Ian I use Password Safe on Windows 8 but not on a phone, and you are right they don't seem interested in a WP8 version. Sorry, I've not seen any comparisons between PWSafe and others. I've been using PWSafe since its very early versions and never bothered looking elsewhere.
G On 24 March 2014 11:23, ILT (O) <[email protected]> wrote: > Grant, re Password Safe (etc) - I was using RoboForm on $9.95 a year and > they have just released a version for Windows Phone 8, but I have let it > lapse. I would rather back up my pw database to OneDrive than have RoboForm > manage it at their site, for some reason. > > Have you see any comparison of Password Safe with RoboForm? > > It seems the Password Safe Sourceforge dev project isn't interested in a > WP8 version. I would like to use the same application across the different > platforms. > ------------------------------ > > Ian Thomas > Victoria Park, Western Australia > > *From:* [email protected] [mailto: > [email protected]] *On Behalf Of *Grant Maw > *Sent:* Monday, March 24, 2014 8:08 AM > > *To:* ozDotNet > *Subject:* Re: [OT] Password hash cracking > > > > Or, just use Schneier's Password Safe program and let it generate all your > passwords for you. I've been using it for years and I swear by it. I have > hundreds of passwords stored in it's files and they're all long and very > complex. > > http://passwordsafe.sourceforge.net/ > > > > On 22 March 2014 16:08, Greg Keogh <[email protected]> wrote: > > Folks, in Bruce Schneier's latest > newsletter<https://www.schneier.com/crypto-gram-1403.html>there is a section > at the end where he discusses the vulnerability of > passwords. One of the links is to this interesting and frightening article: > > > > > http://arstechnica.com/security/2013/05/how-crackers-make-minced-meat-out-of-your-passwords/ > > > > The hashes in this cracking test were made with plain old MD5, but even > ignoring that, it's a sobering reminder of the progress in guessing and > cracking hashed passwords. I was surprised to learn that salting the hashes > doesn't offer much defence. I was amazed that they were using GPUs for > hashing and a graph shows that they're faster than CPUs ... is that > possible? After this I think the lessons are: > > > > * Schneier suggests you make passwords out of pieces of words and > sentences to avoid predictable formats. > > * Use a more recent and computationally intensive hasher. > > * Don't let anyone steal your hashes. > > * Don't store the whole hash (I learned in Russinovich's book that > msv1_0<http://dll.paretologic.com/detail.php/msv1_0>.dll > only stores half a user's hash in the registry). > > > > *Greg K* > > >
