pwman | 7 years ago | on: Customer Service Agents Can See What You're Typing in Real Time
pwman's comments
pwman | 8 years ago | on: Ask HN: Resources on vitamin D supplements and studies
pwman | 8 years ago | on: Let's enable AppArmor by default (why not?)
pwman | 8 years ago | on: OneLogin: Breach Exposed Ability to Decrypt Data
pwman | 9 years ago | on: LastPass: Security done wrong
pwman | 9 years ago | on: Ask HN: What do you use to manage passwords in your small team, other than okta?
Full Disclosure: Work for LastPass
pwman | 10 years ago | on: Phishing attack against Lastpass
pwman | 10 years ago | on: Phishing attack against Lastpass
Also even multifactor now must be new location verified so the ability to exploit this is now extremely low. Any attempt utilize those credentials will be blocked an email will be generated just like what happened in the non-multifactor case.
Hopefully you've gained enough attention for the chrome issue: https://code.google.com/p/chromium/issues/detail?id=453093 to be implemented sooner rather than later, if you could do me a favor and follow it to keep the pressure on Google to help mitigate phishing risk we'd appreciate it.
pwman | 10 years ago | on: Phishing attack against Lastpass
We do a lot to try to protect our usage of viewports using iframes, but it's not good enough and we'll figure out a way to do better. LastPass has generally told people to use the extension directly to login as it's more secure, we'll need to go further here as well.
Sean was clever using http://chrome-extension.pw which looks close -- but LastPass also detects you enter your master password on an incorrect domain and notifies you immediately of your mistake, mitigating this a great deal. This has existed for a long time before Sean's report and we did not implement as a response to Sean's bug report -- we implemented it as a general way for people to know about password resuse and to be notified of being phished.
Making this practical is a lot tougher than email phishing -- you really need an XSS on a page that people use to login, and unlike email phishing it is immediately caught.
pwman | 10 years ago | on: LastPass 4.0 with Emergency Access and a New UI
This is accomplished the same way LastPass shares sites.
pwman | 10 years ago | on: Ask HN: Why don't cities/states create their own ride-sharing platform?
https://en.wikipedia.org/wiki/Slugging
Basically pickup someone random so you can utilize HOV.
pwman | 10 years ago | on: Private key for *.xboxlive.com certificate disclosed
pwman | 10 years ago | on: Introducing 1Password for Teams
pwman | 10 years ago | on: Stop forcing arbitrary password rules
Once a single one of those is hacked your method is exposed and it goes from improbable to practical.
pwman | 10 years ago | on: Enough with the Salts: Updates on Secure Password Schemes
pwman | 10 years ago | on: Even the LastPass Will Be Stolen
https://github.com/LastPass/lastpass-cli
If your coworkers aren't using something they're likely reusing company passwords, which is one of the key reasons to force using the extensions.
pwman | 10 years ago | on: Even the LastPass Will Be Stolen
LastPass Enterprise has a policy to disable it, which is recommended there.
pwman | 10 years ago | on: Even the LastPass Will Be Stolen
> "Turning on 2FA did not worked most of the times"
If you have a security issue here we'd appreciate a report at https://lastpass.com/security/ that said every report of this has always been a case of someone not reading the manual or FAQs so please checkout https://lastpass.com/support.php?cmd=showfaq&id=2775 first.
> "Sorry but I will never give trust to a password manager written in PHP"
The password manager is actually written in C++,Objective-C,Java,C# and JavaScript -- depending on platform. You seem to be focused on our website however (which only handles encrypted data with a key never get) which is written in Hack: http://hacklang.org/ actually, not PHP.
Regarding the user experience being less without extensions installed -- yes, that's true, we highly encourage installing those -- the extension-less access should really be used for emergencies only -- it's safer to login to the extensions since it's not relying on JavaScript you just downloaded, it's always preferred.
pwman | 10 years ago | on: Firefox 42 will not allow unsigned extensions
When Chrome came along they decided to go in a different direction entirely slowly making it more and more painful to accomplish what used to be easy in the name of security. The review process went from automatic if you were trusted to weeks and then months and then more than a quarter year. They started demanding source code. It became scary to release to addons.mozilla.org because you never knew how long it would be before your next release would be approved.
Mozilla needs to realize they're hastening their own demise - Chrome now offers better features than when Mozilla was the leader including releasing to a percentage of users and faster nearly invisible to the user updates. They should go back to their roots and embrace developers again.
pwman | 11 years ago | on: Race conditions on Facebook, DigitalOcean and others (fixed)