• Millions of people use password managers. They make accessing online services and bank accounts easy and simplify credit card payments.
  • Many providers promise absolute security – the data is said to be so encrypted that even the providers themselves cannot access it.
  • However, researchers from ETH Zurich have shown that it is possible for hackers to view and even change passwords.
  • unexposedhazard@discuss.tchncs.de
    link
    fedilink
    English
    arrow-up
    11
    arrow-down
    5
    ·
    edit-2
    1 day ago

    There is no way to patch the inherent flaw that comes with delivering client software through a web browser. If the entire client is delivered as a web page from a server you dont control, then that server can modify the software however it pleases. Same applies to e2ee encrypted chat clients that run as a web page like element-web (browser based matrix client).

    • DeckPacker@lemmy.world
      link
      fedilink
      English
      arrow-up
      3
      arrow-down
      2
      ·
      4 hours ago

      This comment shows that you know less about computers, than you may think. You can definetly make end to end encryption work using a Website. JavaScript runs client side. So as long as you trust the encryption algorithm (which in elements case you definetly can, because it is OSS), the encryption is safe and your unencrypted data never leaves the device.

      • Bradley Nelson@lemmy.world
        link
        fedilink
        English
        arrow-up
        3
        ·
        3 hours ago

        The point is you are trusting the JavaScript that the server delivered to you. If the server is compromised, it hands you compromised JavaScript and you’re screwed. It’s the exact same thing as going to evil.com and entering your master password. I think that you inherently understand that evil.com is untrusted. However, if passwordmanager.com is compromised by the same people who own evil.com. there’s really no difference.

        • DeckPacker@lemmy.world
          link
          fedilink
          English
          arrow-up
          1
          ·
          1 hour ago

          I understand, but wouldn’t the same problem occur, if the server for the website you download your software from or the server for your package manager would be compromised? Even if you would buy your software physically on a CD, there would be a chance someone has messed with the content on a CD.

          So I don’t really see this as a flaw unique to browsers. Am I wrong?

      • unexposedhazard@discuss.tchncs.de
        link
        fedilink
        English
        arrow-up
        1
        ·
        edit-2
        3 hours ago

        Yes of course you CAN make it safe in theory, but unless you run the web interface locally or on your own server, you cant be certain that the javascript delivered to you from the hoster hasnt been modified. Its like having autoupdates on but you have zero control over when or how the updates take place, because every time you open the page it could be different code from the last time.

        So as long as you trust the encryption algorithm (which in elements case you definetly can, because it is OSS)

        How do you know that the code on elements github repo is actually the same code that you get delivered from your homeserver that is hosting the web client? Your homeserver can just modify the web clients code however it wants and deliver a backdoored or faulty version to you. Which means you dont just have to trust the open source code, but also the admin who is managing the homeserver and also the hosting provider.

        Is this really so hard to understand? Literally the entire client is delivered on demand from a remote server, obviously that is insecure if you dont control that server.

    • Victor@lemmy.world
      link
      fedilink
      English
      arrow-up
      7
      ·
      1 day ago

      This feels a bit extreme though. Can you even trust anything online at that point? Do you also never leave your home carrying your wallet in case someone might rob you?

      • unexposedhazard@discuss.tchncs.de
        link
        fedilink
        English
        arrow-up
        4
        ·
        edit-2
        23 hours ago

        Bro i have my bank details, all my private 2FA, work 2FA, health insurance access, my families master passwords, steam access, and more in there. Its literally the most important piece of software that can exist in this day and age. No im not taking chances with that. The only thing you can do with my physical wallet if you rob me is buy something up to 20€ beyond which you need the cards pin. Everything else i can just deactivate by calling the relevant parties.

        But on another note, websites have never really been resistant to MITM attacks. So you dont just have to trust the hoster but also everything in between you and them.

        • Victor@lemmy.world
          link
          fedilink
          English
          arrow-up
          2
          ·
          edit-2
          18 hours ago

          I assume you follow proper backup protocol it you are using offline password management.

          How do you sync though? You keep one copy on your phone or something, I imagine? What apps and managers are you using?

          • unexposedhazard@discuss.tchncs.de
            link
            fedilink
            English
            arrow-up
            1
            ·
            edit-2
            11 hours ago

            KeepassXC is the goat :)

            The database file is encrypted so its fine to sync it however you like. I use syncthing for it which is p2p. Obviously set a very good password on it if you sync it through unsecure channels.

            • Victor@lemmy.world
              link
              fedilink
              English
              arrow-up
              1
              ·
              8 hours ago

              I had a look at this, and the only thing that intrigued be about KeePass was the ChaCha20 encryption which seems modern and nice.

              I usually use rbw which doesn’t use a web page to interact with BitWarden. It stores a local copy of the database, so the only time it contacts the servers is when adding new info or syncing or otherwise changing stuff.

              I’ll look more into KeePassXC and KeePassDX for mobile. Might be interesting, but the annoying part would be the syncing. You’d have to pay close attention to where you add new entries, and not add entries on separate devices if you want them synced to all devices. Or does that work somehow with KeePassXC?

              • unexposedhazard@discuss.tchncs.de
                link
                fedilink
                English
                arrow-up
                1
                ·
                edit-2
                7 hours ago

                Just set it up so that the resulting .kdbx database file is always instantly synced between your devices whenever you make changes. Everything is in that file and all keepass versions can open it. I use syncthing for this because it doesnt require a server, but you can use nextcloud or whatever you have available. With syncthing it always just keeps the most recently modified version.

                • Victor@lemmy.world
                  link
                  fedilink
                  English
                  arrow-up
                  1
                  ·
                  6 hours ago

                  I don’t really understand how you would set that up on a mobile device but I probably won’t use KeePassXC since it doesn’t seem to have good credit card entry support.