How Password Managers Work - Computerphile

Поделиться
HTML-код
  • Опубликовано: 24 ноя 2024

Комментарии • 755

  • @Wilker_uwu
    @Wilker_uwu 5 лет назад +364

    this is The Lockpicking Lawyer and what i have for you today is the concept and function of the password managers.

    • @RBXTrains
      @RBXTrains 5 лет назад +3

      Very funny 10/10, off to Edinburgh now!!

    • @maddoggLP
      @maddoggLP 5 лет назад +39

      A little click out of 1..2...3,..., 256 aaand we got our AES-Key

    • @bundy1688
      @bundy1688 4 года назад

      Meta

    • @Envinite
      @Envinite 4 года назад +14

      Nothing on ksda34bw4t4748797sjTe.........nothing on WxB7ww3n7464se4etesimyf8e4qwq.............

    • @bubboydarker9030
      @bubboydarker9030 3 года назад +2

      *50 million years later*

  • @StreuB1
    @StreuB1 5 лет назад +1004

    Dr. Pound is one of the best presenters......his dryness is also absolutely hilarious. LOL

    • @BlueZirnitra
      @BlueZirnitra 5 лет назад +22

      Ok, so WHAT WE'RE GONNA DO, right? Is this..

    • @StreuB1
      @StreuB1 5 лет назад +18

      @@BlueZirnitra HAHAAHAH!!!! I think he's likely as awesome lecturer as well. Would love to sit in on one.

    • @Swipe650
      @Swipe650 5 лет назад +27

      Pound that like button for Dr Mike

    • @abandonedmuse
      @abandonedmuse 5 лет назад +4

      Swipe650 not gonna say what I was thinking. Nope. Just gonna walk away from that one.

    • @maharajahdann
      @maharajahdann 5 лет назад +4

      @@abandonedmuse Pound Dr Mike's Button perhaps?

  • @paulsteenbergen4223
    @paulsteenbergen4223 5 лет назад +486

    💡 Security tip: Do not store email credentials in the password vault, in case it gets cracked you still have your email secure to retrieve all of your logins...

    • @x3ICEx
      @x3ICEx 5 лет назад +9

      vault*
      Edit: it's been fixed :)

    • @jamesedwards3923
      @jamesedwards3923 5 лет назад +34

      Not bad advice at all.

    • @paulsteenbergen4223
      @paulsteenbergen4223 5 лет назад +2

      Thanks... corrected

    • @kurihunt92
      @kurihunt92 5 лет назад +20

      @@BattousaiHBr or... use MFA(2FA) on your PWmanager

    • @tuxlivonchur435
      @tuxlivonchur435 5 лет назад +1

      who in the world should hack my password-vault keepassxc? how?

  • @Lambda_Ovine
    @Lambda_Ovine 4 года назад +107

    Just remember people, if you get an email that seems to be from your password manager saying that you need to "verify" your account and they need your password, or if they ask you your master password for whatever reason, DO NOT send them your master password, don't click the link and report the email as a fishing email! It's a fishing attack! Your password manager should and will never ask you your master password.

    • @jamesedwards3923
      @jamesedwards3923 3 года назад +1

      If you used KeePass or Password Safe. That is not an issue now is it?

    • @hi_its_me1337
      @hi_its_me1337 8 месяцев назад +4

      Phishing*

    • @iamaduckquack
      @iamaduckquack 5 месяцев назад

      Indeed. Also any password manager worth anything wouldn't even know your master password due to zero knowledge so that's another red flag if receiving such an email

  • @gold4963
    @gold4963 2 года назад +20

    Personal bookmarks.
    4:55. True explanation starts.
    5:25. Two derivations from the password.
    5:47. Master password authentication; how it's used in the grand scheme of things.
    6:31. How LastPass creates a master password; appends email | master password; hashes this many times.
    8:36. A main idea!
    9:06. Difference between OnePass.

  • @saadhassan3521
    @saadhassan3521 5 лет назад +41

    Would really love to see an actual programming language or any subject tutorial from Dr.Mike Pound. love the way he conveys knowledge, so easy to understand.

    • @nxrada
      @nxrada 7 месяцев назад

      i’m r que le hemos

  • @Kydos37
    @Kydos37 5 лет назад +37

    So much less stress watching these out of interest and not as part of a cramming session.

    • @peti826
      @peti826 4 года назад +3

      @Sassy The Sasquatch You would be surprised how many exams and tests people (including me) manage to pass (hehe) by learning from YT videos.

  • @AndOne23
    @AndOne23 5 лет назад +1

    I maybe understand 10% of what Dr Pound is talking about but he does it with such a passion and enthusiasm that I´m still clicking on the videos when I see his face.

    • @jamesedwards3923
      @jamesedwards3923 4 года назад +1

      You can look up articles and academic sources while you are listening. It is what I do. I am not an expert either, but I made some remote effort to understand.

  • @HechTea
    @HechTea 5 лет назад +252

    "Go and animate that."

  • @kn0bhe4d
    @kn0bhe4d 5 лет назад +287

    1:05 Who is Kate? Is Bob cheating on Alice?!

    • @t0cn413
      @t0cn413 5 лет назад +7

      yes

    • @RexGalilae
      @RexGalilae 5 лет назад +9

      ProBob drama ensues

    • @josue_mejia
      @josue_mejia 5 лет назад +17

      It's his and Alice's daughter. He loves his daughter.

    • @jmullentech
      @jmullentech 5 лет назад +13

      @@josue_mejia ^ So he's bangin his daughter? Seems legit.

    • @omiorahman6283
      @omiorahman6283 5 лет назад +5

      @@jmullentech this is not game of thrones

  • @GrimmerPl
    @GrimmerPl 5 лет назад +58

    Tip of the day: always use 2FA if able. Thanks to that you can add an extra layer of security on top of your password manager.

    • @jamesedwards3923
      @jamesedwards3923 5 лет назад +1

      Also turn on an app locker or app blocker on your android device. It is not encryption. It is a stop gap to hinder casual or criminal intrusion.

