6
submitted 2 months ago by Beep@lemmus.org to c/technology@lemmy.world
  • Millions of people use password managers. They make accessing online services and bank accounts easy and simplify credit card payments.
  • Many providers promise absolute security – the data is said to be so encrypted that even the providers themselves cannot access it.
  • However, researchers from ETH Zurich have shown that it is possible for hackers to view and even change passwords.
top 49 comments
sorted by: hot top controversial new old
[-] felbane@lemmy.world 6 points 2 months ago

tl;dr:

  1. If the password manager server is hacked and compromised, then syncing your passwords with the compromised server will lead to compromised passwords (duh)
  2. None of the providers tested have (or have had in the past) compromised servers.

and an observation or two:

  • Vaultwarden is free, self-hostable, and doesn't rely on trust in a third party.
  • Keepass (and its client variants, like KeepassXC which is pretty great) is even more secure because there is no server, just an encrypted file you can store anywhere.
[-] orclev@lemmy.world 2 points 2 months ago* (last edited 2 months ago)

Keepass (and its client variants, like KeepassXC which is pretty great) is even more secure because there is no server, just an encrypted file you can store anywhere.

And simultaneously less secure because it's up to you to handle keeping your vault synced between various devices and most people are significantly worse at keeping systems secure than the professionals at the password managers.

Self hosting a server of some kind or using something like Keepass on a single device (with offline backups) is the most secure option, but as usual with security doing so trades significant convenience for security. For most people who are uninterested in making sure their servers are kept up to date week to week letting professionals handle it is the better option.

[-] felbane@lemmy.world 2 points 2 months ago

Sure, but at the end of the day even if you don't update your vaultwarden server or you rely on an insecure storage sync system like dropbox, your actual vault is encrypted with a key that only you know. Even if your server is hacked or the kdbx is leaked, your passwords are safe until someone breaks AES.

Contrast that with hosted services, who could very easily attach their own keys to your encryption key (whether now or in the future at the behest of the state) and you'd be none the wiser. E2EE doesn't matter much when the other end is controlled by someone else.

I'm not disagreeing that most people just want something to work without thinking about, and for that reason I'm glad that services like bitwarden and lastpass and protonpass exist. My intent was not FUD, just shining a light on the fact that keeping your passwords secure does not require trusting a company.

[-] WhyJiffie@sh.itjust.works 0 points 2 months ago

Sure, but at the end of the day even if you don't update your vaultwarden server or you rely on an insecure storage sync system like dropbox, your actual vault is encrypted with a key that only you know. Even if your server is hacked or the kdbx is leaked, your passwords are safe until someone breaks AES.

not really the case: https://lemmy.ml/comment/24008121

Contrast that with hosted services, who could very easily attach their own keys to your encryption key

how would official Bitwarden be able to accomplish that? apart from this vulnerability, they can't use their servers to add their own keys.

[-] FauxLiving@lemmy.world 1 points 2 months ago

And simultaneously less secure because it’s up to you to handle keeping your vault synced between various devices and most people are significantly worse at keeping systems secure than the professionals at the password managers.

It is not less secure.

If the Bitwarden servers are compromised (either by hacking or by being forced to by the government of the country where they are hosted) then code could be run which would allow the attacker to receive your plaintext password and that is used to decrypt your data.

If a user is so horrible at syncing that they accidentally synced their database file to a public Twitter post, it is still protected by AES-256 which can't be broken by a simple subpoena.

In either case, syncthing is pretty simple to use and is the common recommendation for the kind of small personal file sync that you need here. It also adds an additional security layer, on top of the unbreakable AES-256 encryption, to the whole setup.

[-] ChairmanMeow@programming.dev 1 points 2 months ago

These attacks can happen through server impersonation as well. The actual cloud servers need not be compromised, just the user's browser has to be. This attack can then leak passwords and allow malicious parties to even gain access on the actual cloud servers apparently.

[-] unexposedhazard@discuss.tchncs.de 5 points 2 months ago

OMFG can people please fucking go away with this stupid "password managers are worthless" bullshit today. They are exactly as secure as promised, unless you went to the obviously shady ones that use web interfaces. People have been saying this for years, if you want security, keep your password manager offline.

[-] victorz@lemmy.world 1 points 2 months ago

So by that logic BitWarden is unsafe?

[-] unexposedhazard@discuss.tchncs.de 0 points 2 months ago

Yes, if you arent self hosting the web interface or using the desktop client.

[-] victorz@lemmy.world 2 points 2 months ago

But these issues were patched before even publishing the findings, right?

