March 9, 2026

New Research Exposes Password Manager Vulnerabilities in LastPass, Bitwarden & Dashlane

New Research Exposes Password Manager Vulnerabilities in LastPass, Bitwarden & Dashlane
Apple Podcasts podcast player badge
Spotify podcast player badge
Castro podcast player badge
RSS Feed podcast player badge
Apple Podcasts podcast player iconSpotify podcast player iconCastro podcast player iconRSS Feed podcast player icon

Password manager vulnerabilities aren't just about bad code — and a new research paper out of Zurich just proved it. Researchers analyzed three of the most popular password managers and found fundamental design flaws baked into the very architecture that's supposed to keep your credentials safe. Curtis and Prasanna break it all down and tell you what to do about it.

If you've ever been that person who asks "but what if the password manager gets hacked?" — this episode is for you. And if you haven't been asking that question, you probably should start. A research team looked at LastPass, Bitwarden, and Dashlane — products with a combined 60 million users representing roughly 23% of the password manager market — and what they found wasn't sloppy programming. It was something harder to fix: architectural problems at the core of how encrypted vaults work.

Curtis walks through how the zero-knowledge encryption model works, why the vault recovery process creates an inherent trust problem, and why the researchers were able to exploit that trust by impersonating the server during vault recovery. Prasanna adds another layer — the field-level encryption issues inside the vaults themselves, where there's no strong verification that data hasn't been manipulated. It's not theoretical. It's a real attack surface.

The good news? Curtis still believes password managers are the right tool for today — better than sticky notes on a monitor (yes, he saw that in real life) and better than reusing passwords. But he's also clear that passkeys are the right direction for the future, even if the current implementation is still a little rough around the edges.

https://eprint.iacr.org/2026/058.pdf

https://www.theregister.com/2026/02/16/password_managers/

https://www.forbes.com/sites/daveywinder/2026/01/23/lastpass-issues-critical-warning-for-users---password-attacks-underway/

Speaker:

You found the backup wrap up your go-to podcast for all things

Speaker:

backup recovery and cyber recovery.

Speaker:

In this episode, we're talking about some research that some

Speaker:

folks did into password managers.

Speaker:

A new paper out of Zurich took a look at LastPass, bit Warden and Dashlane.

Speaker:

And they found some pretty significant vulnerabilities

Speaker:

in their core architecture.

Speaker:

Not bad code or sloppy programming, but actually a fundamental design flaw.

Speaker:

I'm still a fan by the way, but you need to understand what these vulnerabilities

Speaker:

are, why they exist, and what you should be doing right now to protect yourself.

Speaker:

We also talk about, uh, pass keys and whether or not they're

Speaker:

actually the answer to this problem.

Speaker:

By the way, if you don't know who I am, I'm w Curtis Preston, AKA, Mr.

Speaker:

Backup, and I've been passionate about backup and recovery ever since.

Speaker:

Uh, I had to tell my boss that there were no backups of the, uh, production

Speaker:

database that we had just lost.

Speaker:

I don't want that to happen to you, and that's why I do this.

Speaker:

On this podcast, we turn unappreciated admins into Cyber Recovery Heroes.

Speaker:

This is the backup wrap up.

Speaker:

Welcome to the backup wrap up.

Speaker:

I'm your host, w Curtis Preston, AKA, Mr. Backup, and I have with

Speaker:

me a guy that seems to remember my podcast better than Me.

Speaker:

Prasanna Malaiyandi.

Speaker:

How's it going?

Speaker:

Persona.

Speaker:

I'm good.

Speaker:

This is why you keep me around, Curtis,

Speaker:

Well, it's literally the only reason.

Speaker:

There are no other reasons to, to keep you around.

Speaker:

Uh,

Speaker:

I'm like your second brain.

Speaker:

You know how they talk about ai, and AI is gonna be your second

Speaker:

brain or doppelganger and be able to replace you, your digital twin.

Speaker:

That's a

Speaker:

yeah.

Speaker:

Um, I would really like to see you pass as me, sir. I just want to just wanna see.

Speaker:

By the way, there's a bumper sticker for you.

Speaker:

I, I've seen that one before.

Speaker:

Have you seen it?

Speaker:

Okay.

Speaker:

Yes, I

Speaker:

Uh, it says, first of all, I'm a delight and it has a a, a possum.

