andreluis034

joined 2 years ago
[–] [email protected] 3 points 2 years ago* (last edited 2 years ago) (1 children)

That’s not quite right though, there’s the factor you know (password to your vault), and the factor you have (a copy of the encrypted vault).

That would be true for offline vaults, but for services hosted on internet I don't think so. Assuming the victim does not use 2FA on their Bitwarden account, all an attacker needs is the victim's credentials (email and password). Once you present the factor you know, the vault is automatically downloaded from their services.


This is something I hadn't thought until know, but I guess password managers might(?) change the factor type from something you know (the password in your head) to something you have (the vault). At which point, if you have 2FA enabled on other services, you are authenticating with 2 things you have, the vault and your phone.

[–] [email protected] 19 points 2 years ago (10 children)

Although it's true that you are increasing the attack surface when compared to locally stored OTP keys, in the context of OTPs, it doesn't matter. It still is doing it's job as the second factor of authentication. The password is something you know, and the OTP is something you have (your phone/SIM card).

I would argue it is much worse what 1Password and Bitwarden (and maybe others?) allows the users to do. Which is to have the both the password and the OTP generator inside the same vault. For all intents and purposes this becomes a single factor as both are now something you know (the password to your vault).

[–] [email protected] 1 points 2 years ago (1 children)

Any chance to get a guarantee on lm.put.tf ? The instance is only used by people I know to avoid trigger happy admins on larger instances that defederate for trivial reasons. There are no real "communities" there and currently there's only 5 users with just 2 being active on the fediverse. The admin account there goes largely unused to prevent the instance from being compromised due to XSS and/or CSRF attacks,

There is only one community for meta discussions about the instance so that other people may publicly raise issues to be discussed. Unsurprisingly, no one has posted there yet.

[–] [email protected] 6 points 2 years ago

I wonder in what bizarre way, Rozemyne will extract the knowledge from Ferdinand. (I guess by printing some books)

My hypothesis is that Ferdinand was already planning to transfer/write his 30-40% knowledge of the G-book onto the 300 pages of "maximum quality fey paper" that he request from Rozemyne. Maybe he is already expecting to be executed by either the Royal famaly or Georgine/Detlinde and wants to preserve this knowledge somehow.

[–] [email protected] 1 points 2 years ago (1 children)

I think the admin of c/selfhosted is the admin of Lemmy.world

[–] [email protected] 5 points 2 years ago (1 children)

Made my own for myself and some friends. We couldn't be bothered creating account on the larger instances and have power tripping admins de-federating instances over trivial issues.

[–] [email protected] 1 points 2 years ago

1000/400 mbps down/up for 40€ /month. Portugal

[–] [email protected] 9 points 2 years ago

I think those kind of vulnerabilities are pretty rare, though.

Not really... If you go read the security bulletin from google, you will see every month that there are a couple of issues fixed on closed source components https://source.android.com/docs/security/bulletin/2023-07-01

Also vulnerabilities related to kernel code, I highly doubt most ROM "developers" are actually backporting security fixes for that specific device's kernel branch/source.

[–] [email protected] 21 points 2 years ago (3 children)

You can update your phone with custom ROMs, but it won't update the closed source components of it(device drivers, bootloader, etc...). If a vulnerability is found in one of those components, it's unlikely that it will get parched

[–] [email protected] 4 points 2 years ago

I think bitwarden fills all of your requirements.

view more: ‹ prev next ›