[-] unexposedhazard@discuss.tchncs.de 0 points 2 months ago* (last edited 2 months ago)

There is no way to patch the inherent flaw that comes with delivering client software through a web browser. If the entire client is delivered as a web page from a server you dont control, then that server can modify the software however it pleases. Same applies to e2ee encrypted chat clients that run as a web page like element-web (browser based matrix client).

[-] victorz@lemmy.world 2 points 2 months ago

This feels a bit extreme though. Can you even trust anything online at that point? Do you also never leave your home carrying your wallet in case someone might rob you?

[-] unexposedhazard@discuss.tchncs.de 1 points 2 months ago* (last edited 2 months ago)

Bro i have my bank details, all my private 2FA, work 2FA, health insurance access, my families master passwords, steam access, and more in there. Its literally the most important piece of software that can exist in this day and age. No im not taking chances with that. The only thing you can do with my physical wallet if you rob me is buy something up to 20€ beyond which you need the cards pin. Everything else i can just deactivate by calling the relevant parties.

But on another note, websites have never really been resistant to MITM attacks. So you dont just have to trust the hoster but also everything in between you and them.

[-] victorz@lemmy.world 1 points 2 months ago* (last edited 2 months ago)

I assume you follow proper backup protocol it you are using offline password management.

How do you sync though? You keep one copy on your phone or something, I imagine? What apps and managers are you using?

[-] Kushan@lemmy.world 3 points 2 months ago

From the paper itself:

We had a video-conference and numerous email exchanges with Bitwarden. At the time of writing, they are well advanced in deploying mitigations for our attacks: BW01, BW03, BW11, BW12 were addressed, the minimum KDF iteration count for BW07 is now 5000, and their roadmap includes completely removing CBC-only encryption, enforcing per-item keys and changing the vault format for integrity. On 22.12.25 they shared with us a draft for a signed organisation membership scheme, which would resolve BW08 and BW09. At our request, to maintain anonymity, they have not yet credited us publicly for the disclosure, but plan to do so.

I didn't look at the response to other Password managers, but the gist here is that the article is overblowing the paper by quite a bit and the majority of the "issues" discovered are either already fixed, or active design decisions.

[-] WhyJiffie@sh.itjust.works 1 points 2 months ago* (last edited 2 months ago)

but the gist here is that the article is overblowing the paper by quite a bit and the majority of the "issues" discovered are either already fixed, or active design decisions.

"fixed". only for new and updated passwords

https://lemmy.ml/comment/24008121

[-] 1984@lemmy.today 0 points 2 months ago* (last edited 2 months ago)

I was also just looking for bitwarden information. Its just the best password manager and has never failed to do its job.

I dont know what they mean with less secure than promised. I didnt expect them to be perfect, and havent read that they promise no security flaws.

[-] ftbd@feddit.org 4 points 2 months ago

They advertise that passwords are only stored on the server in encrypted form, meaning they couldn't read them even if they wanted to (or were forced to by a government agency) and you don't have to trust them not to. This paper shows that several vulnerabilities exist in the protocol which could be exploited by malicious code running on the server (injected by hackers or a government agency), which would then allow an attacker to obtain cleartext-passwords. So you do, in fact, have to trust the servers integrity.

[-] 1984@lemmy.today 1 points 2 months ago

Thank you for taking the time to understand and comment, very valuable.

[-] SparroHawc@lemmy.zip 2 points 2 months ago

Don't store your stuff in the cloud unless you don't mind someone else accessing it.

If you store things in the cloud that you don't want other people to access, you better be encrypting it yourself and only opening it locally.

This has been a cardinal rule since day 1.

[-] CardboardVictim@piefed.social 2 points 2 months ago

For people interested there were 3 cloud based password managers tested and this is what they found

The researchers demonstrated 12 attacks on Bitwarden, 7 on LastPass and 6 on Dashlane.

[-] sexy_peach@feddit.org 0 points 2 months ago

Is there a reason why these attacks were on cloud based pw managers?

[-] CardboardVictim@piefed.social 1 points 2 months ago

From what I scanned, there was no reason given on why they only attacked cloud based providers.

My guess is that these are paid ones and thus have a 'market share', easier to attack etc.

If you attack a 'keepass' password the attack vector is more crypto / memory based as far as my limited knowledge goes and not some funky inbetween attack.

