Not a 1Password user, but if I've understood correctly, having a local vault means your passwords will not be synced across multiple devices, no? 🧐
you do lose forms autofill since they deactivated the share sheet function.
You can also sync those with a cloud service (or your own mechanism like nextcloud) - but if you (or your family members) need comfort an don't mind the bucks - go for the subscriptionNot a 1Password user, but if I've understood correctly, having a local vault means your passwords will not be synced across multiple devices, no? 🧐
If you tell how to check, I can lol
Right-click in the 1Password 6 icon and select “Get Info.” Next to “Kind” it’ll tell you what type of Application it is - Intel or Universal. If it is Intel, the app will run under Rosetta. If it’s Universal it can run natively on both M1 and Intel.If you tell how to check, I can lol
Aha. Yep -- It's Intel. So looking like Rosetta on borrowed time!Right-click in the 1Password 6 icon and select “Get Info.” Next to “Kind” it’ll tell you what type of Application it is - Intel or Universal. If it is Intel, the app will run under Rosetta. If it’s Universal it can run natively on both M1 and Intel.
Not a 1Password user, but if I've understood correctly, having a local vault means your passwords will not be synced across multiple devices, no? 🧐
And just because they have never been hacked doesn't mean that they will NOT be hacked.
I mean, PasswordState is one of those places that has "never been hacked". Oh, wait:
![]()
Passwordstate users warned to 'reset all passwords' after attackers plant malicious update | TechCrunch
More than 29,000 organizations, including governments, use the password manager.techcrunch.com
Every single user of those services had to go around and change all of the passwords they had held in those services. That's a LOT. And personally, with having been part of an organization maintained a HIPAA-compliant database that was breached and exposed, that's a LOT of changes and disclosure that has to be done, causing that company's users to have to not only change passwords, but get fraud monitoring services due to the extent of the damage caused by that "hack".
Never say Never.. heh; Never Say Never Again. - James Bond.
Yes, this. Thanks. My Mac is basically being the server for WLAN server sync. If that is still there, then I'm okay. I'll give it a shot on my iPad and see what I get.
BL.
To be fair your original post didn’t make mention of the share sheet. It’s wording implied the app didn’t work at all.
You do know if the passwordstate “hack” was replicated the same way against 1Password it would have impacted you and your WLAN server choice? 😀 The client software was compromised by way of a rogue software update. You would have received that same compromised update even with 1Password.com syncing turned off.
with 1p7 you can sync with wifi-syncNot a 1Password user, but if I've understood correctly, having a local vault means your passwords will not be synced across multiple devices, no? 🧐
with 1p7 you can sync with wifi-sync
I actually would have been protected against any hack, because I would control my vault, not it being in possession of any SaaS. I have never used 1Password.com syncing, nor would I ever intend to. Because of that, anyone malicious would have to get physical hands on my Mac or the drives I have that contain my vault. That is the difference, because 1Password 8 no longer has the WLAN Sync functionality to keep a standalone vault. I would be forced to store my vaults on 1Password's servers. If someone hacks that service and gets physical hands on my vault, I'm compromised. That goes for any SaaS. Passwords, and any PCI or PII data is not worth that risk, especially if the service isn't subject to audit.
I work at a place that hosts and stores credit card (PCI) data. Because of the standards for that industry, we must be subject to multiple security audits regarding that data. No such controls exist on these services, which includes no liability in case those services are compromised. That is a huge liability to any company, and any client of that company (and that includes the government, who are also clients of that company).
Like I said in another thread, the feature of having convenience should never be at the cost the security of your data.
BL.
How would you be protected against any hack if the 1Password local client on your mac storing and managing your passwords had been compromised (as was the case with the PasswordState example you handpicked)?
It doesn't matter if your vault is stored locally or in the cloud. If the client you use is hacked, the moment you decrypt your entire vault with the master password you're in trouble if your 1Password client has been compromised.
One would have to have physical contact of my Mac to get to 1Password. They would have to break into my house or wherever I am and physically take my Mac. That is completely different than a service being available 24/7 and susceptible to hacking any any and all times of the day. Not only would the attack vector be different, but the methods of attacking would be completely different.
The client isn't what would be hacked. It would be the server or the service. The clients have nothing to do with it at that point. In fact, the clients wouldn't matter at all if the server/Service is compromised.
BL.
You still don't get it. I am NOT sending anything into any cloud service. My vault is My Mac. The only things that connect to it are my iPhone and iPad, as the Mac is running the WLAN server feature from 1Password. Again, none of my passwords or my vault are stored in any cloud service; rogue, trusted, or otherwise.Nope. If your 1Password client is compromised, your passwords will be sent to a rogue server in the cloud without you even knowing it. Hackers won't be respecting your WLAN only client setting in their modified version.![]()
The client IS WHAT WAS HACKED in the PasswordState explain you provided. They delivered a compromised software update to PasswordState servers, and that software update was then delivered to end users via the software update mechanism in PasswordState.
