Forum search & shortcuts

What password manag...
 

[Closed] What password manager?

Posts: 0
Free Member
 

Been using 1Password for years on all Apple devices at home.
Works really well. Main file can be stored in Dropbox or iCloud, or locally.

May buy a windows license for it too so I can use to at work too, when I'm not surfing STW 😀


 
Posted : 30/10/2015 10:51 am
Posts: 4338
Free Member
 

Lastpass is pretty damn secure

1. All encryption and decryption happens on your computer.
2. The sensitive data that is harbored on their servers is always encrypted before it’s sent so all they receive is gibberish.
3. Lastpass never receive the key to decrypt that data.

Furthermore, like any other service, you should be using two-factor authentication with LastPass. If you do, someone with your master password still will not be able to access your account, even in the event of a breach.

https://blog.lastpass.com/2010/07/lastpass-gets-green-light-from-security.html/

Also using an online password manager you are less likely fall foul of phising attacks

A browser-integrated password manager will only fill in a site-specific password if you're actually visiting the correct site. So you won't accidentally type in your Paypal.com password into www.paypal.com.us.cgi-bin.webscr.xzy.ru.


 
Posted : 30/10/2015 11:57 am
 poly
Posts: 9145
Free Member
 

I really can't imagine having a memory that allows me to remember 40+ passwords that are all unique and complex. Typically they'd be something like 'y62htX$6jF%Ku*' and I'll be jiggered if I could remember one or two like that let alone dozens. If you can remember 40+ 'complex' passwords, I'd suggest you either need to take up card counting, a one man memory show or your passwords aren't really that complex at all

I think your password is not as complex as you think it is. A system for remembering passwords and making them unique is a good thing:

e.g. make a base password, something long, but relatively easy to remember. Lets say "purple-crocodiles", if you increase the complexity of this by adding some symbol/number/caps replacement then:

Purple-Cr0c0dile$ is still quite easy to remember.

Now you don't want to use the same password on multiple sites - simple you add some site specific letters at the end (or start - or middle) or the password according to a system you define and remember. So your singletrack and facebook passwords might be:

Purple-STW+Cr0c0dile$ and
Purple-FBK+Cr0c0dile$

You don't tell anyone your system or base password then even if one is compromised it takes a concerted effort with a degree of intelligence to guess what the others would be. You can make the base and combination harder to "read" as well (e.g. PSTWCr0c$) - or some people like to use the first letter of words from a song - say Ittw1wbSTWLamws2c.

I use essentially this approach but with a couple of base password & structure variants depending on my perception of the risk.

I have considered taking it one step further and hashing these passwords so they are gibberish and all I have to do is remember the password and hash method (and have access to a computer or website that will let me run and copy/paste the result).

e.g. those two passwords would become:

A9CD471148BED6CEE644B5D8B8C2E582
and
CB9EE944B518137E7CAF165F896DABC1

But since most sites are keen to have $ymbol$ Numb3r5 and Caps I'd probably need to add another short base to them; which added to the need to hash them and the pain of cut-n-pasting on a mobile device is enough to put me off. However my point is you really don't need to write them down anywhere to remember large numbers of unique passwords. I have a general mistrust of all "vault" type systems as it is like saying I'll keep the keys to all our vehicles in the safe. This is great unless (a) the safe gets compromised or (b) you loose the safe key.


 
Posted : 30/10/2015 12:39 pm
Posts: 0
Free Member
 

Numbers and symbols instead of letters can still appear in password cracking dictionaries.

e.g. obvious ones, so using ! instead of i, 0 instead of o, $ instead of s.

People know these are typical substitutes, so a common word with those substituted may still be easy to crack.


 
Posted : 30/10/2015 1:30 pm
Posts: 0
Full Member
 

People know these are typical substitutes, so a common word with those substituted may still be easy to crack.

If it is a worry, don't sub it every time, maybe just change the second vowel in your phrase, or 1st in the first word second in the second word. Random caps is probably as good as subbing in terms of this type of attack, as is appending phone number or DOB - if they aren't specifically targeting you that is.

Poly's base examples are plenty secure enough for common usage. If they aren't you should generate + store one or use 2FA.


 
Posted : 30/10/2015 1:45 pm
 Drac
Posts: 50628
 

If anyone with half a brain got hold of one of Poly's passwords it wouldn't take much to work out the pattern. No pattern means it's very much harder to crack.


 
Posted : 30/10/2015 3:09 pm
 poly
Posts: 9145
Free Member
 

Numbers and symbols instead of letters can still appear in password cracking dictionaries.

e.g. obvious ones, so using ! instead of i, 0 instead of o, $ instead of s.

People know these are typical substitutes, so a common word with those substituted may still be easy to crack.

Completely agree - I'm sure you are familiar with the XKCD on battery-horse-staple (and if you find that stuff interesting you will will probably be interested in this: https://www.ted.com/talks/lorrie_faith_cranor_what_s_wrong_with_your_pa_w0rd?language=en)

Personally I wouldn't bother with symbols etc because the brute force attacker has no way of knowing if you use them or not and so probably wants to test them anyway. However if you are trying to define a "standard" base password it is easier to include them (and a mixture of upper, lower, number, symbol) as some sites insists on one or more.

drac -

If anyone with half a brain got hold of one of Poly's passwords it wouldn't take much to work out the pattern. No pattern means it's very much harder to crack.

