Become a MacRumors Supporter for $50/year with no ads, ability to filter front page stories, and private forums.
no, i get it - but i also think your paranoia on this particular issue is unjustified.



[doublepost=1499933629][/doublepost]

if agileBits goes away, you export to csv, switch to keepass. so far, they haven't, they have committed to maintaining the ability for existing local sync users to do local sync.

I don't have a link to the web plugin -> 1password vulnerability, but it was about 1-2 years ago (i.e., well into the life of 1password 5 or 6 or whatever and affected all previous versions.

essentially malware running on your machine could intercept traffic between 1password and the web plugin that was sent in the clear, or something like that.

running ancient versions of security software is not a solution if you disagree with the future direction of the product. accept the direction and continue to keep up to date, or jump ship to another product. software regularly has flaws, and sticking with really old versions of software involved in keeping your passwords secure is a big risk.

at least, if you do so, be SURE to follow the change logs to ensure that you're aware of any vulnerabilities discovered that impact your version of the software.

If you're not going to keep up to date with this based on this future policy direction for new customers only, I'd recommend Keepass.


do you expect GM or Ford or whatever to upgrade the engine in your car whenever some new tech comes out, for free?

I am not sure what your point is talking about a vulnerability 1 or 2 years ago has to do with present discussion. That was fixed long ago.
You still don't see my point about being able to use nonsubscription 1password even if there is no Agilebit.
 
Okay, so for those who won't stay with 1Password, where are you going?

Like I said earlier, I'd switch to KeePass today if the iOS apps worked better. I should just be able to hit the share button in my browser, click on the KeePass iOS app, select the login I want, and have it auto load that login info into my browser. Using copy/paste is inconvenient and insecure, using a browser built into the KeePass app is inconvenient and insecure.

I'm checking out enpass (installed via the Mac App store). It's GUI is similar to 1Password and it accepted the native 1Password export file with almost 100% perfection. Secure Notes didn't transfer as "Secure Notes" and were tagged as regular "Login," but that's a simple fix of dragging them from "All Items" to "Secure Notes." So far, no real problems.
 
  • Like
Reactions: tangfish and Quu
I don't care that they push users towards cloud vaults (I store my vault in Dropbox, anyway), but I DO care about the push to subscriptions...


Please speak for yourself. You do not mind this or that, but there must remain options for everyone the way we paid for these apps and the ways they sucked us into using them. I expect more from the upcoming upgrades, not less.

Im not paying for additional subscription and I want my ability to sync locally, Im not putting my passwords on anyone elses server. OPTIONS MUST REMAIN.

Otherwise, give us our money back and I will switch to another app that still has the features of the original 1P.
 
  • Like
Reactions: al404
You understand that JavaScript can do the vault decryption locally on your machine, without your master password ever being sent to 1Password, yeah?

Yes, I completely understand that your password is never given to 1Passwords servers. The vault (still encrypted) is sent to the users browser and then client side Javascript is run in your browser to decrypt the vault using your password and vault key.

My issue the entire time from the first moment this discussion started is that hackers can simply take the vaults (while encrypted) and begin to brute force them. Just like they do with all other stolen/leaked databases that have your passwords hashed by bcrypt.

The difference is instead of getting a single piece of login information they have a gold mine of login information. Break one vault and you could get hundreds of logins for a persons entire web footprint. So many logins that it is unfeasible someone would even change them all in the event of a breach at 1Password became public.

The other issue is that if 1Passwords servers are breached it is possible for a malicious attacker to MITM you accessing your vault on the 1Password website. Changing the javascript that is served to users so that once you input your Password and Vault Key the malicious code sends those to an attacker. At that point they can just login as you and unlock your vault.

Essentially sticking your vault on 1Password servers is a terrible idea. It is literally putting all your eggs in one basket. I would much rather keep my vault on my own computer where it's safe. Concentrating all our vaults in one central repository is like parking a truck full of cooked steaks next to a lion enclosure.
 
1Password is probably the most trustworthy password manager for macOS, but I'll never trust them with storing my passwords online. I wouldn't mind paying for a subscription if they add proper support for self hosting on iOS.

If they remove local storage, my family and I are out. Apple's Keychain would work for passwords and that is free.

What other options remain?

