Keith C. Perry on 5 Jan 2016 08:56:16 -0800

[Date Prev] [Date Next] [Thread Prev] [Thread Next] [Date Index] [Thread Index]

Re: [PLUG] password safe

Wait... if passwords can be "skimmed" then are you saying that the communication between the the lastpass client and their servers is NOT encrypted?

I must be misunderstanding what you are saying.  Even if they got the database and your master password somehow, their system should not be vulnerable to some sort of man-in-the-middle attack that would allow a forcible "opening" of the vault on your system.

~ ~ ~ ~ ~ ~ ~ ~ ~ ~ ~ ~ ~ ~ ~ ~ ~ 
Keith C. Perry, MS E.E. 
Owner, DAO Technologies LLC 
(O) +1.215.525.4165 x2033 
(M) +1.215.432.5167

----- Original Message -----
From: "Rich Freeman" <>
To: "Philadelphia Linux User's Group Discussion List" <>
Sent: Tuesday, January 5, 2016 11:29:12 AM
Subject: Re: [PLUG] password safe

On Tue, Jan 5, 2016 at 11:13 AM, Keith C. Perry
<> wrote:
> From what I saw on lastpass's website their encrypted value mechanisms would be acceptable to me but it's still not something I would use.

My biggest concern with lastpass is that if they're hacked somebody
can potentially change your client.  It is all Javascript with local
encryption, but if you can change the code you can just have it pass
the key back to the compromised server.

So, an attack that just grabs their entire database isn't a huge
threat since the data is all locally encrypted.  However, a persistent
undiscovered attack is a much larger threat since it can be used to
skim passwords as people run the client.

That is actually a threat if somebody compromises your distro and
updates you to a compromised version of Keepass or such as well, but I
don't think people update their software as often as they reload their
Philadelphia Linux Users Group         --
Announcements -
General Discussion  --
Philadelphia Linux Users Group         --
Announcements -
General Discussion  --