A Periodic Table of password managers
A Periodic Table of password managers
Posted Nov 10, 2011 11:36 UTC (Thu) by danielpf (guest, #4723)In reply to: A Periodic Table of password managers by Cato
Parent article: A Periodic Table of password managers
No, the best protection is not storing the whole information on the same computer. It is not obscurity, it is a physical barrier.
One part of information can stay in the brain (say "add the name of you cat after each stored password"), or on a portable device (a sheet in wallet, a cell phone), and the combination of the distinct pieces of information can follow a simple algorithm easy to remember (all cap letters are actually small, etc.).
But such methods as well as password managers do not hold against keyloggers.
Posted Nov 10, 2011 17:25 UTC (Thu)
by drag (guest, #31333)
[Link] (4 responses)
If a attacker is present on your machine and can access your account there really is no method that is really useful. Any password you use is a password they can get.
Posted Nov 10, 2011 19:40 UTC (Thu)
by danielpf (guest, #4723)
[Link] (1 responses)
A keylogger can be a device hidden on the keyboard cable and broadcasting every single key.
Such situations do not need an attacker present on the machine.
Posted Nov 10, 2011 20:44 UTC (Thu)
by felixfix (subscriber, #242)
[Link]
Posted Nov 11, 2011 13:01 UTC (Fri)
by Cato (guest, #7643)
[Link] (1 responses)
LastPass is a good password manager (free as in beer for desktop OSs, paid-for on mobiles) which now includes Google Authenticator support and has some other two-factor options (grids, biometrics, and Yubikey). See http://lastpass.com/
Although LastPass has the weakness of a cloud-based point of attack, the two-factor options make it more secure against keyloggers than the password managers listed here. It's still vulnerable to a targetted attack against the LastPass client plugin, but that's true of almost any authentication technique.
Posted Nov 12, 2011 0:21 UTC (Sat)
by drag (guest, #31333)
[Link]
The main danger then changes from password stealing to session hijacking.
A Periodic Table of password managers
A Periodic Table of password managers
A keylogger can be a hidden program injected by some mean (say a downloaded package).
A Periodic Table of password managers
Use two-factor
Use two-factor