this post was submitted on 24 Jan 2024
1049 points (97.6% liked)
Technology
58303 readers
16 users here now
This is a most excellent place for technology news and articles.
Our Rules
- Follow the lemmy.world rules.
- Only tech related content.
- Be excellent to each another!
- Mod approved content bots can post up to 10 articles per day.
- Threads asking for personal tech support may be deleted.
- Politics threads may be removed.
- No memes allowed as posts, OK to post as comments.
- Only approved bots from the list below, to ask if your bot can be added please contact us.
- Check for duplicates before posting, duplicates may be removed
Approved Bots
founded 1 year ago
MODERATORS
you are viewing a single comment's thread
view the rest of the comments
view the rest of the comments
Checked it out: apparently I had a mozilla account at one point in time. Hit 'forgot password':
Forgot your password: fuck you.
This is the exact fucking opposite of the behaviour I'd ever want from a password manager.
I think that's what most people want in a password manager. The only way to have a truly secure pw manager is to encrypt it and failsafe to delete. That way if your identity gets stolen or email compromised, it limits the damage.
Said another way: if a company offering a password manager can recover all your passwords with you just clicking "forgot password", that means they can read your passwords in plain text (and so can hackers if the company gets hacked).
Wait wait wait wait, you're telling me you want the people who hold your password to be able to view them without your explicit permission (entering a secret that unlocks your vault)? Because that's what you're asking for - if they can reset your password and provide you your plaintext passwords, that means they can 1) read your passwords if they chose to and 2) you can be phished and have your account stolen and passwords provided to some rando.
The convenience offered by that "feature" is outweighed by the potential consequences of it existing. Passwords should absolutely be a Trust No One (TNO) solution.
Pretty much every service on the internet does password-reset via a token sent to your mailbox, so if someone gets control of your mail, you're pretty much pwned anyway. It would be slower and more inconvenient for an attacker to reset everything individually, but I'm sure they can automate that.
This is just security theatre. Burning all my data makes my life a lot harder, but an attacker would barely notice.
If I can reset each individual credential via mail token, on the assumption that only the genuine owner has access to the mailbox, then I lose nothing by resetting access to the whole set of credentials via mail token, on that same assumption.
It's only security theater because you have this kind of mentality:
You're right that an attacker could reset everything if they had access to your primary email account, but 1) you should already have 2fa on that account to protect yourself, 2) losing access to your email would be a signal that something is wrong and gives you a chance to react before they have everything, and 3) there's a world of difference between having credentials immediately vs having to jump through hoops to reset stuff. Also:
Burning all your data means your attacker can't suddenly transfer the contents of your checking account away or buy all kinds of shit from trusted vendors just because they broke into one account. Security is about layered defense, not just giving the attacker keys to the kingdom because you couldn't remember one password.