Indeed - the pattern I use in real life is a little less obvious that that (but it was easier to illustrate my point with a very simple case) - but if you had two passwords you would certainly be able to work it out (which is why I use two different systems for sites where security is critical and stuff like STW where the consequences of a breach are less serious but I have less faith in how the recipient of the password protects it). Of course that relies on someone actually being bothered to get into MY account, rather than just having a list of email addresses and passwords and hoping as 90% of people do that the same password works on a wide variety of accounts with the same email address. Whilst the majority of people are completely useless at password variation I think my approach will ensure working out my system is low priority. I don't believe that normal hacks are caused by people applying common sense to look at lists of passwords - they are simply bots which munge through lists looking for exact matches. If I was writing a bot to get smarter than that it would take all the "somepassword1" and try "somepassword2" etc before I was trying to spot patterns*.

However as I said, if that worries you then you can use the Hash. Each password is unique with no pattern. But you don't need to write down the hash - because you can recreate it at any time if you know which algorithm and the right (easily memorable) input.

IMO - as soon as people write down passwords (or probably worse use an excel / word document) their security is compromised, however the biggest threat is people using *exactly* the same password on multiple sites. I bet I could create a site in an afternoon that would let me easily collect passwords and matching email addresses (I've always been tempted just to see how bad the problem is). If I get you mail account password then with most password resets being mail based confirmation I can get into almost any account you have that doesn't require two factor authentication.

* For this reason I believe that forcing regular password changes is a design flaw which encourages people to use poor systems or right them down (probably on post it notes stuck to the screen).


 
Posted : 30/10/2015 4:01 pm
 Drac
Posts: 50628
 

Common sites you're likely to access - memory.

I have no idea what any of my passwords are.


 
Posted : 31/10/2015 12:21 am
Posts: 371
Free Member
 

That's the best way drac, it means they can't be tortured out of you 😀


 
Posted : 31/10/2015 12:37 am
 Drac
Posts: 50628
 

Exactly.


 
Posted : 31/10/2015 12:37 am
Posts: 11605
Free Member
 

Whoever said using a book. Dictionary attack

https://howsecureismypassword.net

Hashes are best as said however do I use them? No. Too easy to forget, still too many variables to remember and ultimately I don't give a shit if someone gets my STW or Facebook passwords as they wont learn anything that they cant easily find out anyway. For online shopping I don't store card details anywhere so in reality I only need to worry about banking passwords and Paypal. I only bank at home so it comes back to making a secure pass and sticking to it.


 
Posted : 31/10/2015 12:55 am
 DrJ
Posts: 14061
Full Member
 

OT-ish, but do you use PayPal 2 factor authentication? I see a screen to set it up with SMS but NO details about how it works, how to turn it off, what to do if you lose your phone etc so I'm reluctant to proceed without an exit strategy!


 
Posted : 31/10/2015 9:31 am
Posts: 78571
Full Member
 

I bet I could create a site in an afternoon that would let me easily collect passwords and matching email addresses (I've always been tempted just to see how bad the problem is).

Far and away the best way of getting someone's password is to ask them. If I had a pound for every time I've had a conversation along the lines of "do you need my password?" - "no, I don't want to know it" - "ok, it's jennifer7" I could retire.

For this reason I believe that forcing regular password changes is a design flaw which encourages people to use poor systems or right them down (probably on post it notes stuck to the screen).

You're not wrong. Hard to encourage sensible password usage in users when the administrators don't even really get it.


 
Posted : 31/10/2015 12:26 pm
Posts: 0
Free Member
 

I use Iliumsoft Ewallet. Apps for iPhone, iPad, Mac and PC and syncing over wifi between them.

Seems fine. It's the synching and apps I like, but aware other tools do this too.

[url= http://www.iliumsoft.com/ ]http://www.iliumsoft.com/[/url]


 
Posted : 31/10/2015 12:31 pm
Posts: 0
Free Member
 

Don't worry anyway. It won't be long until the government requires us to hand over all passwords to everything anyway so if you forget you can just get it off the list that will have been leaked within a month of the system going live 😀


 
Posted : 31/10/2015 12:36 pm
Posts: 7875
Free Member
 

if the document is a docx all that you need to do is rename the file to .zip, delete the settings.xml from within the file and rename it back to .docx

I tried this with a Word 2013 file with Winrar/Winzip and 7zip. None worked. It is a legitimate work file that a colleague forgot the password for. I am now using a brute force program.


 
Posted : 31/10/2015 2:33 pm
Posts: 8767
Full Member
 

The best ones are like http://kestas.kuliukas.com/MultiPass/ you only need to remember one password and it doesn't need to be stored in a crackable safe file, you just use the app to generate the password on the fly


 
Posted : 31/10/2015 2:48 pm
Page 2 / 2