put the service into the Apple One bundle

That would get me off 1password

The big problem with relying on apple's keychain is that the weakest link is the PIN code on your phone. I use 1P to generate a robust appleid password, and it's completely undermined by that really poor design decision.
 

MallardDuck

macrumors 68000
Jul 21, 2014
1,585
2,918
Does this not cover the issue? Between the article below and their security whitepaper, it states that the password and secret key are never transmitted to their servers. Admittedly, I am not a security expert so maybe you all are referencing something I am not familiar with.


Right, it's not transmitted to the servers, but it is entered into a web page.

That web page could be fake (like all the O365 cred phishing pages out there), or a malicious browser plugin could harvest all the information transmitted to it, or the browser itself could have a vulnerability, and so on. It vastly increases the threat surface versus an application connecting to a known good authenticated API. I tolerate it because I have to, but would never use the actual web client (not the browser plugin - the website itself) for regular use. Use the app - it's actually easier, and it's more secure.

And never, ever, sign into 1password.com from a machine that you don't own or control for any reason other than disaster recovery (e.g. house burns down with all your devices inside and you have to use your brother's machine and emergency kit stored in your safe deposit box to recover access to your account).
 

VineRider

macrumors 65816
May 24, 2018
1,344
1,155
Right, it's not transmitted to the servers, but it is entered into a web page.

That web page could be fake (like all the O365 cred phishing pages out there), or a malicious browser plugin could harvest all the information transmitted to it, or the browser itself could have a vulnerability, and so on. It vastly increases the threat surface versus an application connecting to a known good authenticated API. I tolerate it because I have to, but would never use the actual web client (not the browser plugin - the website itself) for regular use. Use the app - it's actually easier, and it's more secure.

And never, ever, sign into 1password.com from a machine that you don't own or control for any reason other than disaster recovery (e.g. house burns down with all your devices inside and you have to use your brother's machine and emergency kit stored in your safe deposit box to recover access to your account).
I see what you are getting at now. I was not considering a fake web page....that is a good point.
 
  • Like
Reactions: MallardDuck

ifxf

macrumors 6502
Jun 7, 2011
401
661
A major issue, for me, with Apple keychain you can’t export your passwords for backup unless you have access to a Mac. With just ios devices you are entirely dependent upon icloud which has not been reliable in the past.
 
Register on MacRumors! This sidebar will go away, and you'll see fewer ads.