I've been using eWallet for a very long time, over 10 years for sure. They went 256-bit encryption early on. It's easy to use. They have a MACOS client and iOS client and you can sync between them to keep both up to date. I don't trust other options, especially "cloud" solutions. 1Password is a major lightening rod for hackers. They are "security experts"? I think not. Security experts are very leery of the cloud and the extreme challenges of keeping data safe there.
 
  • Like
Reactions: al404
I use OneDrive. The cloud stuff doesn't scare me too much as I have 2FA on that and (barely) trust MS to be somewhat secure.

I have a feeling the "next version" will be a paid version.

Hi,

I am from Enpass team and firstly I want to thank you for showing interest in Enpass.

We never charge for an update and our next major update 'Enpass 6' will also be free. Now coming to your point "How can a company survive when all they are getting from a single user is $9.99 and that user gets a lifetime license?!?"
This forum post will give the reply.

Cheers!
 
Yes, I completely understand that your password is never given to 1Passwords servers. The vault (still encrypted) is sent to the users browser and then client side Javascript is run in your browser to decrypt the vault using your password and vault key.

My issue the entire time from the first moment this discussion started is that hackers can simply take the vaults (while encrypted) and begin to brute force them. Just like they do with all other stolen/leaked databases that have your passwords hashed by bcrypt.

The difference is instead of getting a single piece of login information they have a gold mine of login information. Break one vault and you could get hundreds of logins for a persons entire web footprint. So many logins that it is unfeasible someone would even change them all in the event of a breach at 1Password became public.

The other issue is that if 1Passwords servers are breached it is possible for a malicious attacker to MITM you accessing your vault on the 1Password website. Changing the javascript that is served to users so that once you input your Password and Vault Key the malicious code sends those to an attacker. At that point they can just login as you and unlock your vault.

Essentially sticking your vault on 1Password servers is a terrible idea. It is literally putting all your eggs in one basket. I would much rather keep my vault on my own computer where it's safe. Concentrating all our vaults in one central repository is like parking a truck full of cooked steaks next to a lion enclosure.

i'm not sure you're aware of the hash rate vs time to brute force the encryption we are dealing with here. due the to the rounds of encryption involved, a brute force on the password database will very, very slow. like... tens of thousands of times slower than brute forcing md5 or sha password hashes.

this is not the same as an md5 or SHA password file stolen from a web server password database.

man in the middle won't work without a forged ssl certificate.

you have some concerns, but the actual implementation of what you fear is not feasible.

it is FAR MORE LIKELY that your laptop is stolen, and/or someone (state sponsored) beats you with a lead pipe in a targeted attack. or you get a keylogger on your local machine

or the website you log into is MITM'd. or nuclear war breaks out, etc..
 
Last edited:
  • Like
Reactions: TheMacAvenger
This is the problem you see - this is all completely wrong - on so many levels.

First your assumption of where they store the vaults is wrong. Your assumption that a weak master password will compromise each vault object is wrong (1Password don't encrypt vault objects using just one password).

Finally - your solution of 'well, we'll just pick a free password manager, not caring where this company is based (enpass is built by a company in India for example - what are the laws regarding the Indian government forcing the creators of enpass to install a back door?) - so be very careful in your assumptions.

Hi,

I can understand your concern about your database's privacy and security. Actually, Enpass is an offline password manager which means we do not keep and have access to data of any customer. Its mentioned there on our website home page and in knowledge base here. So no question from government arises about the access to customers data. The government is far, even we do not have access to any customer's data.
You can use Enpass without any worry of data leakage even if your device is lost. For more details about please visit Enpass Security page.

Hope this clarifies your query!
 
i'm not sure you're aware of the hash rate vs time to brute force the encryption we are dealing with here. due the to the rounds of encryption involved, a brute force on the password database will very, very slow. like... tens of thousands of times slower than brute forcing md5 or sha password hashes.

this is not the same as an md5 or SHA password file stolen from a web server password database.

man in the middle won't work without a forged ssl certificate.

you have some concerns, but the actual implementation of what you fear is not feasible.

it is FAR MORE LIKELY that your laptop is stolen, and/or someone (state sponsored) beats you with a lead pipe in a targeted attack. or you get a keylogger on your local machine

or the website you log into is MITM'd. or nuclear war breaks out, etc..