    • @GRBtutorials
      @GRBtutorials 5 лет назад +3

      James Edwards And how would that differ from just using a device-wide code?

    • @jamesedwards3923
      @jamesedwards3923 5 лет назад +2

      @@GRBtutorials App Lockers are typically integrated into the application. App Lockers are also associate with android antivirus software.
      Note: The ones I will be referring to unless stated otherwise. Are the app 'blockers' associated with android devices via third party antivirus security programs.
      It is not encryption, more of a stop gap measure.
      For example, let us say I am on a train and I setup an app locker. Somebody runs off the train and snatches my phone in the process. However my phone is not locked. Most of us do not completely log out of our phones' mobile apps.
      Keep in mind unless you are using an application specific locker. This just prohibits them from interacting with the application directly. The application is indeed 'open.' A decent hacker could bypass the app locker; or blocker as it should be commonly called.
      This will give you time to lock and wipe the device.
      Keep in mind you can find third party 'standalone' versions of this.
      My personal recommendation is that is if you are out on the town. Try having two that overlap with each other say in 1 minute and 30 second intervals. It will make it much harder for a common thief to access your applications buying more time.
      If they keep your phone active the phone will not lock until you get to a computer to remotely do it.

  • @michelfeinstein
    @michelfeinstein 5 лет назад +15

    I would love to see an open-source password-manager core, and the companies use this core on their services, just like Signal does for messaging. This way we can be more confident about the implementation details of those architectures.

    • @knightsljx
      @knightsljx 2 года назад +23

      Bitwarden says hi

    • @adrianozambranamarchetti2187
      @adrianozambranamarchetti2187 Год назад

      For those hailing from the future, which is unlikely given the age of the video but here's hoping.
      You can use KeepassXC or any KeePass variant as a password manager without sync, then use Syncthing to sync the vault across devices.
      No server needed!

  • @Robert_Browne
    @Robert_Browne 5 лет назад +282

    What about "password321"? I bet that one's rock solid, but I can't use it now because wanting to share my brilliance has foiled me yet again.

    • @lyrimetacurl0
      @lyrimetacurl0 5 лет назад +15

      A scammer once created a profile for something without my consent and put the password as "123456". I changed it to something really complicated that I would forget.

    • @MrMineHeads.
      @MrMineHeads. 4 года назад +1

      Don't worry, hunter2 is the best password

    • @conradrobinson7941
      @conradrobinson7941 4 года назад +2

      Dont you just hate it when that happens.

    • @go9565
      @go9565 3 года назад +3

      You are your own nemesis

    • @lanceareadbhar
      @lanceareadbhar 3 года назад +1

      Password321 for extra security

  • @VitorGiannasi
    @VitorGiannasi 4 года назад +19

    I use KeePass and for the most important passwords I also include a last sequence of characters which I memorise, then even if someone has access to my database they won't get the whole password.

  • @rabidbigdog
    @rabidbigdog 5 лет назад +139

    How much more tractor feed paper does the computing department have from the 1980s?

    • @sbalogh53
      @sbalogh53 5 лет назад +12

      See that storeroom over there? .......

    • @darthmonks
      @darthmonks 5 лет назад +51

      That storeroom is where we keep the list of storage locations for the paper.

  • @MrSykezbro
    @MrSykezbro 5 лет назад +5

    Whenever I see the computerphile video finally has Mike back in, I'm always instantly clicking

    • @chicoktc
      @chicoktc 5 лет назад +1

      You could have just said "I'm a simple man. I see Mike, I click".

    • @MrSykezbro
      @MrSykezbro 5 лет назад +3

      @@chicoktc I'm a man of taste, I form my own answers ;)

  • @lohphat
    @lohphat 5 лет назад +25

    The key (get it?) is not select a password manager which will not entrap you to a perpetual subscription to function. e.g. they keep your vault in their paid cloud service. You don't want to be caught out that either a missed payment or the company having an operational issue separate you from your password vault.
    Always select a product which allows you to control where the vault is. e.g. I use 1Password but elected to use a local vault and then I use Dropbox to sync between devices. If I decide to use another cloud storage provider, I can move the vault freely.
    Also, most of these products don't read each other's formats so you can easily migrate between products should one raise their prices or go out of business, forcing you to start from scratch.
    Customer lock-in is evil.

    • @azuravian
      @azuravian 5 лет назад +6

      Agreed on your concept of customer lock-in. Almost all password managers, however, have the capability for you to export your entire vault into a file, which can then be imported into another password manager. As a matter of fact, I don't know one that doesn't have this function, although I'm sure they exist. If they do, those are the ones I'd never use.

    • @jamesedwards3923
      @jamesedwards3923 5 лет назад +2

      I try to support open source software.

    • @lohphat
      @lohphat 5 лет назад +1

      Gregory Booth It may have an export function but more importantly, how can other products import the data? The database schemas are different. The devil is in the details. If you have to tweak a large number of imported entries then the “feature” isn’t really a feature.

    • @jamesedwards3923
      @jamesedwards3923 5 лет назад

      ​@@lohphat The data is 'decipherable.' KeePass (depending on which version you use) allows you to export as customized .html file. Yes, I would have to 'reconstruct' the database. However it is salvageable. You should be backing up your database in different formats for logistical reasons every time you backup the file. The 321 rule of backing up still applies. Three different copies. Two different media formats. In this case types equals file types.
      KeePass allows you to 'print' your password database file. Microsoft for example allows you to print to .pdf format and .xps format. You can also save screen captures of your database if you want to take the time to do it.
      - Not to mention the numerous applications that allow you to export, print to, etc.
      You should be saving the last few versions of keypass on a disk somewhere. So if you 'need' to port the data. You would still be able read it. It is all about redundancy.

    • @lockergr
      @lockergr 5 лет назад

      I don't really understand this. Where would you put this vault like on your MacBook, or external hard drive? And how do you secure it there? Trying to learn, but I am new to all this.