Also, if you attack a cloud base provides, you will most likely have multiple victims per breach / exploit, whilst offline are targeted and thus not so interesting in most cases unless we're talking about a person of interest

[-] U7826391786239@lemmy.zip 1 points 2 months ago* (last edited 2 months ago)

they ran the test on those pw managers because they were open source. that allowed the testers to implement a "dummy" provider on their own "compromised server." so the results of failing the tests are based on the hypothetical situation of "what if bitwarden (or whoever) had an entire server taken over by hackers". while the chances of that happening are greater than zero, it would take a lot for someone to completely hijack a server like that

edit to add-- these tests are one of the reasons these pw managers choose to be open source: to allow 3rd party tests like this to find vulnerabilities, so they can be fixed

nothing is 100% guaranteed safe, but if you don't want to remember or write down dozens or hundreds of unique strong passwords, i still would recommend a pw manager

[-] Appoxo@lemmy.dbzer0.com 2 points 2 months ago* (last edited 2 months ago)

“We want our work to help bring about change in this industry,” says Paterson. “The providers of password managers should not make false promises to their customers about security but instead communicate more clearly and precisely what security guarantees their solutions actually offer.”  

Great.
Now which password vault was the most cooperative and clear in their security communication and which one wasnt?
The author said that they have given the providers time to fix the issues. Now highlight the ones that did it the best.... >_>

[-] olympicyes@lemmy.world 1 points 2 months ago* (last edited 2 months ago)

They did gove some advice. They said to go with a vendor that is transparent about problems and reveals the results of their third party security audits. I’m sure if you read between the lines it means they likely reviewed several vendors and chose to spend their time attacking ones that are opaque about their security stance and used outdated encryption or bad implementations of E2E encryption. So all three are likely suspect. Like if 1Password were developed similarly to LastPass wouldn’t they have spent time attacking it?

Edit: https://support.1password.com/security-assessments/

1Password are posting the results of their external pen testing now.

[-] OnfireNFS@lemmy.world 2 points 2 months ago

Would having a synced Keepass database with a composite key protect against this?

When I made my database I created a composite key file that never goes online. I locally copy it to any device that needs to access the database. The idea was even if the password got compromised you can't access the database without the key file

[-] nroth@lemmy.world 1 points 2 months ago

What if you have a house fire and lose all devices with the key

[-] scarabic@lemmy.world 2 points 2 months ago

Many providers promise absolute security

This struck me as wrong, because that would be a technically impossible and liability-inviting thing to promise.

And after checking the homepages of the 3 services they tested, yep, none of them promise “absolute security.”

[-] aetherius@lemmy.ml 1 points 2 months ago* (last edited 2 months ago)
[-] Kazel@lemmy.dbzer0.com 1 points 2 months ago

Everyone using online password manager services deserves everything he gets

[-] helpImTrappedOnline@lemmy.world 1 points 2 months ago* (last edited 2 months ago)

Yes, let's blame the victim and not the data hording mega corps that advertise their crap to collect more data, make big promises, hide the better options, and actively undermine open source in every way they can.

I'm pretty sure the average person hears "open source" and think "oh that's insecure software made by hackers, I need to only use software from trusted sources". Using only trusted software is still a good idea, but unfortunately the trusted sources of 2002 have betrayed us.

[-] Etterra@discuss.online 1 points 2 months ago

That's why mine is a physical book.

[-] bitflip@lemmy.dbzer0.com 1 points 2 months ago

Really depends on your threat model whether this is a good idea. If cops raiding your home is part of it, a physical book might not be your best bet.

[-] irate944@piefed.social 1 points 2 months ago* (last edited 2 months ago)

Copy pasting a comment that I saw on Reddit

——

Link to the original study (with a less sensationalized title):

https://zkae.io

A few important notes:

  • the study is about Bitwarden, LastPass, Dashlane and 1Password. Proton Pass isn't mentioned.

  • the study presumes that they're working with a malicious server (read this as compromised server, controlled by an attacker). The attacks they talk about in the article would not work on a normal server. Here's their quote:

No need to panic: all of our attacks presume a malicious server. We have no reason to believe that the password manager vendors are currently malicious or compromised, and as long as things stay that way, your passwords are safe. That said, password managers are high-value targets, and breaches do happen.

  • Here's another quote, about other password managers:

You can ask your provider the following questions:

  1. ⁠Do you offer end-to-end encryption? What security do you provide in case your server infrastructure were to be compromised?
  1. How do you check that public keys and public-key ciphertexts are authentic?
  1. How do you authenticate security-critical settings, such as the KDF type and the iteration count?
  1. Do you provide integrity guarantees for a user's vault as a whole? Can a malicious server add items to your vault?