Speaker:

so for people who may not realize, we also do video.

Speaker:

So if you go to

Speaker:

Yeah.

Speaker:

search for the backup wrapup, you can actually see us and

Speaker:

what Curtis is drinking.

Speaker:

Show people your mug that you got for your birthday.

Speaker:

Uh, it's my mug that I got from my birthday, which is I came, I

Speaker:

saw, I forgot what I was doing.

Speaker:

I went back, I got distracted.

Speaker:

When did I turn 60?

Speaker:

Yeah.

Speaker:

Is this my cup?

Speaker:

What?

Speaker:

What's going on?

Speaker:

I have to pee, by the way, uh, I'm having to read this backwards for

Speaker:

the, for the record on my side.

Speaker:

I have to read this backwards.

Speaker:

I'm not, I'm, I'm able to read.

Speaker:

I just thought that was important to, to distinguish.

Speaker:

Uh, so

Speaker:

So what are we gonna

Speaker:

Ana, once again, we talk a lot on this show about password

Speaker:

managers and I do think, you know, good, better, best, right?

Speaker:

We talk a lot about good, better, best, and we, we, and we, and we say that

Speaker:

you should have a password manager.

Speaker:

And then there's always the, you know, there's always

Speaker:

that one person in the crowd.

Speaker:

It's like, well, what if the bedroom manager get hacked?

Speaker:

You know?

Speaker:

And

Speaker:

that's what they sound like to me.

Speaker:

Uh, and, and, and, and I, you know, and, and with, with, with one

Speaker:

exception, you know what I used to say was I, I, I don't know anyone.

Speaker:

I know plenty of people that got hacked because they didn't have

Speaker:

a password manager, but I didn't know anyone who ever got hacked

Speaker:

because they had a password manager.

Speaker:

Now I know a handful of people because of what happened to

Speaker:

LastPass a couple of years ago.

Speaker:

Was that a couple of years ago?

Speaker:

Was that a year ago?

Speaker:

A couple years ago at this point.

Speaker:

Yeah.

Speaker:

Where, uh, I I, it, it had to do with backups, right?

Speaker:

Where they, where they, they had hard coded the password.

Speaker:

The, uh, you know, they had hard coded a password and that

Speaker:

allowed some people to get in.

Speaker:

And then that, that allowed them access to the encrypted vaults, which they then, um.

Speaker:

Did brute force attacks against, right.

Speaker:

Uh, and they were able to get into some, especially older vaults that

Speaker:

use some older encryption and stuff.

Speaker:

Um, and the, and so I'm still a very, even, even after the, the, the thing

Speaker:

that we're gonna talk about today, I'm still a strong proponent and

Speaker:

I know that, uh, our, our regular guest, uh, my co-author, uh, Dr.

Speaker:

Mike Sailor, co-author of this little book right here, learning ransomware.

Speaker:

Yeah.

Speaker:

Response and recovery.

Speaker:

Um, I know he also is a big fan of password managers.

Speaker:

Um, and as we're going to cover in this episode, the password managers

Speaker:

I think are the best option for the current, like to, to deal with all of

Speaker:

the legacy technology that we have.

Speaker:

Still moving forward.

Speaker:

I think we all agree that fido compliant pass keys are definitely the, the

Speaker:

current best option for the future.

Speaker:

Uh, for, well for now, but it does require change on your part.

Speaker:

And I, I think if you take nothing away from this episode.

Speaker:

Go do passkeys anywhere you can, anywhere it matters.

Speaker:

Um,

Speaker:

But, but, but,

Speaker:

okay.

Speaker:

I don't think pass keys will replace the issue that we are about to talk about

Speaker:

with password managers because you could still use managers that support pass keys.

Speaker:

Uh.

Speaker:

Uh,

Speaker:

as an

Speaker:

yeah,

Speaker:

supports passkey,

Speaker:

but,

Speaker:

so I

Speaker:

but.

Speaker:

but I think though Passkey itself is tied to a device, so that makes it more secure

Speaker:

Yeah.

Speaker:

Yeah.

Speaker:

I, I think that I, that, that, that's the, that's the thing with

Speaker:

passkey that make it different.

Speaker:

So, so I, I'm just, I'm, I'm, I'm even though with your, with your, once

Speaker:

again, giving me the read why I'm wrong.

Speaker:

Um, I'm, I, I stand by, I stand by my original statement.