  • @MacShapow
    @MacShapow 5 лет назад +120

    Well, I use my password manager for most things but I'm a bit paranoid and I do have 5 passwords that I just remember: Laptop, bank, email, phone, and. of course, the password to my password manager.
    (I guess phone and laptop are also practical; can't get to the password manager before I turn them on anyway!)

    • @baldeepbirak
      @baldeepbirak 5 лет назад +2

      Same here

    • @totlyepic
      @totlyepic 5 лет назад +11

      Not that you really need to even worry too much about the strength of your laptop or phone passwords. If someone has physical access to the device, all bets are off anyway. They don't need to ever learn your password to get access to anything locally stored on the device. Web-authenticated services (like your email) would still be safe though, I think (would have to see what is/isn't stored locally).

    • @jamessadventures1380
      @jamessadventures1380 5 лет назад +18

      @@totlyepic Not *strictly* true, yes in the vast majority of cases 'if you hold the box you own the box' but things like fully encrypted drives, full secure boot / locked bootloaders, etc. mean that data can still be secured!

    • @MrGilRoland
      @MrGilRoland 5 лет назад +38

      Plot twist: “Laptop”, “bank”, “email”, “phone”, “and. of course”, are the actual 5 passwords he’s using.

    • @jamesedwards3923
      @jamesedwards3923 5 лет назад

      You are being logical. I do not remember my bank password, but more logical than most I have encountered.

  • @bluekeybo
    @bluekeybo 5 лет назад +25

    KeePass would be the best option here. It was audited by the EUFOSSA project. No Cloud to worry about, all local. You can save it anywhere, including the cloud if you wish. If you really still want a cloud based manager for convenience, Bitwarden is the way to go. Thanks for the video!

    • @jessem4087
      @jessem4087 5 лет назад +8

      I like to use keepass with syncthing to keep everything up to date, but you could use other foss tools like rsync or nexcloud

  • @TON-vz3pe
    @TON-vz3pe 2 года назад

    I have a some methods. I already do this so it's pretty safe.
    Method1: Map all the English alphabets to some unicode characters that which you can remember. Basically you invent your own cipher. Then create some app/program in c++, rust which can convert any english txt file to the unicode mapping txt file. Print it on some card and keep it in your purse.
    Same can be written on paper. Only you can understand it.
    Method2: Put all your secret stuff in a file. Encrypt it using some program or your own custom program. Keep the program binary in private github repo. Deny all outbound connections in your machine. Keep the encrypted txt file anywhere you like, can be gmail.
    It's takes some effort to protect valuable things. Don't go for easy options.

  • @elukok
    @elukok 5 лет назад +7

    Very simple way how to vastly reduce possibility of damages when your main password leaks - when creating password for some site, let the password manager generate a strong password, save that to the password manager, but than add some static part at the end of the generated password that will be saved to the actual site but not to the password manager. The part you added will be the same for all of your saved passwords and you will have to remember it.
    This way, even if your password DB leaks somehow, the passwords themselves wont work and it still keeps most of the convenience of password manager.

    • @txcpnae
      @txcpnae 5 лет назад

      elukok thats very clever!!

    • @aitchpea6011
      @aitchpea6011 5 лет назад

      That's a fantastic suggestion. I'm definitely going to start doing that.

  • @matthewbarnes375
    @matthewbarnes375 5 лет назад +6

    Being a software developer, I really like Pass. It's open source and leverages GPG and Git -- two things I use every day anyway -- instead of reinventing the wheel.

  • @aidancoutts2341
    @aidancoutts2341 5 лет назад +8

    Your email is used to reset so much stuff. If any of your passwords are unique and secure, it should be that one

  • @gloverelaxis
    @gloverelaxis 5 лет назад +4

    I've been through a few password managers (LastPass, 1Password, KeePass, and even storing a text file in a TrueCrypt/VeraCrypt mounted container) and found KeeWeb to be the best balance of security and useability.

  • @Guyflyer12
    @Guyflyer12 5 лет назад +4

    You say there are three methods of keeping passwords, writing down, same password, or password manager. The best solution is to create a very simply formula that you can easily remember that creates unique passwords for each website. Off the top of my head, some base password that is easy to remember + some easily repeatable function (rule) that spits out a few characters to add to the base password. A hacker would have to have 2 hacked passwords + do specific code cracking to figure out your function

    • @lockergr
      @lockergr 5 лет назад

      Brock Elmore This is actually a smart idea.

  • @lathans1
    @lathans1 5 лет назад +2

    @Computerfile: I feel that trusting larger password managers with sky storage is not about trusting the company to do the right thing. It is more about betting on who will be winning the fight when they make themselves a target, since many people will have a huge interest in gaining access to such information. They could become compromised by hackers employed by criminals, governments, or other people in power. Even while the cryptography is strong and sensible, other stuff could still happen, like modifications to the client software which would act as a trojan and not only protect the passwords as regular, but also supply them to a third party. But you are right. For everyday Joe the benefits of a non-effort password manager outweighs the small risk of putting all eggs in the same basket when the security is so strong.

    • @jamesedwards3923
      @jamesedwards3923 5 лет назад

      If you do not trust cloud password managers. Other options then encrypt those files.
      Again, there are so many options, free, paid, or open source.

  • @nberedim
    @nberedim 5 лет назад +12

    +1 for KeePass mention

  • @IIvian
    @IIvian 5 лет назад +97

    Will there be a followup episode on how the 'master password recovery' procedure works in those kind of solutions?

    • @JNCressey
      @JNCressey 5 лет назад +16

      *T-Mobile Austria has left the chat

    • @zrobotics
      @zrobotics 5 лет назад +26

      It depends. For instance, I use KeePass. If I forget my database password, I'm 100% SOL, whereas LastPass does offer recovery. I would argue that this is a security weakness, since then there are options for malicious actors to access the password DB more easily. So while I do maintain a cloud-storage backup of my password DB, it is protected by multiple passwords- the unique password to access the cloud service, and the unique password to unencrypt the password database. While a breach may be possible, it is still more secure than having a recovery alternative. And the likelihood of me forgetting the KeePass password is nonexistent, since aside from my phone unlock password it is the most frequently used password, and if I forget something I'm typing several times per day I likely have larger problems.

