I see no evidence of KeePassium being a hobby/community project. It's a paid-for product made by KeePassium Labs. In fact, their GitHub repository clearly states that they accept no code contributions. The only contributions they accept are bug reports, help with language translation, and app store reviews.
![]()
GitHub - keepassium/KeePassium: KeePass-compatible password manager for iOS and macOS
KeePass-compatible password manager for iOS and macOS - keepassium/KeePassiumgithub.com
Hmm, that was unprovoked.
What happensifwhen you send your Mac in for service, especially to a third party, and they ask for the User password? That's still my issue with using the same password to unlock my Mac and my password manager.
I've never had to give my password when sending my computer in for service (it's always been to Apple), as long as I've had no firmware password set. They do not need to use your disk to service other parts of the computer. If my disk were having a problem, I would reset the computer and then restore after service is complete. I know that could be a pain, but I have so much content on my disk that I wouldn't risk giving others access to it.
This request happened to me on one occasion. No way on Earth would I hand over my credentials to someone. I simply created a user account for them to use.
Moved this morning. Most of my passwords were already in keychain to begin with so it wasn't a big deal and I didn't need to risk anything with a CSV file. I had a few identity records in 1password such as passports, driving licences and credit card details. I just created a folder in Apple Notes and created locked notes for those. After that, it was Adios Muchachos 1password.
@svenmany will only trust the security of an app if it has been professionally audited
Creating a guest account is a nice circumvention method. Wiping the drive and restoring is a bit overkill but ok if you only have to do it once in the lifetime of a machine which is the more likely scenario. I do not assume you will be sending your device to Apple on weekly basis.
I stumbled across this post on KeePass’s home page, and thought it was interesting and relevant to the discussion on open source software: https://www.schneier.com/crypto-gram/archives/1999/0915.html#OpenSourceandSecurity
Here is the first portion of the post:
“Open Source and Security
As a cryptography and computer security expert, I have never understood the current fuss about the open source software movement. In the cryptography world, we consider open source necessary for good security; we have for decades. Public security is always more secure than proprietary security. It’s true for cryptographic algorithms, security protocols, and security source code. For us, open source isn’t just a business model; it’s smart engineering practice.”
I tried to read it. I'll definitely make a second attempt. It's very hard for me to get through because of the way my mind works; it's too mangled by the AI that did the transcription.On Security Now podcast ep 992 (around 1:39:11), Steve Gibson discusses password manager injection attacks.
The Passwords app is underpinned by iCloud Keychain. I don’t use third party browsers myself, but I found the following article from 2023.does it autofill on 3rd party browsers like Firefox?
Here’s a human transcribed version:
Password injection starts on page 13.
I feel that open source software is fine, but only if it gets heavily reviewed and updated by reputable people.My position on open source is a bandwagon for me. I guess I'm the only one in the band since no one on this thread has echoed my sentiment. I am always agitated when someone says that they trust an app more because it's open source. It's such a commonly stated opinion. Black and white positions are easy to have, but I wish people considered this one more deeply.
I feel that open source software is fine, but only if it gets heavily reviewed and updated by reputable people.
Let’s be honest here. Any developer can release open source software, and people that don’t know how to test and review code are completely in the dark about what it’s doing in addition to what it says it’s doing.
Can a closed source software company do the same thing? Sure. The motivation in this scenario is not only reputation, but money. Certainly a big motivator to get their software audited and rigorously tested.
The Passwords app is underpinned by iCloud Keychain. I don’t use third party browsers myself, but I found the following article from 2023.
Using iCloud Passwords with third-party browsers on macOS
Looks like a browser extension installation is required, and no Firefox was available at that time.
Here’s a human transcribed version:
Password injection starts on page 13.
So the reason I chose to share these attacks on this podcast is for what we learn from them about the true challenges that are associated with truly protecting secret information. It’s so easy for the salesman to boast “Oh, don’t worry, it’s all military-grade encrypted and, guess what! We’re using a bazillion-bit key!! So no one will ever possibly crack that!” Right.
But the lesson taught by these injection attacks is that no one ever needs to crack that bazillion-bit key. The reason the password managers jumped to modify and improve their systems when they were informed of these subtle issues is that “subtle issues” may be all that’s needed to infer the data that’s being protected by those bazillion-bit keys.
Any mature and fully informed understanding needs to appreciate that encrypting something is far from being the end of the task – it’s only the start. Twenty years ago there was a general lack of understanding of the gulf that exists between theoretical and practical “field-ready” security technology. But during these past twenty years this sort of research has opened the eyes of the people who are implementing these systems, and we all benefit.
My takeaway is all the extras such as icons, checking for comprised passwords, etc, *may* cause security holes. At least in theory.Thanks so much for the link to the PDF. I really thought it was a fabulous read.
Perturbation has always been a standard technique to cracking encryption. I guess having been compromised by sharing a vault with an adversary, or otherwise importing credentials provided by that adversary, allows the adversary to tweak the input to the encryption function. Then, if they can monitor changes to the encrypted vault (the output of the encryption function), then can deduce some things. Pretty amazing how much they've shown can be learned.
Showing website icons is one of the ways that makes the risk greater. I've always turned that off in 1Password because they've always warned about the slight security risk when using that feature. They did have a bug however that I reported on their forums and they have since fixed. Even if one had turned off website icons in the application, the browser extension still fetched them and showed them. The bug lasted at least a month after I reported it (maybe even longer).
I really liked one point the article ended with.
So, whenever you read on the website of some password manager that your data is safe since they use a standard, well-studied open-source encryption, you should then wonder if they're missing the point. Really, the entire password application has to be secure, not just the encryption libraries it uses. So, if you are one of the people who thinks open-source is going to save you, then the entire application had better be open source for you to be happy.
I believe your statement is accurate. Anytime an app accesses the internet, said app is open to exposure and subsequently compromise. I think a lot of people fail to think about that salient aspect when lauding all that password manager x can do.My takeaway is all the extras such as icons, checking for comprised passwords, etc, *may* cause security holes. At least in theory.
Showing website icons is one of the ways that makes the risk greater. I've always turned that off in 1Password because they've always warned about the slight security risk when using that feature. They did have a bug however that I reported on their forums and they have since fixed. Even if one had turned off website icons in the application, the browser extension still fetched them and showed them. The bug lasted at least a month after I reported it (maybe even longer).
My takeaway is all the extras such as icons, checking for comprised passwords, etc, *may* cause security holes. At least in theory.
Every URL requested, even from a secure website, exposes the DNS name to all listeners. The DNS name is transmitted in the clear and used to pick the right server certificate to set up the secure channel of communication. Even if you don't visit the sites in your vault, the access of their icons exposes your relationship with all of those sites.why is grabbing the site icon is risky when you literally type in the password and login name in that very same website?
Codebook v5 which just dropped may no longer be a viable alternative to 1Password. I've had Codebook for 3 years, and was happy with it, I think they just succumbed to the subscription model. I'm waiting for an answer at their support site.
Um, the good news is that this update is not supposed to break personal vaults, but there is an issue on my MBP, no sync button. I'll report back in the other thread when it's resolved...They responded to your posted concern on their forums within 50 minutes. Seems a non-issue.
Just an update for what its worth....Re the new Strongbox Sync .... it sounds good. I had some questions and thought I would share what Strongbox folk confirmed with me:
I have multiple devices ......
My own use case, I am thinking I will just dump keepassXC on windows and switch to Strongbox Sync. I only use W11 for gaming so don't really need a PMgr on it. Its very rare that i use it on the PC