Speaker:

to make sure it's a clarification pass.

Speaker:

Keys are great, but pass keys does not mean password managers are not required.

Speaker:

Pass keys help alleviate the issue about stolen credentials.

Speaker:

Yes.

Speaker:

Right.

Speaker:

Okay.

Speaker:

Uh, so what are we talking about pana?

Speaker:

What are we, what, what, what started this whole thing?

Speaker:

about your book or coffee cup.

Speaker:

That coffee cup was pretty awesome.

Speaker:

No, but, okay, so today, right?

Speaker:

Like Curtis said, we always talk about password managers.

Speaker:

We've even had, I think he was a researcher from the University of York

Speaker:

Yeah.

Speaker:

I wanna say like three years ago, who actually did an analysis

Speaker:

of various password managers and found six vulnerabilities.

Speaker:

So like password managers are not.

Speaker:

Some magical thing that's like bulletproof and secure all the time, right?

Speaker:

It's constantly being tested and validated to make sure there are no vulnerabilities

Speaker:

that allow exposure of your credentials.

Speaker:

Especially 'cause people put important things in their

Speaker:

password manager, including the password their crypto wallets,

Speaker:

Right.

Speaker:

so,

Speaker:

And as we know from the guy that accidentally threw away his crypto wallet,

Speaker:

uh, that would be really important.

Speaker:

Yes,

Speaker:

to the crypto wallet.

Speaker:

Yeah.

Speaker:

And so recently an article came out from, I think it's been circling

Speaker:

the web, but it was a, I think it's a research institute in Zurich,

Speaker:

Mm-hmm.

Speaker:

Zurich.

Speaker:

I wanna say that, uh.

Speaker:

Looked and came back and was like, Hey, we took three of the most popular

Speaker:

password managers, LastPass, bit Warden and Dashlane, and we analyzed it to figure

Speaker:

out like what vulnerabilities exist.

Speaker:

And they came back with the list of vulnerabilities, which.

Speaker:

They're saying we're not sort of like what people normally

Speaker:

think about when they think like,

Speaker:

Right.

Speaker:

software is exposed.

Speaker:

But it was like fundamental issues in architecture of these password managers,

Speaker:

which could lead to your passwords being compromised and things like that.

Speaker:

Right.

Speaker:

Yeah.

Speaker:

Yeah.

Speaker:

I think that's, and, and, and the issue that they, uh, said as, as I

Speaker:

understand it, basically th this, and they, they said, this isn't,

Speaker:

this isn't a matter of bad coding.

Speaker:

Uh, this was more a fundamental, uh, issue with the concept of.

Speaker:

The, the vault model, right?

Speaker:

Where you've got this, this vault, uh, and, and the, the, the server up there

Speaker:

doesn't ever know your password, right?

Speaker:

The, it only knows the vault, the encrypted vault, right?

Speaker:

Which, let's just talk about how this works, right?

Speaker:

So,

Speaker:

actually talk about that.

Speaker:

yeah, so, so you have, you have a password manager, and then when you authenticate

Speaker:

a new device, because, because.

Speaker:

The whole concept of a password manager.

Speaker:

I have a password manager.

Speaker:

You have a password manager,

Speaker:

yep.

Speaker:

Um, I, I want to be able to use that password manager both on this laptop.

Speaker:

Uh, my other, I have another laptop, which, which is a laptop I like to close.

Speaker:

It's it because it's, it's got an open window on it, so I like to close windows

Speaker:

whenever I can, but I'm, and then, um.

Speaker:

It's, it's my windows.

Speaker:

It's

Speaker:

Your phone.

Speaker:

my windows laptop, my phone, right?

Speaker:

And any other random device that I might need to use, I, I want,

Speaker:

I want to not, I don't want to have to email passwords around.

Speaker:

I don't wanna have to copy and paste between platforms, right?

Speaker:

And so I want to have the same password manager in multiple

Speaker:

places, which means that there does need to be some centralized

Speaker:

communication and we need to be, um.

Speaker:

Sending the passwords baked back and forth.

Speaker:

'cause I'm gonna change the password on my Mac.

Speaker:

And then an hour later, maybe even five minutes later, I might want to, uh, use

Speaker:

that same password on my, um, on my phone,

Speaker:

Yeah.