    • @Furiends
      @Furiends 5 лет назад

      With google your devices are part of a sync to where they all store your data. In what way they are encrypted in storage I don't know but it is NOT based on your master password. Thus resetting the master is just a matter of creating a new cloud sync with the existing data on the device.

    • @shaun_rambaran
      @shaun_rambaran 5 лет назад

      @@zrobotics Hi, zrobotics. I'm a new KeePass user. Where or how have you been backing up your KeePass database and private key? Do you trust backing them up to a web server or cloud storage, or have you been keeping them on offline harddrives?

    • @Outfrost
      @Outfrost 5 лет назад +3

      I'll just say that I will never trust my passwords, password vaults or personal data with any company, individual or scheme that offers something along the lines of "master password recovery". If anything even remotely close to that is possible, it is, in security terms, a situation equivalent to storing all of your passwords in cleartext on a single server accessed by arbitrary people.

  • @DanielLiljeberg
    @DanielLiljeberg 5 лет назад +2

    I use a password manager. But I also use/have used another system that have made me have unique, complex passwords for every service, that I remember and dont write down. I simply come up with a default complex password. Then I incorporate the service in question in some decided manner. One example could be the domain name perhaps with alternating small and big letters and some letters exchanged to numbers.
    Now when you reach a site you will know your unique password for that site simply by knowing the sites domain name and your own personal rules for your password.

  • @NA-lp2re
    @NA-lp2re 3 года назад +1

    Choose a password manager that supports security keys like Yubikey. That way an attacker not only has to guess your master password, they also need your physical key to authenticate.

  • @vinnytheglock
    @vinnytheglock 5 лет назад +1

    Mike Pound is the best. Love this guy.

  • @Dusk-MTG
    @Dusk-MTG 4 года назад +20

    Password1: 10 IQ
    using a password manager: 100 IQ
    1drowssaP: 1000 IQ

  • @bonniemunene5163
    @bonniemunene5163 2 года назад +1

    A password manager sits above all browsers that you may have stored different passwords for you.
    It's also sits above all devices that you may have for example between Operating systems, PC and mobile devices.

  • @JER0EN
    @JER0EN 5 лет назад +5

    You can use KeePass with the IOProtocolExt extension to sync it via WebDAV with various cloud providers. It even provides synchronizing if the KeePass database was updated on the server
    I have it set up so whenever I open KeePass it prompts me for my password which is stored remotely on my Nextcloud server. It retrieves this password database via WebDAV. And each KeePass installation has a separate key in Nextcloud so it can download the file.
    The password database file is also locally stored using Nextcloud client, but it is safer and faster and safer to write to the database via WebDAV.

    • @AndrewFRC135
      @AndrewFRC135 5 лет назад +1

      Thats the beauty of Keepass. You own it completely and use it however suits your use case. I have my devices (laptops and smart phone) sync the keepass vault via a backup copy on my home DNS server over sftp, but only from within my LAN. My devices don't sync when I'm not home, but it means my database never leaves any of my hardware.

  • @rayweaver2069
    @rayweaver2069 5 лет назад

    Was really happy to see a video about password managers featuring Mike Pound. 😃👌

  • @lualgomo3920
    @lualgomo3920 3 года назад

    Another option is using a long structured password with small variations. That way they are all different yet easy to remember.
    Example:
    Service: RUclips ---Add 1 letter---> Zpvuvcf
    Base password: Something_With_"$%&!"_and_"134679"
    Then you merge them:
    Something_With_"Zpvuvcf",_"$%&!"_and_"134679"
    So there, you have a somewhat secure password and easy to remember. You can make it longer, shorter, with more simbols or mess it a bit up. Also, as the letters seem random, you don't need to worry (too much) about someone getting the plain-text password in a data leak. Most likely no one will understand what "Zpvuvcf" means.

  • @ElkoGuitarist
    @ElkoGuitarist 5 лет назад +2

    I wish this guy is a lecturer in my university. Dude is a genius.

  • @OceanBagel
    @OceanBagel 5 лет назад +3

    If you're worried about a password manager breach, just encrypt all your passwords by hand before storing them in the password manager. Sure, it's more work than just keeping all your passwords in a handwritten book, but you also get to show off how cool you are to your friends.

    • @shreepads
      @shreepads 5 лет назад +3

      "encrypt by hand" - surely you're joking

    • @jamesedwards3923
      @jamesedwards3923 5 лет назад

      I can not tell if you are joking or not! What, that does not make sense on many levels. In case someone is seriously considering writing down their passwords in a book.
      1) First off, one of the important reasons everybody recommends a password manager. Is because the software can create a completely randomized password. Encrypting by hand involves your human brain. Which for this tasks is way more inefficient.
      2) Books are not bad things. I cringe to this day when I see somebody throw away a book. The problem is storage, security and convince. Software is superior.

    • @OceanBagel
      @OceanBagel 5 лет назад +2

      @@jamesedwards3923 Yeah it's a joke lol. The actual secure way would be to take the generated passwords and write them in a book. You'd still have to keep the book secure, but that's usually not a problem.

    • @Nibsipipsi
      @Nibsipipsi Год назад

      @@OceanBagel you'd think so, but somebody stealing your password book from your home is more likely that somebody breaching a password manager.

  • @fxopaws
    @fxopaws 4 года назад

    really like the continuous paper for illustration. used it 30 years ago to print t-accounts. btw great series

  • @baldeepbirak
    @baldeepbirak 5 лет назад

    Great insight. Password managers stop repeat passwords and show you when you add a weak password.

  • @TheMCmace
    @TheMCmace 3 года назад

    I love this man and i love how ambitious he is about IT things

  • @balping
    @balping 5 лет назад +5

    I use KeepassXC and it's quite convenient. It can perform autotype, that's all I need. The database file itself is synchronised between my devices using owncloud.

