iCloud for Windows from Apple on the Microsoft StoreWhich is that? I have been looking and everything I've found looks like scams.
iCloud for Windows from Apple on the Microsoft StoreWhich is that? I have been looking and everything I've found looks like scams.
Analogies can be skewed to any point really. Do you keep every single house, garage, letter box key separate or on a key bundle? End of the day it's whatever system works best consistently, easily updatable and without making things complicated for each user. We'll have to agree to disagree on this one as it's a case of whatever works best for each person.Yeah, I think it makes sense to store things separate. You wouldn’t put your keys in your filing cabinet.
Imo it logically makes more sense to store that sorta stuff in Notes rather than a password manger.
Just never use the in-browser option (plug in is ok)
Using the plugin is fine, as that's all local to your machine, but don't go to 1password.com, login there, and use the web-interface itself to access your vault. In that case, then your creds are transmitted to the 1password servers.Not sure what you mean by that. What is the "in-browser option"? What is the "plug in"?
Are you saying it's ok to use the browser extension but to make sure some particular setting is turned off?
That's interesting. Does simply logging into my.1password.com cause that?Using the plugin is fine, as that's all local to your machine, but don't go to 1password.com, login there, and use the web-interface itself to access your vault. In that case, then your creds are transmitted to the 1password servers.
Using the plugin is fine, as that's all local to your machine, but don't go to 1password.com, login there, and use the web-interface itself to access your vault. In that case, then your creds are transmitted to the 1password servers.
From a security standpoint, how is 1P8 superior to those of us who store our vaults locally?I work in cybersecurity, and have no concerns about using 1P8, and honestly it's by far the best option overall.
I'm in the same boat, though because I wanted to keep my local vaults not OS version issues so I'm stuck on 7, planning to switch to bitwarden1Password is deprecating its browser extension in July. I can't upgrade to version 8 because I am using an older OS. Nor do I like their subscription model. This means I must migrate my passwords to a different program.
I guess I don't need a browser extension. I could cut and paste the password into a site when I need to. Tedious, of course.
It isn't that I don't mind paying for a product. It's that I want to keep my password vault local and secure on my computer, not broadcast over the internet to the cloud or some company's server. I realize I have some work ahead of me, but to me the privacy is more important the convenience of a browser extension.
Would anyone care to make a list of possible password managers that keep my vault local?
There's KeepassX and KeepassXC, but I don't know anything about them or any alternatives.
I use completely separate storage for vaults for work, personal, and shared and scope what devices have access to what based on what they need. I can't do that with 8. That by itself represents a major downgrade in security posture for me to switch off 7 to 8I work in cybersecurity, and have no concerns about using 1P8, and honestly it's by far the best option overall. Their encryption solution is such that it is impossible for them to decrypt the keychain. Just never use the in-browser option (plug in is ok), and your creds never leave your machine. With the secret key (aka cryptographic salt), even if an attacker gets your master passphrase, they still won't be able to decrypt it.
Now, you do have to use a browser to do the initial setup - so I did that with a fresh, clean installed browser on a known good machine (actually a brand new VM). But then again I also wear tinfoil hats for a living, so it was probably a bit overkill.
It goes without saying, to never, ever, login from a device you don't control (not just 1P - but any site).
Yup, and that's a design point I don't like.That's interesting. Does simply logging into my.1password.com cause that?
I feel like it would since you have to use your secret key + password to log in there. Which sucks, because billing and some vault permissions can only be managed through the web.
They claim that your credentials are not transmitted to the servers. The JavaScript that is running in your browser is a full application that does all the encryption work locally.
Do you know that to be false?
From a security standpoint, how is 1P8 superior to those of us who store our vaults locally?
I seem to recall them discussing the relative strengths of the encryption libraries used in their web application versus their desktop application. Jeepers, I wish I could find that.
Does this not cover the issue? Between the article below and their security whitepaper, it states that the password and secret key are never transmitted to their servers. Admittedly, I am not a security expert so maybe you all are referencing something I am not familiar with.I seem to recall them discussing the relative strengths of the encryption libraries used in their web application versus their desktop application. Jeepers, I wish I could find that.
I wish Apple would get more serious about Passwords.
Break it into its own App .. make a Windows App version also
…and put the service into the Apple One bundle
That would get me off 1password
Does this not cover the issue? Between the article below and their security whitepaper, it states that the password and secret key are never transmitted to their servers. Admittedly, I am not a security expert so maybe you all are referencing something I am not familiar with.
![]()
How Secure Remote Password protects your 1Password account | 1Password Support
Learn how 1Password uses Secure Remote Password to authenticate your account and protect your information in transit.support.1password.com
I see what you are getting at now. I was not considering a fake web page....that is a good point.Right, it's not transmitted to the servers, but it is entered into a web page.
That web page could be fake (like all the O365 cred phishing pages out there), or a malicious browser plugin could harvest all the information transmitted to it, or the browser itself could have a vulnerability, and so on. It vastly increases the threat surface versus an application connecting to a known good authenticated API. I tolerate it because I have to, but would never use the actual web client (not the browser plugin - the website itself) for regular use. Use the app - it's actually easier, and it's more secure.
And never, ever, sign into 1password.com from a machine that you don't own or control for any reason other than disaster recovery (e.g. house burns down with all your devices inside and you have to use your brother's machine and emergency kit stored in your safe deposit box to recover access to your account).
I use a passphrase for my phone for that reason....The big problem with relying on apple's keychain is that the weakest link is the PIN code on your phone. I use 1P to generate a robust appleid password, and it's completely undermined by that really poor design decision.