You can also ask your favourite password manager to commission an audit checking for our attacks in their products.

  • If you still feel unsure/unsafe, then adopt an offline password manager (I highly recommend keepassXC).
[-] CardboardVictim@piefed.social 0 points 2 months ago

I too recommend KeepassXC, works even on android with KeepassDX. I use syncthing to sync between devices (work, personal and android)

[-] folekaule@lemmy.world 0 points 2 months ago

I also use KeepassXC, and it's great. I'm interested in setting up Syncthing between my Android, Linux desktop, and NAS. Do you have any tips or articles/resources that you used to set it up?

[-] CardboardVictim@piefed.social 1 points 2 months ago

Hmm, I don't think I've optimized it either to be fair. I wanted to use my phone as a 'bridge in between' but that means it uses battery since it 'checks' whats online.

In reality my phone is usually on demand and since I work from home, my work device is usually still turned on when I turn on my 'good computer' with fun projects.

One thing that I find useful is the backup / version control settings, I've set it up that there is a version control if it overwrites things so that when conflicts happen (eg a sync didn't happen and I changed both keepass databases) I can quickly 'merge' them or sync them up manually.

I've also heard that syncthing isn't available on android anymore but a fork (that is somewhat vetted, iirc) exist.

If you can run applications on your NAS & connect to it from anywhere, it could be used as a type of 'master' server that keeps everything in sync that is always online.

[-] CompactFlax@discuss.tchncs.de 1 points 2 months ago* (last edited 2 months ago)

Assume the breach - that includes your password manager host. Especially your password manager host.

The summary is here; the linked article is a bit short on detail. https://zkae.io/

I read the summary but haven’t gotten into the details on each. It is concerning that Bitwarden has so many issues, as it’s the only one that is offered as a self hosted solution in addition to SaaS - I do think it’s unlikely for a home lab to get the kind of attention that would result in using these methods against the vault, but it’s possible. Attackers have been known to go after admins. Lastpass has had their run ins with breaches before and shouldn’t score so highly. 1Password seems to have good architecture and a responsive team.

[-] Sir_Kevin@lemmy.dbzer0.com 1 points 2 months ago

I pitty the fool that stores anything important on ~~the cloud~~ somebody elses computer.

[-] hal_5700X@sh.itjust.works 0 points 2 months ago

Use a offline password manager. Problem solved.

[-] Evotech@lemmy.world 1 points 2 months ago

Solves the security issue. Destroys the accessibility part

[-] myfunnyaccountname@lemmy.zip 0 points 2 months ago

With pretty much every major company being hacked at some point, credit card companies being hacked, everyone selling our details and data, doge and palantir. Feels like post it notes under the keyboard isn’t that bad of an idea.

[-] SocialMediaRefugee@lemmy.world 1 points 2 months ago

If someone breaks into my house to read them I have big problems already.

[-] myfunnyaccountname@lemmy.zip 1 points 2 months ago

You have no idea how many times I’ve made that exact statement.

[-] whelk@retrolemmy.com 1 points 2 months ago

Let's start a club

[-] eatsnutellawivaspoon@feddit.uk 0 points 2 months ago

I use one of the password managers mentioned in the article, purely for the convenience of apps on all my devices, syncing and complex individual passwords. Should I be looking to move to self hosting something instead? Would my host (likely a synology Nas or raspberry pi) not then have the same risks?

[-] iglou@programming.dev 0 points 2 months ago

I believe Proton Pass does not have the design flaws shown in the article. For instance, if you lose your password, you lose your data. Your data is encrypted and decrypted on your device.

[-] cmhe@lemmy.world 1 points 2 months ago* (last edited 2 months ago)

This is what all the listed password manager claim.

What was done here was tricking the client through the server to do things. So the fixes went into the client application.

this post was submitted on 17 Feb 2026
6 points (75.0% liked)

Technology

84222 readers
248 users here now

This is a most excellent place for technology news and articles.


Our Rules


  1. Follow the lemmy.world rules.
  2. Only tech related news or articles.
  3. Be excellent to each other!
  4. Mod approved content bots can post up to 10 articles per day.
  5. Threads asking for personal tech support may be deleted.
  6. Politics threads may be removed.
  7. No memes allowed as posts, OK to post as comments.
  8. Only approved bots from the list below, this includes using AI responses and summaries. To ask if your bot can be added please contact a mod.
  9. Check for duplicates before posting, duplicates may be removed
  10. Accounts 7 days and younger will have their posts automatically removed.

Approved Bots


founded 2 years ago
MODERATORS