    • @sledgex9
      @sledgex9 5 лет назад +1

      FYI: You could use "syncthing" instead of "owncloud" and drop the php/javascript dependencies. It should run leaner on the machines.

    • @balping
      @balping 5 лет назад

      Thanks for your recommendation, this project looks quite decent. I use owncloud for calendar and contacts as well, so I'll probably stick with that, but thanks anyway.

    • @NoseyNick
      @NoseyNick 5 лет назад +3

      Yeah I heard something like "You can use KeePass at the loss of some convenience" but I didn't understand what the loss of convenience was? AutoType based on window title works great and is SURELY safer than trusting my browser / plugins to not have any security holes?

  • @idjles
    @idjles 5 лет назад +3

    Keepass + Dropbox = done. Mobile access, family sharing - all easy and automatic.

    • @kmcat
      @kmcat 5 лет назад +1

      linked with a Yubikey neo for that OTP and keyfile.

    • @jamesedwards3923
      @jamesedwards3923 5 лет назад

      @@kmcat You may like Password Safe.

  • @portman8909
    @portman8909 8 месяцев назад

    Remember one good one for your main email and have password manager for other sites. If you lose the password manager, you can easily just reset the password with your email.

  • @Outfrost
    @Outfrost 5 лет назад +3

    As a modern, cross-platform, drop-in replacement for KeePass, I'd recommend KeePassXC.

  • @ljoonal8275
    @ljoonal8275 5 лет назад +3

    I've found syncthing to be a reasonably good way to keep my keepass database on multiple clients.

  • @Aerroon
    @Aerroon 5 лет назад +1

    I think KeePass is the best solution. You have control of the vault yourself and you can have two different keys for the vault - you can have a keyfile and a master password that are both required to open the vault. This means that you could sync the vault through online services, but only move keyfiles through offline methods.
    Also, another thing you can do is have different vaults for different levels of passwords. For example, you could have a vault that only stores your unimportant forum logins and what not and then have a separate vault that includes more important information.

    • @aduh95
      @aduh95 5 лет назад

      Or you could use Bitwarden and be your own cloud

    • @ChenfengBao
      @ChenfengBao 5 лет назад

      Offline solution is just too inconvenient for the average users.

    • @jamesedwards3923
      @jamesedwards3923 5 лет назад

      I have no argument, thank you sir. :) .

  • @ChaosTheory666
    @ChaosTheory666 5 лет назад +3

    *Master Password* is a great password manager for those who are extra paranoid. It's free as in freedom software (so not _just_ simply open source), and it will work even if all your devices simultaneously combust or something. It _generates_ passwords based upon your master password and name. This means it's not stored on some cloud service where the NSA has full access to it, and it's not even really stored locally.

    • @KanalMcLP
      @KanalMcLP 5 лет назад

      But if i remember correctly then you can't change a password, only all at once?

    • @ChaosTheory666
      @ChaosTheory666 5 лет назад +1

      @@KanalMcLP
      Nope. You can just increment a number associated with that site/user and you'll get a new password. To change your master password however would probably require all passwords to change.

    • @recklessroges
      @recklessroges 5 лет назад +1

      Isn't keepass better written with way more functionality?

  • @aitchpea6011
    @aitchpea6011 5 лет назад +1

    I have two passwords written down in a notebook, hand-encrypted (weakly, I admit, but I have to decrypt it entirely in my head when I forget one or the other of the passwords). One is for my keepass database, the other is for the cloud storage service (no I'm not telling you which one) I use for the sole purpose of backing up that database and transferring it between devices. There's a lot of other files on that cloud storage account, but they're all random data with similar filenames to the actual database. You know, for extra obfuscation.

    • @jamesedwards3923
      @jamesedwards3923 5 лет назад +1

      I have a better idea. Use that code you wrote down as the second authentication.
      What do I mean?
      Do not commit your cloud storage to your head. It is a bad idea, because your cloud storage password can be 'compromised' any number of ways. Your keepass password, committed to memory is a lot harder. Put your keypass file in another file encrypted. Congratulates you created at least three factors of authentication.
      One is your external encryption password.
      Then you have your kepass password.
      You also have a keyfile.
      You are welcome by the way.

  • @sylvansorrow
    @sylvansorrow 5 лет назад +6

    Always enjoy these videos. But can you talk more about account recovery keys? Or master decryption keys and how they work. A lot of these services have methods to recover your account incase you lose your master password with master keys, how do those work?

  • @fastundercoverkitgoogle7381
    @fastundercoverkitgoogle7381 5 лет назад +1

    Everyone is mentioning keypass as their offline password manager of choice, but I personally am happy with (gnu) pass. I like the convenience of my gpg key being my master key and syncing across devices using git.

    • @jamesedwards3923
      @jamesedwards3923 5 лет назад

      You can just sync the file with any number of cloud storage services. Across many devices. That is why many of us use keepass.

    • @jamesedwards3923
      @jamesedwards3923 5 лет назад

      KEEPASS. Yes, if you are foing open source. It is one of three.

  • @ChiefyManDudeDog
    @ChiefyManDudeDog 5 лет назад +20

    I'd be interested in his thoughts on web browser password managers. Are they similar to LastPass in terms of security?

    • @flateartherpaintball5214
      @flateartherpaintball5214 5 лет назад +2

      They are definitely stored in plain text for Chrome and Firefox on Win7 and 10, at least. If you right click a password box, inspect element, and change this field: type="password" to be type="text", you will see your plain text password. Which is why I don't let browsers save my passwords.

    • @michaelpound9891
      @michaelpound9891 5 лет назад +12

      Browsers will encrypt passwords on disk. I dont have a huge problem with them, but I just find syncing between devices easier without tying to a browser. Or maybe if I get a new device. I personally would also rather avoid Google having my passwords, simply because it also gives Google a list of sites I think are important. Just one more thing it learns about me!

    • @Vode_ika
      @Vode_ika 5 лет назад +3

      @@flateartherpaintball5214 I just tried this on the latest version of Google Chrome on Win 10. All I got was a blank box (I even tried copying it in case it was unreadable and all I copied was some spaces), to make the password visible I had to click the button for it, and then use my full windows login to confirm I wanted a password to be visible.

