Mick wrote: > On Thursday 23 Jul 2015 00:09:09 Dale wrote: > >> You seem to miss my point. I still have to type my passwords into a >> browser. If as you say, that is not secure, then what point is there to >> having a password or accessing my bank or other sites via the internet? > > I don't know if I am missing your point, or you mine. :-) > > Your browser's risk exposure to vulnerabilities and attacks is not constant, > but it changes. If it has not been patched, or an unpublished vulnerability > is lurking around for a month or two then you are more exposed. If you have > another web page open at the same time you are visiting your bank and the > other web page is running some suspicious script, you are again temporarily > exposed. I can't give you a statistical chance of the risk you might be > exposed to on an average day, but although I expect it to be very low, it is > still greater than zero. >
But I suspect it is closer to zero than some other high number that I'm not worried about. > >> I have to put that password in my browser to access my bank, credit card >> or other websites. The point is, that exact same browser has to have >> that exact same password typed into it. > > That's one passwd at a time, rather than all of them EACH time. I appreciate > that in the minimal hypothetical case of possessing only a single account > passwd, then there is no discernible difference in risk exposure. In this > case, if you master passwd is compromised you would only lose one passwd. > > Well, as I have said, if I can't trust my browser even that much, I need to unplug. >> I might also add, copy & paste >> would then leave my password in my Klipper program that manages copy & >> paste unencrypted. Click on the Klipper icon and there sits my password >> in PLAIN text. How secure is that exactly? > > I understand that klipper saves entries on disk and therefore it is less > secure than the *nix cliboard, which you should clear once you middle clicked > to paste its sensitive content. > Thing is, I never clear that history because I use that history for other things. I even have it set to remember the last 30 or 40 entries. Again, that would be inconvenient for me. > >> Lastpass already encrypts the password ON MY MACHINE not on their end. >> Why would I want to disable and stop using Lastpass just to do the same >> thing but harder and more time consuming locally and lose the ability to >> use Lastpass while I am somewhere else? > > Because you are reducing the risk by keeping your whole keyring off line, > although I acknowledged that in this way you are also reducing your > convenience. > > For me, it is about convenience as much as it is about security. Before Lastpass, I had three passwords. One for financial stuff, one for important but not crucial stuff and one for stuff I could care less about like social sites or something. Now, I have a unique password for each site. I'm already more secure than I once was. >> I would also lose the ability >> to access that info in the case of say a computer meltdown. I might >> add, if I do it your way and lose that USB stick or whatever, I'm still >> toast. Heck, I may be in even worse shape than I would be by losing my >> Lastpass password. > > Meltdown and the like brings us to the Disaster Recovery scenario, which I > have covered. > And as I said, I don't have time to be running around updating USB sticks that I don't trust anyway. For me, that is NOT a option. > >> Sorry, I have had USB sticks go bad to much for me to trust with this >> sort of thing, not to mention the ones I have lost. I'm not going out >> and buy a whole bunch of those things and then depending on them to hold >> the keys to my financial and every other password. I also don't have >> time to make sure they are all kept up to date and such either. > > You need more than one USB stick/off line storage to reduce the chance of your > regular USB stick going bad, or being lost. > > Look I am not trying to convince you to change your habits. I am just stating > that I would not store all *my* sensitive data online and in a single place. > If you think that the risk is low enough for you and the convenience of > Lastpass quite high, then carrying on with your approach clearly makes sense. > > I didn't mean to hijack the OP's thread and I think we've covered this topic > to death, so I'll shut up now. :-) > Again, I don't trust them or myself that much with a USB stick. Heck, I've lost a couple and have no clue where they are. Plus, it takes time and energy to keep all that up to date. Lastpass does what I need and then some plus it is very convenient as well. I might add, all the people got from what I read is the encrypted password. Basically, once people change their master password, what they have is useless. I don't know how long it would take to crack those passwords but I suspect that by the time they do, they won't have anything of use. Dale :-) :-)