Speaker:

which means that that password needs to be sent up and then back down to the device,

Speaker:

which means that we're sending passwords around now and, and it means that.

Speaker:

Well, you're sending encrypted versions of the password, right?

Speaker:

Um, and, and it never sees the unencrypted version of your password, which is

Speaker:

really important that it's only,

Speaker:

and how was that done?

Speaker:

it's whi, which.

Speaker:

The how are they able to share this information without them ever seeing

Speaker:

unencrypted version of your passwords?

Speaker:

Yeah, so there's going to be a password that, that only you use on your local

Speaker:

device that is used to unencrypt or decrypt the password on your local device.

Speaker:

And it's going,

Speaker:

and I am awesome.

Speaker:

what?

Speaker:

Is that your

Speaker:

Oh, exit my password is, I'm kind of a big deal.

Speaker:

That's my password.

Speaker:

Um, the, um.

Speaker:

The, you made me lose my train of thought.

Speaker:

So there is, there's a local password that is, uh, sort of your, your password.

Speaker:

You know, it's your, your one password.

Speaker:

In fact, one of the password managers, the name of the password manager is

Speaker:

one password because you just have to remember one password and then

Speaker:

that password is used to locally.

Speaker:

Unencrypt your, um, data, um, and the, and it's gonna unencrypt

Speaker:

that password for that moment.

Speaker:

And it's when, when it's encrypting it, it's going to use a, a

Speaker:

long key as well as some salt.

Speaker:

And again, this is, I. Definitely, I'm gonna say this is de definitely where I

Speaker:

start to get on the, on the edge of my knowledge, but it's going modern password

Speaker:

encryption is going to encrypt it both with your key as well as some salt.

Speaker:

Um, that is gonna make it, uh, super hard for someone without that to decrypt.

Speaker:

because, because, yeah.

Speaker:

Like you said, you don't want anyone to be able to access

Speaker:

even the vendor you're using

Speaker:

Right.

Speaker:

manager to be able to decrypt that password, right?

Speaker:

Because you're the only one who knows it, and it should only stay local.

Speaker:

And this is true, even in the case of like when you're using the pa,

Speaker:

the chrome version of the password manager, the vault is stored locally

Speaker:

and you're decrypting locally, right?

Speaker:

Um,

Speaker:

Yeah.

Speaker:

the um, and, and so that the password is never.

Speaker:

The, the unencrypted password is never stored or sent anywhere other

Speaker:

than when you're copying and pasting, uh, or automated pasting into the,

Speaker:

the device that you're logging into.

Speaker:

Um, uh, but, but there is this concept of a vault, right?

Speaker:

And that is a. Think of it as a little mini database that has a, has the

Speaker:

copy of all of your passwords and other interesting information, right?

Speaker:

Like I've got in there, I've got numbers that I seem to need a lot, right?

Speaker:

Like my, my bank account number and, um, uh, my, the federal ID of my LLC, right?

Speaker:

Um, it's not a number.

Speaker:

a notes feel that you

Speaker:

Yeah.

Speaker:

Yeah.

Speaker:

I have a secure notes and um, you know, like I know my social security number,

Speaker:

but I don't know that number because it's a number that I don't use very often.

Speaker:

Right.

Speaker:

Uh, and so important things like that.

Speaker:

Um, and, uh, like personas, pants size for example.

Speaker:

You know, I just, you know, I store that in there just because

Speaker:

I want to know, um, what.

Speaker:

creepy.

Speaker:

Yeah.

Speaker:

So, um, the, um, uh, and so you, you, you, you keep a, a

Speaker:

lot of stuff in there, right?

Speaker:

Um, also I have all my credit cards in there, right?

Speaker:

There's a, there's a, and so that, that allows me, when I am using, um, Amazon

Speaker:

and other apps, it allows me to not to say, no, don't save my credit card.

Speaker:

I'm gonna give you my credit card each time, and it'll just copy and

Speaker:

paste the credit card in there.

Speaker:

And so again, it's, it's.

Speaker:

It's trying to find a balance between security and convenience.

Speaker:

As we know, they are always at Ward.

Speaker:

Why?

Speaker:

Why do we say that?

Speaker:

Because if you make something so difficult to use, even if it's

Speaker:

super secure, no one's gonna use it.

Speaker:

Yeah.

Speaker:

They will have like the old school way where, hey, I need a really long password

Speaker:

and I have to change it every 30 days.

