Rich Kulawiec on 31 Jan 2017 02:47:26 -0800 |
[Date Prev] [Date Next] [Thread Prev] [Thread Next] [Date Index] [Thread Index]
Re: [PLUG] Lastpass - friend of foe |
On Tue, Jan 17, 2017 at 09:24:11AM -0500, Rich Freeman wrote: > I'd go a step further and argue that the design was flawed simply due > to the fact that RSA was ever in a position to have the credentials on > the tokens. And I would agree with you. Incidentally, I noticed this recent article about Lastpass this morning. (Which is why I'm following up.) It demonstrates that they're lying about this claim: "LastPass encrypts your Vault before it goes to the server using 256-bit AES encryption. Since the Vault is already encrypted before it leaves your computer and reaches the LastPass server, not even LastPass employees can see your sensitive data." Here's the article: PSA: LastPass Does Not Encrypt Everything In Your Vault https://hackernoon.com/psa-lastpass-does-not-encrypt-everything-in-your-vault-8722d69b2032 What the author doesn't note is that there (at least) three more serious privacy/security problems that arise from this. (And this is based on just a couple minutes' thinking over coffee #1, so it's likely to be incomplete.) The first is that anyone with knowledge of the sites in your vault knows which sites to use when they try to spearphish you. The second is that the same knowledge provides an attacker with clues about your identity. How useful those clues are will depend on which sites are present and the relative uniqueness of those sites, e.g., seeing that person X has stored passwords for Google and Reddit really isn't much help. But seeing that they've also stored passwords for underwaterhockey.blah and goat-staring.blah will really narrow down the possibilities. The third is that correlation of this knowledge across users will provide clues not only about identities, but about relationships. To use the previous example, if there are two and only two users with those four sites stored, then there is a very high probability they are related in some way (or are the same person). In all three cases, these bits of knowledge combined with access timestamps and access IP addresses will yield additional identifying and correlating information. [1] It will also provide geolocation clues and suggest time windows for attacks. The author of the Lastpass piece recommends an alternative called Bitwarden, but since their home page contains this sentence: Because your data is hosted in our secure cloud environment, you can access it from anywhere, on any device! I think we can dismiss them permanently on inspection. ("secure cloud" is an oxymoron.) ---rsk [1] Deanonymizing users, once one has a substantial amount of data like this, is probably much easier than it looks on the surface. (I've spent some time over the past decade studying exactly that.) For an analysis of a recent article (and a link to the original): One More Time With Feeling: 'Anonymized' User Data Not Really Anonymous https://www.techdirt.com/articles/20170123/08125136548/one-more-time-with-feeling-anonymized-user-data-not-really-anonymous.shtml ___________________________________________________________________________ Philadelphia Linux Users Group -- http://www.phillylinux.org Announcements - http://lists.phillylinux.org/mailman/listinfo/plug-announce General Discussion -- http://lists.phillylinux.org/mailman/listinfo/plug