    • @dykam
      @dykam 5 лет назад +14

      @@flateartherpaintball5214 How the browser shows it in a form has nothing to do with how the browser stores it on disk. If it wouldn't do what you described, you could literally not use it, as it needs to in the end send it as plaintext to the server.

    • @totlyepic
      @totlyepic 5 лет назад +1

      The built-in managers in browsers are just like any other local password manager he talked about. It's stored locally on-disk, encrypted.

  • @NuggetsNews
    @NuggetsNews 5 лет назад +3

    We recently did a video on the risk of generating your own private keys. Thought you guys might find that topic interesting to cover in future!

  • @nouman_baloch
    @nouman_baloch 5 лет назад +9

    Please take about the graphical passwords vs textual passwords which one is more secure and power full..... THanks wonderful job.....Keep going.....

    • @johnfrancisdoe1563
      @johnfrancisdoe1563 5 лет назад +1

      SharpScripter The only "graphical passwords" I have heard of are basically disguised onscreen 9 or 12 key keyboards with limitations in what numbers you can enter. So really weak passwords for people who don't read so well.

    • @jamesedwards3923
      @jamesedwards3923 5 лет назад

      Graphical Passwords?

  • @prosonman
    @prosonman 3 года назад

    All these Password Managers were far to complex for most of my family who didn't understand many of the features and just wanted something they could use easily. My Password Book for IOS devices was ideal and did not require any third party registration.

    • @jamesedwards3923
      @jamesedwards3923 2 года назад

      No disrespect at all. I am a blunt person. Again no disrespect intended.
      The flaw with using built in browers password managers. Is that if the account is compromised. The passwords are compromised. That is not the same if your use a program like keepass or password safe. Even if you choose to use a 'retail' password manager. That is at least a seperate account. On a seperate service.
      Also based on my personal experience, reading, observations. Your statement suggest that their passwords to their IOS accounts are garbage.
      Unless their elderly. Have memory issues. Or the like. I would never recommend it to anybody.
      I have known, conversed, or read about people. Whom have had their password managers hacked. Most of the time. It was due to poor 'basic' security measures. On top of that. Garbage passwords. One thing to get hacked. However I am tired people telling me. They were hacked, but the adversary did not have to put any real time or effort into it.

  • @LtColDavenport
    @LtColDavenport 4 года назад +5

    So what password manager does he use? That would be interesting!

  • @alexbrown4046
    @alexbrown4046 5 лет назад +1

    A video on how masked passwords work would be awesome!

  • @bruderdasisteinschwerermangel
    @bruderdasisteinschwerermangel 5 лет назад +10

    KeePass + SyncThing is the golden combination tbh

  • @ConstantlyDamaged
    @ConstantlyDamaged 5 лет назад +75

    Okay. But if KeePass decide that the project is too much and server costs are too high, and shut down, I can keep using their program AND I can get all my passwords back.
    A cloud service? Isn't free and is a weak link in the chain.
    If you want to use KeePass across devices, employing a well-configured gdrive and Google's Backup and Sync (or another cloud service), will ensure all your devices keep their key vaults up to date.

    • @pm79080
      @pm79080 5 лет назад +4

      LastPass is service as a software substitute.

    • @JNCressey
      @JNCressey 5 лет назад +11

      If you're using google drive, what's wrong with just using google's password manager?

    • @BigRizza1
      @BigRizza1 5 лет назад +2

      Keepassxc file inside encrypted file container + mega.nz cloud is a great option. The keepass file is encrypted, the file container can be encrypted with multiple layers using different methods, the cloud account is encrypted, and also free.

    • @ashishpatel350
      @ashishpatel350 5 лет назад +21

      @@JNCressey it's Google. Most people don't trust Google or Facebook.

    • @baumkuchen6543
      @baumkuchen6543 5 лет назад +7

      @@ashishpatel350 With keepass you can encrypt your DB with combination of password + keyfile. Sync your DB via google drive and keep your keyfile out of it. I think even google would have problem cracking your DB without keyfile.

  • @TheNordicVoyager
    @TheNordicVoyager 5 лет назад +11

    It all fell apart when a company names Flightsim Labs (FS Labs), a producer of overpriced flight simulator addons, smuggeled a PW sniffer into their installer. This installer demanded admin rights and was somehow able to read the Chrome passwords and possibly others, too. All of this was to combat software piracy, of course. Something this very company had done, too, btw. So the customer buys a 140 Euro software, grants admin rights because otherwise his expensive and as per EULA not refundable software won't install, and without the customers knowledge the passwords would be uploaded to the companies server. Unencrypted, if that still matters. Of course they got away with it.

    • @unocualqu1era
      @unocualqu1era 4 года назад +4

      Oh yeah I know these guys, they've been polling their users for over a year asking them if they want an updated version of the Concorde for P3D v4/v5.... the update costs as much as a new product, even though it's just the same plane made for a slightly newer version of the simulator. So far, no updated version of the plane has been made, likely because there wasn't enough people throwing money at their screen when reading that.
      I didn't know that they did this, but they seemed like scumbags to me just because of making customers pay full price for updates, as if it wasn't expensive enough

    • @aislingoda6026
      @aislingoda6026 4 года назад +5

      i've always said to people, never store passwords in browser. i'm surprised anyone still does

    • @grn1
      @grn1 2 года назад +5

      How did they get away with it? Stealing passwords is highly illegal no matter how you spin it. Even if they didn't use the passwords if they've clearly compromised the safety of their customers that's a huge lawsuit right there.

  • @MirkWoot
    @MirkWoot 5 лет назад +3

    Second factor + master password!. I think that should had been mentioned. Tho still pretty bad if someone gets on your computer.

  • @jonahbranch5625
    @jonahbranch5625 2 года назад

    Y'all should do a video on the OPAQUE password authentication protocol!