Speaker:

Let me just write it on a sticky note and stick it on my monitor.

Speaker:

Yeah.

Speaker:

I was actually in a business.

Speaker:

The other day.

Speaker:

And there it is, like all the passwords, just on sticky notes on the monitor.

Speaker:

And it just, it hurt my little heart.

Speaker:

Um, it was a business that I was advising and, uh, I advised him to stop that.

Speaker:

I was like, first thing we're gonna talk about is those sticky notes.

Speaker:

Um.

Speaker:

And, and it wasn't even like, like the, the way the person had

Speaker:

their monitor was like sideways.

Speaker:

So like, anybody that comes into their office is gonna see

Speaker:

the sticky notes, you know?

Speaker:

Anyway, um, I digress, but we, oh, we, oh yeah.

Speaker:

So I think about, and, and, and sometimes we air.

Speaker:

Too far, one side or the other.

Speaker:

I can think of a, of a time where I worked with a very large

Speaker:

company, very large company.

Speaker:

Now again, this is going back, it's going back 27 years, and I worked with

Speaker:

a very large company that absolutely everyone listening to this podcast

Speaker:

Would

Speaker:

probably does business with.

Speaker:

Yeah.

Speaker:

And, uh, they, we used to RSH as root from server to server, anywhere.

Speaker:

Yeah.

Speaker:

a password.

Speaker:

Yeah, don't

Speaker:

yeah.

Speaker:

Um, just to, to quote somebody that I know, you and I,

Speaker:

you and I watch on YouTube,

Speaker:

Mm-hmm.

Speaker:

right.

Speaker:

That ain't right.

Speaker:

But the other thing though is you talked about usability versus security.

Speaker:

Mm-hmm.

Speaker:

in your case, I'm sure there are times when you have a password that

Speaker:

you wanna share with your wife,

Speaker:

Yeah.

Speaker:

Well, for the record, we use the same password manager, but.

Speaker:

just

Speaker:

Okay.

Speaker:

but yes.

Speaker:

Right.

Speaker:

You wanna share and so you, how would you do it today?

Speaker:

You either give 'em the password and

Speaker:

Yeah,

Speaker:

down somewhere,

Speaker:

yeah,

Speaker:

you have to email it or text it, or some mechanism which is

Speaker:

yeah,

Speaker:

insecure.

Speaker:

yeah.

Speaker:

Or do you just rely on your password manager, which probably

Speaker:

has a share this password

Speaker:

Yeah.

Speaker:

someone else?

Speaker:

Link.

Speaker:

Yeah, we deci, we decided we were tired of both paying for the same password manager.

Speaker:

We just put all the passwords in there.

Speaker:

That doesn't work if you don't trust your spouse, by the way.

Speaker:

Um, but there, there was something, darn it, there was something that you said that

Speaker:

triggered, um, you were talking about.

Speaker:

usability

Speaker:

Hmm.

Speaker:

Okay.

Speaker:

don't know, but yeah.

Speaker:

Uh, just in general, you know, if you make it so insecure, no.

Speaker:

If you make it so secure.

Speaker:

That is difficult to use, then, then no one's gonna use it.

Speaker:

Right.

Speaker:

Um, and as a result, you, you end up being less secure.

Speaker:

Right.

Speaker:

Yep.

Speaker:

Uh, which is why I'm, I'm more of a fan, uh, of really secure passwords

Speaker:

that are in a password manager versus the, we're gonna force you to

Speaker:

change your password every 30 days.

Speaker:

Right.

Speaker:

Um.

Speaker:

There's nothing wrong with changing your passwords.

Speaker:

The problem is that it, it's just a lot of work for, I don't

Speaker:

know, a little bit of whatever.

Speaker:

Um, so, um, so that, that's why, that's the model that they've come up with, which

Speaker:

is, which is referred to as what, what did they call, what did they call this model?

Speaker:

The,

Speaker:

The encrypted vault.

Speaker:

no, there's another one.

Speaker:

It's the, the zero knowledge encryption, right?

Speaker:

The, the zero knowledge encryption model is basically the best way that

Speaker:

they came up of storing and sharing a password between multiple devices.

Speaker:

Uh, but it does have just that concept.

Speaker:

This is what.

Speaker:

I gleaned from the article is that that core concept has

Speaker:

some vulnerabilities in it.