It’s interesting you mention the standards of your industry for storing credit card data and being subject to audits. They don’t seem to do much, there are innumerable occasions when credit card data has been stolen. 🤷♂️I actually would have been protected against any hack, because I would control my vault, not it being in possession of any SaaS. I have never used 1Password.com syncing, nor would I ever intend to. Because of that, anyone malicious would have to get physical hands on my Mac or the drives I have that contain my vault. That is the difference, because 1Password 8 no longer has the WLAN Sync functionality to keep a standalone vault. I would be forced to store my vaults on 1Password's servers. If someone hacks that service and gets physical hands on my vault, I'm compromised. That goes for any SaaS. Passwords, and any PCI or PII data is not worth that risk, especially if the service isn't subject to audit.
I work at a place that hosts and stores credit card (PCI) data. Because of the standards for that industry, we must be subject to multiple security audits regarding that data. No such controls exist on these services, which includes no liability in case those services are compromised. That is a huge liability to any company, and any client of that company (and that includes the government, who are also clients of that company).
Like I said in another thread, the feature of having convenience should never be at the cost the security of your data.
BL.
You still don't get it. I am NOT sending anything into any cloud service. My vault is My Mac. The only things that connect to it are my iPhone and iPad, as the Mac is running the WLAN server feature from 1Password. Again, none of my passwords or my vault are stored in any cloud service; rogue, trusted, or otherwise.
Again, you miss the point. The client is still connecting to an external server or outside service. I am doing neither of the sort. My vaults NEVER LEAVE MY MAC.
BL.
It’s interesting you mention the standards of your industry for storing credit card data and being subject to audits. They don’t seem to do much, there are innumerable occasions when credit card data has been stolen. 🤷♂️
You are missing the point. Your client will be connecting to a remote server if it is compromised in the way the PasswordState "hack" occurred. It will be sending your data to a remote server, or servers plural. That's the entire point of delivering a compromised client payload. The hackers modify the client to take control of your data. They don't care whether your vault is cloned in the cloud, or stored only on your Mac, once you've decrypted your data with the master password they can control that data with a hacked client.
Keeping the data local on your Mac is only good until a) your Mac is hacked or exploited in some way, or b) the client you use to interact with that data is compromised in some way.
You cited a terrible example to demonstrate your WLAN cause. That's the point. I'll help you out some more: run a little Google search on "Lastpass hacked". There's a slightly better example for you to use.
You still do not get it. My client is not connecting to a remote server. My Client and My server are MY MAC. They are local. The client is ON THE SERVER. No data for that leaves My Mac. I open 1Password, open the vault on my Mac, add my entries, save the data on my Mac, and close the program on my Mac.
I think you're missing the point of what @dumastudetto is saying:You still do not get it. My client is not connecting to a remote server. My Client and My server are MY MAC. They are local. The client is ON THE SERVER. No data for that leaves My Mac. I open 1Password, open the vault on my Mac, add my entries, save the data on my Mac, and close the program on my Mac.
There is no remote server involved. This is similar to opening Microsoft Word on your Mac or PC, creating a document, saving it to your local disk on your Mac or PC, and you're done. Tell me: what remote server would you be connecting to for that?
The answer: there is no remote server.
The only clients that would be connecting to my Mac would be my iPhone and my iPad, only for the duration of WLAN server being turned on. Once that sync is done, WLAN server is turned off, and I am done. For that, any malicious client would have to be on my physical network at the least, or directly connected to my Mac for that sync to be done. If that isn't done, there is no access to my vault. And that is all barring any controls I have on my network (read: firewalls) to deny all access to my network, and allow only certain services into and out of my network.
Hence what I said before: they would have to have physical hands on my mac to exploit my Mac to get to my vault. If they don't have that, they aren't getting to it. But I would have bigger issues if they got physical hands on
No, it is a good example as well. The issue here is that the service had a problem that caused their users to have to update their passwords. Any service that has that issue is a problem. I would rather have control over my passwords, PCI, and PII data entered into my vaults than hand over that control to a service that could be compromised.
BL.
The hacked 1Password client is modified in such a way that it connects to a remote server controlled by the hackers.
It is terrifying that you do not understand this fundamental point while giving out advice to others.
I think you're missing the point of what @dumastudetto is saying:
You update 1Password 7 to the latest version. The version you update to has been compromised either enroute, or 1P's servers that host the update have been compromised and are pushing out a hacked version of the client. Once you've installed the update, regardless of your settings, a backdoor has been installed and the minute you unlock your vault, all the items inside are silently uploaded to a 3rd party server.
This type of security breach wouldn't require physical access to your computer, as you would be the one installing the compromised update.