On Tuesday 21 Jul 2015 18:35:27 Dale wrote:
> Mick wrote:
> > On Tuesday 21 Jul 2015 02:40:54 Dale wrote:
> >> I use the random generator too.  Some older sites, forums or something
> >> that isn't really sensitive, may still have my old passwords but sites
> >> like banking and such each have their own random generated one.  I also
> >> try to generate the longest and most complex password the site will
> >> allow.  Some sites don't allow the characters above the number keys.
> >> 
> >> Another thing, I was at my brothers once and needed to login to a site.
> >> I installed lastpass, typed in my email and master password and I could
> >> go anywhere I wanted just as if I was sitting at my own puter.   If it
> >> wasn't for lastpass, I would have had to come home and do what needed
> >> doing.
> >> 
> >> So far, this is the best solution I have found and I only use the free
> >> part.  ;-)
> >> 
> >> Dale
> >> 
> >> :-)  :-)
> > 
> > A better, as in more secure, solution should involve local encryption
> 
> and IMHO
> 
> > local air-gapped storage.  A USB key will do nicely and you can have a
> 
> second
> 
> > USB key stored in your brother's premises, for disaster recovery
> 
> scenarios.
> 
> > This is because cloud storage:
> >  a) creates a honey pot which attracts attacks[1] and
> >  b) most of cloud storage is in the US.
> > 
> > [1] https://en.wikipedia.org/wiki/LastPass#Security_issues
> 
> From what I recall about Lasspass, it does encrypt the data locally then
> uploads it.  I recall reading that if you lose your master password,
> they can't get in it either.  All they get is encrypted data.  Of all
> the things I read about when looking for a password manager, Lastpass
> was the only thing that came close to what I wanted.  After using it a
> while, it is all I need.
> 
> https://lastpass.com/how-it-works

Right, your data may be encrypted locally, but if you use a browser to decrypt 
it (after it is downloaded to your PC) then there are attack vectors (e.g. 
XSS) for the decrypted data to be leaked out of your machine.


> I've had USB sticks break before.  They are also easy to lose.  I'd
> prefer not to store something that important on a USB stick.
> 
> Dale
> 
> :-)  :-)

I didn't clarify that you should use something like gpg to encrypt your 
file(s) on the USB stick, as I do this with all sensitive files not just 
passwords.  I more or less assumed that it is the done thing.  Broken USB 
sticks you can drive a drill through, or throw in a fire.  Stolen USB sticks 
will at least be encrypted.

If you are really paranoid you could also use dm-crypt to additionally encrypt 
the whole USB partition.

-- 
Regards,
Mick

Attachment: signature.asc
Description: This is a digitally signed message part.

Reply via email to