i don't store my credit card/banking information electronically. I do carry my credit cards with me (but not my check book) and yes there's risks and I attempt to minimize that risk. I don't carry all the credits I own, I only keep one or two and they're generally close to me so the likelihood of getting them stolen is small (at least I hope)My question would be, how do you store that type of info now? Do you keep your credit cards on you? Do you carry a check book? Then you are at risk. Do you use the postal service?
1 Password uses strong encryption. See their website, which has links to reviews of the product:
http://agilewebsolutions.com/products/1Password
OK, it uses strong encryption. But, are the company trustful?
maflynn said:i don't store my credit card/banking information electronically. I do carry my credit cards with me (but not my check book) and yes there's risks and I attempt to minimize that risk. I don't carry all the credits I own, I only keep one or two and they're generally close to me so the likelihood of getting them stolen is small (at least I hope)
redwarrior said:Encryption on your computer is safer than having hard copies, IMO.
guklein said:Is it safe to keep data like credit card and bank account there?
If you do any shopping with credit cards anywhere or banking online whatsoever, then 1Password should be the least of your worries. 1Password keeps your CC info safer than some store that swipes your card or some online store that processes a transaction with it.While the risk may be small financially, there is considerable work and stress untangling the mess if my bank or credit card information is stolen. I've seen the nightmare it causes and I want to all that I can to avoid that
If you do any shopping with credit cards anywhere or banking online whatsoever, then 1Password should be the least of your worries. 1Password keeps your CC info safer than some store that swipes your card or some online store that processes a transaction with it.
If there were any security issues with it the word would be out so fast and the issue fixed just as fast.
Is anyone actively analyzing the KeePassX codebase to proactively expose vulnerabilities? If not then it's really kind of a moot point that it's open, and your argument supporting it for that reason becomes meaningless.I have no doubt that whatever vulnerability would be patched quickly, but since the code is closed finding vulnerabilities proactively is extremely difficult. KeePassX doesn't have this limitation.
Is anyone actively analyzing the KeePassX codebase to proactively expose vulnerabilities. If not then it's really kind of a moot point that it's open, and your argument supporting it for that reason becomes meaningless.
So what! 1Password gets updates all the time from its development community too, and part of that is work on improvements to security. You claim that KeePass is better/safer because the code is open and subject to proactive analysis for vulnerabilities. Who outside the Keepass development community is doing that analysis? If no one is doing it, then there it has no advantage to 1Password for that reason.0.4.3 was released on March 7, 2010. The framework which it is based upon (KeePass) released version 2.10 on March 5, 2010 and has been in active development by the community for years.
So what! 1Password gets updates all the time from its development community too.
You claim that KeePass is better/safer because the code is open and subject to proactive analysis for vulnerabilities. Who outside the Keepass development community is doing that analysis? If no one is doing it, then there it has no advantage to 1Password for that reason.
It's one thing to say something is open to analysis, but if no one cares enough to actually do it independently, then it doesn't matter that it's open for that purpose in the first place. Advantage: 0
You can't make a baby in a month by getting nine women pregnant.Yes, but the difference is in the size of the development community. Admittedly I don't know how many people work at Agile, but I'm guessing it's less than the thousands that have looked at KeePass(X) and even less than the hundreds who have been with the project from the start. More knowledgable eyes looking for bugs tends to create a more secure product.
See above for the "size of the development community" argument.
You're comparing a profit-driven and profit-motivated business (Agile) to an open source project with the goal of creating a secure program to store passwords? Ok. Your "independent analysis" fails miserably in that respect. I am not saying that Agile is out to get you and that they're building in backdoors to steal anyone's information, but it'd be nice to have the benefit of hundreds (perhaps thousands) of independent developers verify it.
You can't make a baby in a month by getting nine women pregnant.
I run a 12+ person development team working on mission critical R&D tools at a major aerospace company. Having a larger development community is not necessary an advantage. Often when teams get too large they start to have all kinds of problems that hinder successful development.
You can argue all day that code open to analysis is better/safer, but it means nothing if it isn't independent analysis. So what if the Keepass community can analyze its own code. They will be naturally biased and will make assumptions that an independent reviewer won't.
That would be like me claiming my code doesn't need Q&A because I already did that myself. It just doesn't work that way.
We use the expression "Can't make a baby in a month ..." when people who don't understand better want to accelerate or improve a project by throwing more people at it. It was my response to your claim things are better because the development community is hundreds strong.Not sure what you're getting at here. Clarify?
How does having a larger team improve security?Of course it doesn't always translate into an advantage, but in the case of security review it does.
Not to mention, these guys update their software ALL THE TIME.. Awesome app.
How does having a larger team improve security?
When I say independent review, I mean someone not connected with the project.
I'm not questioning Keepass, the project, or its developers. All I'm saying is the only real and balanced way to analyze code for security vulnerabilities is that it is done independently of the project and it's members. Otherwise, bias (unintentional as it may be) and assumptions made through familiarity potentially corrupt the results. This is a matter of rigor, not trust or competence.