I am not talking about a network based MITM attack. I'm talking about their server being breached and the javascript literally replaced by one that intercepts credentials for the attacker. 1Passwords server would be the one handing out the malicious attack code which would then retrieve and send the users password and secret key to attackers.

If the attackers have got the vaults, they've got access to 1Passwords infrastructure and could do anything. It wouldn't be the first time, and frankly a general website breach is probably easier, we've seen it many times all over the web.

And yes I'm aware that breaching encrypted vaults is more difficult than a simple password hash. But it all depends on how strong that secret vault key is and what 1Password mandates users input. Length, complexity etc - And again it won't mean anything if their webserver is breached and the Javascript replaced.
[doublepost=1499950349][/doublepost]
Hi,

I can understand your concern about your database's privacy and security. Actually, Enpass is an offline password manager which means we do not keep and have access to data of any customer. Its mentioned there on our website home page and in knowledge base here. So no question from government arises about the access to customers data. The government is far, even we do not have access to any customer's data.
You can use Enpass without any worry of data leakage even if your device is lost. For more details about please visit Enpass Security page.

Hope this clarifies your query!

Hello Vikram, thank you for joining the discussion here and clarifying some misconceptions about your company, it is greatly appreciated.
 
Last edited:
I am not talking about a network based MITM attack. I'm talking about their server being breached and the javascript literally replaced by one that intercepts credentials for the attacker. 1Passwords server would be the one handing out the malicious attack code which would then retrieve and send the users password and secret key to attackers.

If the attackers have got the vaults, they've got access to 1Passwords infrastructure and could do anything. It wouldn't be the first time, and frankly a general website breach is probably easier, we've seen it many times all over the web.

And yes I'm aware that breaching encrypted vaults is more difficult than a simple password hash. But it all depends on how strong that secret vault key is and what 1Password mandates users input. Length, complexity etc - And again it won't mean anything if their webserver is breached and the Javascript replaced.
[doublepost=1499950349][/doublepost]

Hello Vikram, thank you for joining the discussion here and clarifying some misconceptions about your company, it is greatly appreciated.

Gotcha. MITM javascript is a legit concern.

Solution: don't do that. Run the app.


edit:

Running the javascript web UI is totally independent of subscriptions and has always been a questionable idea.
 
Is it open source?

If not, if you're at that level of paranoia, no go.

Use Keepass instead.

closed source = what's to say the app isn't harvesting your passwords for the vendor?

Paranoia? Sure. But there has to be a level of trust somewhere. If you don't trust say, 1password to keep your data safe, why do you trust Enpass without access to the source?
 
  • Like
Reactions: AlexH
Is it open source?

If not, if you're at that level of paranoia, no go.

Use Keepass instead.

1Password isn't open source and I've been using that for years. Their money grubbing business tactics are why I won't use them, the security issues with their cloud vault are just a result of them trying to push people to a subscription they don't want or need.

enpass is free for desktop, paid on mobile with no subscription and no data touches their servers. You can verify that with network monitoring. Works great, looks great and they even have a Linux client which 1Password does not.
 
  • Like
Reactions: AlexH
1Password isn't open source and I've been using that for years. Their money grubbing business tactics are why I won't use them, the security issues with their cloud vault are just a result of them trying to push people to a subscription they don't want or need.

enpass is free for desktop, paid on mobile with no subscription and no data touches their servers. You can verify that with network monitoring. Works great, looks great and they even have a Linux client which 1Password does not.

Keep pushing that enpass.

Nothing is free. Nothing. Linux is a fraction of an OS for the consumer so that's not a selling point to 99.8% of the people.

1Password is great, I cloud sync, have a sub and never had an issue with them. I trust all my data is safe. If not, you know what I will do? Change my passwords somewhere. Big freaking deal. How many of you had your Target data stolen and still have Target cards and shop there? Uh huh. Either go all in or ****. You all are nit picking at this point.
 
  • Like
Reactions: TheMacAvenger
People who are going to tell you how they do not mind this or that feature are worst than the business such as predicted future 1P.

Hello, please leave this space (as long as you are not paid to market these companies) for the people who you cannot convince that the cloud server syncing and subscriptions are ok. What is your need to try to look so smart and fearless if you have no issue? Either address your issue or be happy for what you have that you like.