  • @quicktastic
    @quicktastic 5 лет назад

    All the encryption stuff is great for computers storing information, but a person still needs to remember the plain text password required to unlock it all. For that, people write it down on a sticky note and hang it somewhere around their computer so they don't forget it.

    • @BattousaiHBr
      @BattousaiHBr 5 лет назад +1

      assuming it's in your house and really no one has access to it besides you, it's not such a terrible idea.
      in that scenario the biggest worry would be losing whatever paper you have the password written in.

  • @puupipo
    @puupipo 5 лет назад +4

    Thanks to this video I started using a password manager. I gotta admit, it feels a bit scary (at first, I hope), even though I understand that my online accounts are probably way more secure than they've ever been.

    • @jamesedwards3923
      @jamesedwards3923 5 лет назад +1

      @@jamescollier3 You just added that to a bad actors password database :( .

  • @HassanSelim0
    @HassanSelim0 5 лет назад

    I use HMAC to deterministically generate my passwords (master + domain) every time I need them, but then I use LastPass on my phone for a few passwords for fingerprint auto-fill convinience.

  • @IceMetalPunk
    @IceMetalPunk 5 лет назад +2

    Around 1:35, you missed an option, Mike: use a mental algorithm to create your passwords, so that every password is different, but you don't have to remember them all because you can re-create them on demand :) That's what I do. Every password I ever use is different, but I don't remember most of them; I just remember how to form them and do that when needed.

  • @TheJackiMonster
    @TheJackiMonster 4 года назад +4

    You can probably write a simple password manager on your own as a shell script. It's basicly just a hashtable (service as key and password as value) which can be encrypted or decrypted using GPG. If you want access to it from different devices, you can put the encrypted file in your nextcloud. There is no need for a specific service which stores passwords only.
    Fun fact: If we could authenticate via a GPG-key in our TLS traffic, we would not even need so many passwords in the first place.

    • @TON-vz3pe
      @TON-vz3pe 2 года назад

      Yeah. Password manager seems like a fools game.

  • @pward17
    @pward17 5 лет назад

    This weekend i started a pw manager and bought a server to host a git repo. Im using pass for linux. I thought i was being re-marketed and then saw the date on the vid.
    It works too. pass git push/pull and boom.

  • @Theoddert
    @Theoddert 4 года назад +5

    Ah but you see. I will type "password" in backwards. Nobody has thought of that yet; fullproof

  • @UntouchedWagons
    @UntouchedWagons 5 лет назад +2

    I use a self-hosted Bitbucket container on my file server. If I need a password on my phone, I can VPN into my home network and get whatever I need. A few extra steps but it's not too bad. I used KeePassXC (I think that's what it's called) for a while but I wanted something multiple devices could potentially access at the same time.

    • @jamesedwards3923
      @jamesedwards3923 5 лет назад

      ??? That would mean you are sharing the data. It would be efficient to store backups of the keypass file on your own server. Then if you needed to retrieve it, then just do it. Also if you needed to backup the file. It is done.

  • @somebrid2147
    @somebrid2147 4 года назад +9

    Camera-man, get a tripod my man. Your hand must hurt af

  • @LiezerZero
    @LiezerZero 5 лет назад +2

    I use keepass2 and make backups (4 different local locations on flash drives with obscure filename) EVERY TIME I edit it.

  • @NickMC512
    @NickMC512 5 лет назад

    I see Dr. Pound, I know I am about to learn. I tap the like button, tap the play button, and commence learning.

  • @joakimk9394
    @joakimk9394 5 лет назад +1

    I was hoping to see you do this topic, thank you :)

  • @AleGrigis
    @AleGrigis 5 лет назад +6

    Mike: not "correct horse battery staple"
    Me: ...damn
    XKCD: Told ya..!

  • @addubgib
    @addubgib 5 лет назад +1

    I am a simple person. I see Dr Pound, I click

  • @Mikesco3
    @Mikesco3 4 года назад +1

    BitWarden is for me one of the best password managers out there current available

  • @karapapaxatzidimitrakopoulos
    @karapapaxatzidimitrakopoulos Год назад +2

    how does spiderman know so much about passwords ?

  • @Daerux2
    @Daerux2 5 лет назад +4

    That XKCD reference though

  • @michaelhammer5616
    @michaelhammer5616 5 лет назад

    Super awesome! I love password topics covered by your channel. Please more. Thanks!!
    Also: A recommendation which password manager Dr. Pound is using would be great!

    • @itskdog
      @itskdog 5 лет назад +1

      Michael Hammer That would probably be a security flaw in and of itself. You probably don’t want the whole world knowing which service you use, as they may start trying the “forgot password” tool and possibly get in.

  • @ByGraceThroughFaith777
    @ByGraceThroughFaith777 4 года назад

    In simple terms, it is safe to use a manager... Thanks!

  • @bobbarker7820
    @bobbarker7820 5 лет назад +3

    I use Veracrypt to create an encrypted file which I then store on the cloud. I feel much more comfortable knowing that I've encrypted it using 3 different algorithms.

    • @bobbarker7820
      @bobbarker7820 5 лет назад +1

      ​@I
      And why's that? It doesn't stop brute-forcing, but it does mean that if one algorithm is broken it's still secure.

    • @bobbarker7820
      @bobbarker7820 5 лет назад

      ​@I
      And yet should the time come where one of these algorithms is broken, I'll be grateful I've encrypted it 3 times over.
      My volume is more than fast enough. I'm only rocking .txt files and pictures in it. It's not like I'm running a server or something.

    • @jamesedwards3923
      @jamesedwards3923 5 лет назад

      Hmm, I would like to read the audits that disclose this. Most people are not going to have their VeraCrypt encryption open all the time.

    • @jamesedwards3923
      @jamesedwards3923 5 лет назад

      @I A better option is using separate encrypted files.
      1) Keypass file.
      2) Then put it in veracrypt file.
      3) Then put the file in a .7zip or zip file.
      Three layers. Three passwords. Multiple iterations.

    • @jamesedwards3923
      @jamesedwards3923 5 лет назад

      @@bobbarker7820 Correct.

