Password managers’ promise that they can’t see your vaults isn’t always true



Over the past 15 years, password managers have grown from a niche security tool used by the technology savvy into an indispensable security tool for the masses, with an estimated 94 million US adults—or roughly 36 percent of them—having adopted them. They store not only passwords for pension, financial, and email accounts, but often cryptocurrency credentials, payment card numbers, and other sensitive data.

All eight of the top password managers have adopted the term “zero knowledge” to describe the complex encryption system they use to protect the data vaults that users store on their servers. The definitions vary slightly from vendor to vendor, but they generally boil down to one bold assurance: that there is no way for malicious insiders or hackers who manage to compromise the cloud infrastructure to steal vaults or data stored in them. These promises make sense, given previous breaches of LastPass and the reasonable expectation that state-level hackers have both the motive and capability to obtain password vaults belonging to high-value targets.

A bold assurance debunked

Typical of these claims are those made by Bitwarden, Dashlane, and LastPass, which together are used by roughly 60 million people. Bitwarden, for example, says that “not even the team at Bitwarden can read your data (even if we wanted to).” Dashlane, meanwhile, says that without a user’s master password, “malicious actors can’t steal the information, even if Dashlane’s servers are compromised.” LastPass says that no one can access the “data stored in your LastPass vault, except you (not even LastPass).”

New research shows that these claims aren’t true in all cases, particularly when account recovery is in place or password managers are set to share vaults or organize users into groups. The researchers reverse-engineered or closely analyzed Bitwarden, Dashlane, and LastPass and identified ways that someone with control over the server—either administrative or the result of a compromise—can, in fact, steal data and, in some cases, entire vaults. The researchers also devised other attacks that can weaken the encryption to the point that ciphertext can be converted to plaintext.



Source link

  • Related Posts

    The Best Way to Pay Your Taxes Online (2026)

    The IRS website has a helpful step-by-step guide to walk you through the process, and even has IRS-certified volunteers to help with your taxes if you have a disability or…

    Intellexa’s Predator spyware used to hack iPhone of journalist in Angola, research says

    A government customer of sanctioned spyware maker Intellexa hacked the phone of a prominent journalist in Angola, according to Amnesty International, the latest case of targeting someone in civil society…

    Leave a Reply

    Your email address will not be published. Required fields are marked *

    You Missed

    What Are The Benefits Of Flying On A Widebody Jet Over A Narrowbody?

    What Are The Benefits Of Flying On A Widebody Jet Over A Narrowbody?

    Nigel Farage unveils Reform UK frontbench team and warns over dissent | Reform UK

    Nigel Farage unveils Reform UK frontbench team and warns over dissent | Reform UK

    Kentucky vs. Georgia prediction, odds, spread, time: 2026 college basketball picks from proven model

    Kentucky vs. Georgia prediction, odds, spread, time: 2026 college basketball picks from proven model

    Opinion: BC NDP's fiscal disaster continues in 2026 budget

    Opinion: BC NDP's fiscal disaster continues in 2026 budget

    Judge declares mistrial in Texas ‘antifa’ protest case over attorney’s T-shirt | Texas

    Judge declares mistrial in Texas ‘antifa’ protest case over attorney’s T-shirt | Texas

    10 skiers missing, 6 stranded after avalanche in California

    10 skiers missing, 6 stranded after avalanche in California