Speaker:

Uh, starting with the idea that there has to be some kind of trust,

Speaker:

uh, because stop, let me back up.

Speaker:

One of the reasons that it has one of the core vulnerabilities is that it needs

Speaker:

to be, and this is a usability issue.

Speaker:

There needs to be a way for you to recover your vault.

Speaker:

We talked about this.

Speaker:

You may remember another previous episode when we had the lady

Speaker:

who, like she said, what do I do?

Speaker:

When I lose everything, hopefully I'll, I'll get a,

Speaker:

I'll get a link to that episode.

Speaker:

That was an interesting discussion.

Speaker:

She's like, what do I do when I lose everything?

Speaker:

And so you do need to go through that exercise.

Speaker:

What is the, what is the exercise that's needed to get

Speaker:

back into your password vault?

Speaker:

If you get locked out of all of your devices, or there's

Speaker:

a fire or something, right?

Speaker:

You need this process because otherwise your life would become a living hell if

Speaker:

you, I, I have like, I'm not kidding.

Speaker:

I have.

Speaker:

500 passwords in my password manager.

Speaker:

I can't imagine what it would be like to recover all of those and authenticate

Speaker:

myself one by one by one by one.

Speaker:

So you need some ability to, um, to recover that.

Speaker:

But that means that when you are in this vulnerable position, you

Speaker:

need to trust the um, this server.

Speaker:

Yeah.

Speaker:

the vendor, well, you need to trust an i an an, an entity.

Speaker:

It may or may not be the you, you need to trust a vendor, but the point is you're

Speaker:

trusting an entity that you can't see.

Speaker:

Yes.

Speaker:

Right?

Speaker:

And so they, what, what I saw was them exploiting that core vulnerability.

Speaker:

It's like, it, it's a core design flaw, right.

Speaker:

That I don't, and I, and I think the point was there's really no way around it.

Speaker:

Right.

Speaker:

unless you basically say, I'm never going to allow a password

Speaker:

reset from the server side,

Speaker:

Which would be a no starter, uh, which would be a non-starter for most people.

Speaker:

Right.

Speaker:

why

Speaker:

Because they wouldn't,

Speaker:

so, so.

Speaker:

I'm just saying from a commercial viability.

Speaker:

I know.

Speaker:

So lemme go back.

Speaker:

One of the things that we say, one of the things that we say

Speaker:

is that if you have like, um.

Speaker:

If you, uh, let me, let me, what's the phrase I'm looking for here?

Speaker:

Um,

Speaker:

um, oh, so if, for example, you have a backup encryption and if

Speaker:

you lose the key, your vendor says, oh, we'll just, uh, fix it for you.

Speaker:

That's not a good answer.

Speaker:

Yes.

Speaker:

That's kind of, that's kind of what you're talking about is, is that there, um, that

Speaker:

Now, I don't wanna say backdoor, it's too harsh,

Speaker:

Yeah.

Speaker:

Well,

Speaker:

but.

Speaker:

I think backdoor is, is fine.

Speaker:

Right.

Speaker:

Um, all right.

Speaker:

I got a story.

Speaker:

Um, I was consulting, this is like, I don't know, five

Speaker:

companies go and we had a, um.

Speaker:

We got an, we got an email from a former employee.

Speaker:

It was a consulting company.

Speaker:

It was a former consultant that used to work for our company.

Speaker:

And the client was like financial trading firm, you know, wall Street type company.

Speaker:

And, uh, he emailed us and said, Hey, um, the firewall on, um, empty squat,

Speaker:

uh, company was throwing up some errors and so I logged in and fixed them.

Speaker:

I'm sorry, what?

Speaker:

He had a back door that he had left open so he could help us out.

Speaker:

We're like, uh, okay, uh, let us work on the offboarding process.

Speaker:

But the, so you, you want, I'd say this is definitely a difference between

Speaker:

the commercial password management type concept and encryption management

Speaker:

concept and a consumer grade.

Speaker:

yeah.

Speaker:

Password manager.

Speaker:

but I agree with all that.

Speaker:

In fact, I think in that prior.

Speaker:

Podcast episode,

Speaker:

Mm-hmm.

Speaker:

we actually recommended the person to go look to see if recovery keys are

Speaker:

supported, that they can generate and mail it to someone across the country.

Speaker:

Yes.

