this post was submitted on 16 Feb 2026
252 points (90.6% liked)

Technology

82414 readers
2961 users here now

This is a most excellent place for technology news and articles.


Our Rules


  1. Follow the lemmy.world rules.
  2. Only tech related news or articles.
  3. Be excellent to each other!
  4. Mod approved content bots can post up to 10 articles per day.
  5. Threads asking for personal tech support may be deleted.
  6. Politics threads may be removed.
  7. No memes allowed as posts, OK to post as comments.
  8. Only approved bots from the list below, this includes using AI responses and summaries. To ask if your bot can be added please contact a mod.
  9. Check for duplicates before posting, duplicates may be removed
  10. Accounts 7 days and younger will have their posts automatically removed.

Approved Bots


founded 2 years ago
MODERATORS
 

cross-posted from: https://infosec.pub/post/42164102

Researchers demo weaknesses affecting some of the most popular options Academics say they found a series of flaws affecting three popular password managers, all of which claim to protect user credentials in the event that their servers are compromised.…

top 50 comments
sorted by: hot top controversial new old
[–] Auster@thebrainbin.org 349 points 2 weeks ago (4 children)

You probably can't trust anything if it's compromised

[–] floofloof@lemmy.ca 71 points 2 weeks ago* (last edited 2 weeks ago) (3 children)

Well the specific point here is that these companies claim that a server hack won't reveal your passwords since they're encrypted and decrypted on your local device so the server only sees the encrypted version. Apparently this isn't completely true.

[–] philpo@feddit.org 15 points 2 weeks ago

At the point someone pulls off a valid MIM attack - which is basically a requirement here unless the whole BW/Vaultwarden server gets compromised- that is the least of someones problems. MIMs are incredibily hard these days.

load more comments (2 replies)
[–] tal@lemmy.today 45 points 2 weeks ago (1 children)

Yeah, the title there really doesn't reflect the article text. It should be "you probably can't trust your password manager if the remote servers it uses are compromised".

load more comments (1 replies)
[–] Pratai@piefed.ca 24 points 2 weeks ago (1 children)

Are you trying to say the front fell off?

[–] wreckedcarzz@lemmy.world 13 points 2 weeks ago (1 children)
[–] sunbeam60@feddit.uk 8 points 2 weeks ago (2 children)

It wasn’t designed for the front to fall off, that’s for sure!

load more comments (2 replies)
[–] ryper@lemmy.ca 91 points 2 weeks ago (4 children)

Since the summary doesn't say which three popular password managers:

As one of the most popular alternatives to Apple and Google's own password managers, which together dominate the market, the researchers found Bitwarden was most susceptible to attacks, with 12 working against the open-source product. Seven distinct attacks worked against LastPass, and six succeeded in Dashlane.

[–] sem@piefed.blahaj.zone 17 points 2 weeks ago

Next do proton pass

[–] Clent@lemmy.dbzer0.com 5 points 2 weeks ago

And glosses over what it claims are the two that dominate market (combined market share of 55%) which negates their headline, since it's likely the reader is using one of those two password managers.

Source

load more comments (2 replies)
[–] Engywuck@lemmy.zip 63 points 2 weeks ago (1 children)
[–] lena 11 points 2 weeks ago* (last edited 2 weeks ago)

These password managers claim your passwords are secure, even if their servers get compromised, which is what is expected from a security standpoint. But that is apparently not the case.

[–] chocrates@piefed.world 49 points 2 weeks ago (4 children)
[–] eodur@piefed.social 8 points 2 weeks ago (1 children)

Thats really disappointing. At least the selfhosted version means it would have to be a heavily targeted attack.

[–] Bazoogle@lemmy.world 6 points 2 weeks ago (1 children)

I don't think it should be disappointing. Bitwarden welcomes third party security testing, especially given it is open source. The tests done were just tests, and the issues were already fixed.

load more comments (1 replies)
load more comments (3 replies)
[–] eodur@piefed.social 45 points 2 weeks ago (2 children)
[–] floofloof@lemmy.ca 27 points 2 weeks ago* (last edited 2 weeks ago) (1 children)

Yes, although it sounds like they haven't finished fixing some of them:

All issues have been addressed by Bitwarden. Seven of which have been resolved or are in active remediation by the Bitwarden team. The remaining three issues have been accepted as intentional design decisions necessary for product functionality.