Paid upgrades now and then are fine, removing features are not fine (especially those features that are the most important initial reason for buying an app on the first place - local syncing).

P.S. Does enpass offer local syncing? I will be moving to it right away if the answer is yes.
 
  • Like
Reactions: al404
Do you think wages, rent and servers are a one time fixed cost?

No software company can survive on a single purchase model. That's just a way to get you hooked before they eventually switch to a subscription model.

Get used to it.

That's not how things work in the real world.

So a company that sells cars or let's say, fridges won't survive because it can't charge a subscription?

You (and everybody else) HAVE TO buy my $50 fart app since I "DESERVE" a good salary. You know, I need to pay rent, groceries, booze and some "medication" I like to use.
 
Last edited by a moderator:
  • Like
Reactions: decafjava
I hope 1Password is reading, because it sounds to me like they will lose a significant number of customers to lower cost options, non-subscription options, and to long-time supporters leaving solely on principle.

I for one will leave 1Password if they follow through with this, be it for another local storage company like Enpass or one of the popular competing companies. There are many good options in this space. They'd best price in the possibility they are cutting their own throats will this decision, going from a premier provider to an also-ran in a wink of time.

The momentum of an angry customer can quickly grow into an army of discontent shouting from the rooftops of today's social media, tipping a boulder to rolling down a mountain where you can do nothing but prepare to absorb the damage.
 
Keepass + Dropbox. Beeing using this combo for many years, intend to continue doing exactly that.
 
  • Like
Reactions: AlexH
Keepass + Dropbox. Beeing using this combo for many years, intend to continue doing exactly that.

Really? Wow.

Dropbox doesn't use zero knowledge encryption. I would never sync my password database to it. That goes for using the standalone version of 1Password, Keepass or anything.

So if you're afraid of 1passwords cloud-based subscription model, you certainly don't want to be storing any sort of password database on Dropbox.
 
People who are going to tell you how they do not mind this or that feature are worst than the business such as predicted future 1P.

Hello, please leave this space (as long as you are not paid to market these companies) for the people who you cannot convince that the cloud server syncing and subscriptions are ok. What is your need to try to look so smart and fearless if you have no issue? Either address your issue or be happy for what you have that you like.

Paid upgrades now and then are fine, removing features are not fine (especially those features that are the most important initial reason for buying an app on the first place - local syncing).

P.S. Does enpass offer local syncing? I will be moving to it right away if the answer is yes.

Currently Enpass does not offers local WiFi syncing although it is on their roadmap with no planned date . It supports cloud syncing through Dropbox, Google Drive, One Drive, Box, and Webdav/ownCloud. The Apple Store desktop version and IOS support iCloud. No other version has this support
 
  • Like
Reactions: TheMacAvenger
Currently Enpass does not offers local WiFi syncing although it is on their roadmap with no planned date . It supports cloud syncing through Dropbox, Google Drive, One Drive, Box, and Webdav/ownCloud. The Apple Store desktop version and IOS support iCloud. No other version has this support

So, basically the same things as 1password. Got it.
 
  • Like
Reactions: TheMacAvenger
Except current version of 1Password 6 for Windows only supports Agilebits cloud with no choice of cloud and 1Password 6 is only available through subscription.
 
I tried using Keepass myself, it was a terrible experience compared to Lastpass and 1password, and a lot of the time I had to copy passwords to the clipboard which is quite insecure.

The way this all goes is, the people who do the best things charge money. Much of open source is basically communism trying to succeed in a capitalist world, and as such no one gets the motivation that they need (which is, enough money) to do a good job. It's why after all these years Linux is still quite halfassed, improving only in instances of commercial interest (Canonical, Redhat, etc)
 
  • Like
Reactions: TheMacAvenger
i'm not sure you're aware of the hash rate vs time to brute force the encryption we are dealing with here. due the to the rounds of encryption involved, a brute force on the password database will very, very slow. like... tens of thousands of times slower than brute forcing md5 or sha password hashes.
Quantum computing is just around the corner. What you say now takes a long time will be reduced to nothing. Put your database in the cloud, and you will be had, soon.
 
Register on MacRumors! This sidebar will go away, and you'll see fewer ads.