On Tue, 17 Jan 2012 08:00:07 -0500, Tanstaafl wrote:

> > It comes to the same thing really. whether you store the passwords
> > themselves or the methods and data used to generate them, both systems
> > are as strong as the master password and useless if that is
> > compromised. So stick with whatever suits your way of working. Choice
> > is good :)  
> 
> This is actually not correct...
> 
> Since PWM doesn't store the passwords, there is nothing to 'crack'... 
> there would never be any way for an attacker who got ahold of your RDF 
> file to run an attack program against it - how would the attack program 
> ever be able to determine 'success'?

I'm guessing to an extent here as I haven't yet tried PWM (no ebuild and
I'd want a desktop client) but if the file can be read, you have the
correct password, same as with KeePassX. It doesn't matter whether the
file contains "4" or "2 2 +", once you can load it into PWM you can
regenerate the passwords (the program would be somewhat useless
otherwise).


-- 
Neil Bothwick

WinErr 008: Broken window - Watch out for glass fragments

Attachment: signature.asc
Description: PGP signature

Reply via email to