Edit: There's more information about the specific threats and remediation steps in the PDF report linked at the end of the Bitwarden blog post:

https://bitwarden.com/assets/Kki4W785JIPOdFj6EeWB5/1e74e924febb4c6a5ad03eed23b92d23/pwmgr_paper__1_-combined%C3%82__1_.pdf

[–] AliasAKA@lemmy.world 22 points 2 weeks ago (1 children)

Looking through, it seems like for the most part these are very niche and/or require the user to be using SSO or enterprise recovery options and/or try to change and rotate keys or resync often. I think few people using this for personal would be interacting with that attack surface or accepting organizational invites, but it is serious for organizations (probably why they’re trying quickly to address this).

Honestly I think a server being incognito controlled and undetected in bitwardens fleet while also performing these attacks is, unlikely? Certainly less likely than passwords being stolen from individual site hacks or probably even banks. Like at that point, it would just be easier to do these types of manipulations directly on bank accounts or crypto wallets or email accounts than here, but then again, if you crack a wallet like this you get theoretically all the goodies to those too I suppose, for a possibly short time (assuming the user wasn’t using 2FA that wasn’t email based as well).

Not to mitigate these issues. They need to fix them, just trying to ascertain how severe and if individual users should have much cause for concern.

[–] ArrowMax@feddit.org 6 points 2 weeks ago

Regarding a malicious server acting under Bitwarden's fleet: As I see it, the most vulnerable target would be an organization's self-hosted Bitwarden server.

load more comments (1 replies)
[–] skrlet13@feddit.cl 31 points 2 weeks ago (3 children)

I suggest KeepassXC, I like it. Can use it with TOTP too

[–] Petter1@discuss.tchncs.de 12 points 2 weeks ago (1 children)

Yess!
I store the keepass vault on my nextcloud
On iOS and macOS, I use Strongbox pro (one time purchase), as it integrates beautifully into the apple ecosystem using its APIs.
On linux and windows free KeepassXC with browser plug-ins
On Android I use the free keePassDX which, like strongbox, uses the android APIs for passwords

[–] lightnsfw@reddthat.com 7 points 2 weeks ago

Same. My password database never touches a server I don't own and my keyfile is manually copied between my devices and stored separately from the database file.

[–] IratePirate@feddit.org 9 points 2 weeks ago

Keepass + Syncthing for cloudless sync between devices. Dreamteam.

load more comments (1 replies)
[–] mastod0n@lemmy.world 27 points 2 weeks ago

What a headline

[–] imetators@lemmy.dbzer0.com 25 points 2 weeks ago (3 children)

JFC this headline. BREAKING NEWS: Healthy people die off an old age.

[–] 18107@aussie.zone 6 points 2 weeks ago

Things you should know: Your car won't drive after it's broken down.

load more comments (2 replies)
[–] ArrowMax@feddit.org 22 points 2 weeks ago

Additional vendor responses by Bitwarden to put the remediations and threat models into perspective:

Bitwarden blog post

Bitwarden cryptography report

[–] BeardededSquidward@lemmy.blahaj.zone 12 points 2 weeks ago (6 children)

I'll be honest, password managers are like the holy grail of desirable to breech. If you're using one it will be constantly under attack. It being breeched or vulnerable shouldn't be a surprise. There isn't really a secure way to store large amounts of passwords that doesn't have some vulnerability issues.

load more comments (6 replies)
[–] Lushed_Lungfish@lemmy.ca 11 points 2 weeks ago (1 children)

I just write down password hints on a scrap of paper.

[–] floofloof@lemmy.ca 6 points 2 weeks ago* (last edited 2 weeks ago)

If you don't have to use your passwords from multiple locations, your hints are intelligible only to you, and you don't leave the paper anywhere too obvious, this isn't a bad solution.

[–] thedeadwalking4242@lemmy.world 7 points 2 weeks ago
[–] SCmSTR@lemmy.blahaj.zone 6 points 2 weeks ago

Uhhhh.... What even is this headline

[–] shortwavesurfer@lemmy.zip 6 points 2 weeks ago (7 children)

I store my passwords on a flash drive with KeepassXC. How about you compromise that server... Oh wait a minute, no server?

load more comments (7 replies)
[–] baduhai@sopuli.xyz 5 points 2 weeks ago
[–] cley_faye@lemmy.world 5 points 2 weeks ago

If the entire supply chain up to the software you're running to perform actual decryption is compromised, then the decrypted data is vulnerable. I mean, yeah? That's why we use open-source clients and check builds/use builds from separate source, so that the compromission of one actor does not compromise the whole chain. Server (if any) is managed by one entity and only manage access control + encrypted data, client from separate trusted source manage decryption, and the general safety of your whole system remain your responsibility.

Security requires a modicum of awareness and implication from the users, always. The only news here is that people apparently never consider supply chain attacks up until now?

[–] eleitl@lemmy.zip 5 points 2 weeks ago
load more comments
view more: next ›