  • @pakxo.
    @pakxo. 5 лет назад +2

    I started using an online password manager after this video. Honestly, first I thought using an offline based one could be safer yet they're so annoying and tidues

    • @cet6507
      @cet6507 5 лет назад +3

      For almost all users there's no real security bonus to keeping it offline, the people that really need it need to be trained how to use it right or it can be worse for them. As long as it's implemented like correctly like this video describes, don't put your passwords in excel and post to github /troll :)

    • @jamesedwards3923
      @jamesedwards3923 5 лет назад +3

      That is the point. You are trying to break a behavior that is going to put you into a weaker position. Research and read the data on how passwords are commonly broken. Generally once hashes are extracted from a database. They are broken with dictionary attacks. Then brute force. Brute force often works on weaker encryption. Dictionary attacks work typically on common password patters. A program that uses both and has the power to do it reasonably fast is the danger you want to avoid.
      You can search RUclips, .7z files as well as .zip file hashes can be extracted. What you care about is somebody taking that hash. Which is the mushed and mixed up version of your password. Then running the aforementioned and finding match.

    • @NPat1411
      @NPat1411 4 года назад +2

      @@jamesedwards3923 That's why you have a strong master password for your password manager and have it create strong, unique passwords for all your sites. 1Password has the advantage of having built-in 2FA by generating a Secret Key that only the user has access to.

  • @NatasDuVall
    @NatasDuVall 5 лет назад +8

    KeePassXC > KeePass. Natively multiplatform and compatible with KeePass databases.

    • @pkobalt
      @pkobalt 5 лет назад

      I run XC on Mac, Desktop Linux and Android, but I use plain keepass on win. I think the native .NET plays better with win.

  • @haha-gu6wf
    @haha-gu6wf 5 лет назад +1

    I like using 1Password because of its history and it's secure enough for me. Most importantly, it is pretty enough.

  • @Zwork101
    @Zwork101 5 лет назад +1

    You forgot the fourth option. Create a password dependent on the website, for example "Google's background is white" might be a google password, and you can use that pattern with multiple sites. Rinse and repeat each site's password is different and you can remember all your passwords.

    • @Zwork101
      @Zwork101 5 лет назад

      @@DanStoneUK Maybe so but if someone has a keylogger on you and you use a password manager you're also in trouble. It doesn't stop manual attacks, but it stops quick scans hackers might do over leaked password lists.

  • @concretetoy54
    @concretetoy54 5 лет назад +5

    for me, the question is: how do pass managers fill the fields on the sites? JS injection, native copy/paste methods, simulating keystrokes? I don't understand that

    • @s8w5
      @s8w5 5 лет назад +4

      Keepass simulates keystrokes, which has the advantage that it doesn't matter whether you are logging into a web service or using some proprietary software, such as a gaming client.
      AFAIK the other ones are completely different, but I haven't used them myself. At least their websites are only ever talking about filling in web forms.

  • @John-ev3rm
    @John-ev3rm 5 дней назад

    I'm always looking for a single paragraph summary explanation on matters but instead always find an endless novel

  • @h.i.1359
    @h.i.1359 5 лет назад +2

    I'm surprised that nothing was said about Argon2. Also, KeePass has some protective mechanisms against keyloggers: Secure Desktop, Two-Channel Auto-Type Obfuscation.

    • @KanalMcLP
      @KanalMcLP 5 лет назад

      Yeah, but they only work for bad Keyloggers and are easyly breakable.

    • @jamesedwards3923
      @jamesedwards3923 5 лет назад

      I have not read enough on Argon2, but from what little I have read. It is reasonably secure.

    • @jamesedwards3923
      @jamesedwards3923 4 года назад

      The problem I have with Argon2 is simple. Some ports of KeePass do not support it. Which is annoying. However, it is an open source project. So I do not complain. I am just making the statement.

  • @naveen_devinda
    @naveen_devinda 5 лет назад +3

    i made my own offline password locker, it's got steganography, voice recognition and basic sha encryption on top of it! inspired by computer file videos!

  • @knightshousegames
    @knightshousegames 3 месяца назад

    The main issue I see with an online Password Managers that cost money is that they kinda pull you into a racquet, because now if you don't pay them, they have all your passwords to all your stuff, and theres no way you can possibly figure out those passwords on your own to recover your accounts if they end up jacking up the prices or changing owners to a parent company you can't trust like Microsoft.

  • @justpaulo
    @justpaulo 5 лет назад

    So essentially this is just like PGP. There is a private key and a "public" one. You give the public to the password manager which then returns your vault, which then you decrypt using your private key.

  • @zer0day463
    @zer0day463 5 лет назад

    Thank You Dashlane ...

  • @simonweiguny
    @simonweiguny 3 года назад

    1:55 i love how he says "pathwöd's" (yes, it is an umlaut o)

  • @TednTin
    @TednTin 5 лет назад +3

    Keepass FTW
    I use Keepass with 2 step password, one is my password and other is a local key file
    and keepass add-ons allows for browser autologin and also cloud storage.

  • @peschebichsu
    @peschebichsu 3 года назад +1

    Is the automatic login from google chrome or samsung phones also some sort of password manager or do they use different (less secure?!) methods and are not advisable?

  • @TS6815
    @TS6815 5 лет назад +1

    How would you feel about a user utilizing a local password management program and merely saving the file on a dropbox, Google drive or similar? sort of a deflection of the concern of a big target on the back of Dashlane et al. at the expense of a little less intrinsic security

  • @blackbox4214
    @blackbox4214 5 лет назад

    Back to passwords!! Brilliant

  • @lucacommonjay7894
    @lucacommonjay7894 4 года назад +1

    But would you need a password manager when you have Correct Horse Battery Staple for all your accounts?

  • @genhen
    @genhen 5 лет назад +1

    List of options by Dr. Pound
    1. Write passwords down
    2. use same strong password everywhere
    3. use a password manager
    Actual options:
    1. Write passwords down
    2. use same strong password everywhere
    3. use a password manager
    4. create your own system of generating passwords for each website that doesn't need to be written down