On Wed, Feb 17, 2021 at 3:01 AM Dale <rdalek1...@gmail.com> wrote:
>
> I suspect a lot of users are going to be moving from Lastpass because of
> this change.  If their service was far better then people may pay it.
> Thing is, it isn't.  As was pointed out in a couple things I read, they
> have been hacked in the past.  What was taken was encrypted but still,
> they got hacked.

So, while I echo most of the sentiments in this thread already so I
won't repeat them, I do try to be careful about how I look at past
reports of hacks.

Important considerations are:
1. Why were they hacked?
2. What did they do when they were hacked?
3. What were the consequences?
4. What is likely to happen in the future?

When it comes to security the future is much more important than the
past.  We look at the past as a predictor of the future.  However, you
have to always keep this in mind.

One thing I admire about Lastpass is that when they were hacked, they
immediately went public with it, disclosing at all times what was
known and explaining the impact to customers as best as they
understood it.  They took steps to get users to change passwords/etc
which would protect them if the encrypted data was cracked in the
future.  The way they handled the incident definitely made their
customers safer.

Likewise as best as anybody can tell the consequences of the breach
were very limited.  They ensured that customer vaults had solid
encryption, which gave them defense in depth - the breach of the
encrypted data wasn't able to be leveraged into a breach of the
unencrypted password data inside.

These should both be seen as factors in their favor, and it is the
sort of thing that you can't really see until somebody is actually
hacked.

I think one of the more concerning issues for their future was the
change in management when logmein bought them.  I think people had
concerns about the new management.

I definitely like that bitwarden is FOSS.  One concern with ANY of
these web-based tools is that while they may very well be securely
implemented, the fact is that the actual code is remotely managed.  At
any time somebody who obtains control over their infra could push out
updates that cause your client to compromise your data in a number of
ways.  This requires more sustained control than just a quick snatch
of the encrypted cloud password store, but it is definitely a risk,
whether the code is FOSS or not.  After all, Gentoo is FOSS, but if
somebody was able to gain control over the repositories/keys/etc they
could push literally anything in an update to your system, and unless
you're looking very carefully at your ebuilds you could have arbitrary
code running as root in no time.  Obviously that is something infra
and the portage design tries to make unlikely, but it is definitely a
threat model really for any software distribution of any kind.  The
automated nature of updates to these cloud-based password managers
makes these sorts of attacks potentially easier to pull off (though
I'd they would have resources dedicated to detecting a compromise like
this and mitigating it).

-- 
Rich

Reply via email to