In my testing, it's stored in the browser itself. After logging in using Chrome for example, if I go to Safari the Secret Key field is empty.
I can get rid of the Secret Key field in Chrome by clearing my cookies for the site.
Interesting
In my testing, it's stored in the browser itself. After logging in using Chrome for example, if I go to Safari the Secret Key field is empty.
I can get rid of the Secret Key field in Chrome by clearing my cookies for the site.
InterestingThen either that security researcher is lying or 1P are lying
![]()
If you lose your Secret Key, you won’t be able to sign in to your account on new devices. Fortunately, you’re not expected to remember it. It’s safely stored in 1Password on your authorized devices. A copy of your Secret Key is also kept in the following places:
These copies of your Secret key will help you sign in more easily and offer some protection if you lose a device. But you’ll still always want to keep extra copies for yourself.
- your web browser, if you sign in to 1Password.com
- your iCloud keychain, if you use 1Password on a Mac, iPhone or iPad and have iCloud Drive enabled in Settings
- your Android device backup, if you use 1Password for Android and have backup enabled in Settings
From the page you mentioned here is the wording:
So I read that as:
1) It’s safely stored in 1Password on your authorized devices - this means it's stored in the 1Password app itself.
2) your web browser, if you sign in to 1Password.com - this means it's stored in that browser only.
3) your iCloud keychain, if you use 1Password on a Mac, iPhone or iPad and have iCloud Drive enabled in Settings - this one confuses me.....as I'm not sure where technically it's stored and where/how it gets used.
-Kevin
this wins the Internet for today.
"The future"
"Trust the cloud"
"Who needs big local storage when everything can be stored in the cloud?"
"In a few years, we'll need almost no local storage because we'll have unlimited storage in the cloud"
Etc.
$36.00 a year is unreasonable to you?No local vault storage possibility + forced subscription model = good bye greedy company. Subscription model for a pwd app is simply ridiculous anyway. Time to start searching for a reasonable alternative.. They are a bunch of liars presenting this as the best option for 99.9% of users. Worse PR ever.
Trust the cloud until it's cloudy...
$36.00 a year is unreasonable to you?
In my opinion, three dollars a month for a quality app that has regular updates and staff that respond promptly to questions and concerns is worth it.
Do you expect the developers to keep working and updating the app for life for free? Don't they deserve some renumeration?
Do you work for free?
The key to creating secure passphrases using this method is that you need to select the words in a truly random fashion (e.g. by rolling dice like in Diceware). If you select the words yourself, you probably get a heavy bias for specific sets of words that can be exploited by password crackers. Remember that everybody tries to pick what they consider obscure.I still like the xkcd method. However I use several languages instead of just English. I had my Twitter and Netflix accounts attacked several times. After going to xkcd, it has never happened again.
I know some think it's no longer secure but it all depends on what words you're using. The more obscure the better.
No local vault storage possibility + forced subscription model = good bye greedy company. Subscription model for a pwd app is simply ridiculous anyway. Time to start searching for a reasonable alternative.. They are a bunch of liars presenting this as the best option for 99.9% of users. Worse PR ever.
They only told EVERYONE about this a year and a half a go. ON HERE!
Also, nobody is forcing you to do anything. You always have a choice.
No, it's not an open-source app and never has been. Which is one of the reasons I find all this sudden attention amusing -- people who were perfectly OK trusting a non-open-source app with all their most sensitive/secure data up until last week are now asking if the company making that app are suddenly evil and doing nefarious things. It's like: if AgileBits are evil, that boat's already sailed, man. The time to insist on 100% transparency in your app was before you started using it X years ago.How do know it's not transmitted, is the app open source?
It's a matter of trust in the company.
[...]AgileBits[...]
YES! This is why not only AgileBits but many other password managers including KeePass offer or at least refer to cloud syncing: because it's convenient as heck and doesn't depend on the security chops of the cloud service in question, but rather on the math of encryption....IF your database is stolen, you should be totally fine. It's designed so that if the files are stolen, they are essentially useless.
Actually, AgileBits claim to have something no other password manager has, on their online accounts: Two-Secret Key DerivationBut it would be prudent to reset passwords when you can to be doubly sure. Because if someone has your database, the only thing that protects it is your master passphrase.
Well, if they really claim that no other password manager has this, they are wrong. You can easily replicate this functionality in Keepass by using key files in addition to the password.Actually, AgileBits claim to have something no other password manager has, on their online accounts: Two-Secret Key Derivation
https://krebsonsecurity.com/2015/06/password-manager-lastpass-warns-of-breach/ has the details. They didn't get the files, but they got account info like the password hints. And here are 2 interesting comments about lastpass's 2FA:
Hans
June 17, 2015 at 4:28 am
Keep in mind that 2-factor only protects against unauthorized access of the LP infrastructure (website etc). In case your vault is stolen and they are able to crack your master password, the 2-factor will not help you.
AFAIK, your vault is not encrypted with the 2nd factor. At least, I cannot reason how they would do this, as the 2nd factor is a changing number.
LP claims that there is no evidence that the vaults have been copied. (but a very good hacker is able to remove his traces…right? ), so you (and me) will be ok….
Matt![]()
June 18, 2015 at 12:11 am
+1
So many lastpass users (of which I am one for my low to medium security passwords) do not understand this. And lastpass marketing doesn’t really do a lot to clear this up. The only protection on your encrypted password list is your passphrase. The second factor just controls whether lastpass gives you the encrypted list.
If the attackers get your encrypted list (which it doesn’t look like they did in this case), then the second factor provides zero extra protection.
My bad...the subscription option is the only option for Windows. The stand-alone purchase still exists for Mac OS.The subscription is one of two choices offered. One can use 1Password without purchasing a subscription. The older business option is still in place, as confirmed by 1Password.
My bad...it is the Windows version that is subscription only. Since this a forum primarily of Mac users, please disregard my post.I think you are mistaken. I have the non-subscription model and it was available from here.
https://agilebits.com/store
I'm sceptical. It's an Indian company and we don't know anything about their privacy laws. There's no information about the dev team either.Curious - how are you syncing between the desktop and mobile versions of Enpass? Don't you have to use a cloud service?
Also the Enpass apps look interesting.....it's just the pricing that worries me. How can a company survive when all they are getting from a single user is $9.99 and that user gets a lifetime license?!?
I totally agree with you. If we live in fear we should not use smartphones, text messages, emails, have credit cards, use an electronic identification ("eID") card, biometric passports. Should I remind our lovely users that even hospitals store sensitive data about its citizens? The street lights and traffic lights are connected to the internet. Even the satellite that makes sure you can make a phone call and text messages is connected to the internet. The point is, if you want to be 100% save and secure you would have to go about 500 years back into the past. The power grid that delivers electricity is also connected to the internet. Let's pray we will not be disconnected.The dont; we should all just not use web banking, dont use backups of our devices, etc. Going back to old way on going into the bank or ATM every time you need your balance, and when you drop your phone losing everything, is nowhere near convenient to do these days in people's busy lives; nor the way people depend on their data being accessible at all times.
There has to be SOME level of realization of risk in the discussion with everything on the internet without a tinfoil hat on that "omg it will be stolen I dont trust anyone" At some level EVERY person here is trusting some company via the internet, even Macrumors!
FYI, I would NEVER use a password manager for a bank, my investment account, or email to begin with no matter how/where it is backed up. There's a HUGE difference between say your Macrumors/twitter/facebook login info where at most you lose access, and a bank/investment where someone can get at your real money and bankrupt you and make you homeless.