Speaker:

That's exactly what we, what we, uh, talked about.

Speaker:

Right.

Speaker:

and so that's one mechanism.

Speaker:

I think though, even though you just mentioned Curtis

Speaker:

consumer versus like enterprise

Speaker:

Mm-hmm.

Speaker:

from security, all of like, even if you look at the vulnerabilities they talk

Speaker:

about, that's even available for org or it's even possible in organizations too

Speaker:

Mm-hmm.

Speaker:

of sort of the auto enrollment and the fact that you have.

Speaker:

A administrator in an organization who might need to reset the passwords

Speaker:

Right.

Speaker:

their employee forgets.

Speaker:

Right, right.

Speaker:

Right.

Speaker:

And that I think is still exploitable, and it's not necessarily

Speaker:

Yeah.

Speaker:

Well, well,

Speaker:

like the issues of dealing with an organization, right?

Speaker:

well, the,

Speaker:

users are gonna forget things.

Speaker:

They go on

Speaker:

yeah.

Speaker:

they come back, they forget.

Speaker:

Yeah.

Speaker:

I can't get in.

Speaker:

And so there's this level of security that they need to be able to build in because.

Speaker:

They need that password reset functionality.

Speaker:

I guess what I'm trying to understand is what they, so, so as

Speaker:

I understand what they did was they impersonated the server, right?

Speaker:

So.

Speaker:

Um, what that would allow them to, if they impersonated the server.

Speaker:

Again, this is what we were saying, you need to trust this entity and

Speaker:

so you're reaching out to reset your vault, to reset the password of your

Speaker:

vault or to, or not to reset the password, but to recover your vault.

Speaker:

And so you have to reach out to this entity.

Speaker:

You have to trust it to a certain amount, and you give it your password.

Speaker:

In order to au or you give it your recovery key in order to

Speaker:

authenticate yourself, and then what?

Speaker:

And, and then it can do what it does.

Speaker:

But my point, the point is that it could then take that recovery key and recover

Speaker:

your vault without you, I guess is the idea of what, what, what they talked

Speaker:

about here, the core, that core concept.

Speaker:

And like in the organization case, you could auto-enroll.

Speaker:

It's not just your own password that gets used right as the encryption, but also

Speaker:

the organization because they need to be able to access that recovery key as well.

Speaker:

And so now you have two sources that can access your key and it's no

Speaker:

longer, I would say it's still zero.

Speaker:

What did you call it?

Speaker:

Zero encryption?

Speaker:

No.

Speaker:

Zero knowledge encryption.

Speaker:

ZKE.

Speaker:

encryption, but it's someone in your organization who has that knowledge,

Speaker:

not the server or the vendor.

Speaker:

What would be interesting, I know that what they did, the, the, the research

Speaker:

is they reached out to the password managers as good researchers should do,

Speaker:

reach out to the password managers to allow them to try to address these core,

Speaker:

um, the, again, this core vulnerability.

Speaker:

Right?

Speaker:

And again, it's a very, it's kind of an edge case.

Speaker:

Because it, it only, you know, the, the thing that we talked about, it only would

Speaker:

work if you're, if you're trying to, uh, reset, you know, you're trying to recover

Speaker:

your password manager and they were able to impersonate the server at that moment.

Speaker:

So it's, I I still, I think it's a very edge case, right?

Speaker:

Um,

Speaker:

Yeah.

Speaker:

but.

Speaker:

I, I know that the password managers in question said that they were working on,

Speaker:

on, uh, addressing these vulnerabilities.

Speaker:

It'd be interesting to see what they have done

Speaker:

Yeah,

Speaker:

that end.

Speaker:

that was kind of like one category of vulnerabilities.

Speaker:

I think another was sort of just the nature of encrypted vaults,

Speaker:

Mm-hmm.

Speaker:

because unlike file which then gets encrypted with a single key.

Speaker:

What they're doing is they're sort of having entries and fields within

Speaker:

those entries that may get encrypted in different ways, and they're not just

Speaker:

sort of going through and encrypting

Speaker:

Yeah, it's like, it's like, it's like row level encryption in a database, if

Speaker:

you will, which then you've got metadata that's above that, which is not encrypted.

Speaker:

Right.

Speaker:

may or may not be encrypted.

Speaker:

And

Speaker:

Yeah.

Speaker:

I.

Speaker:

there, it looks like, from what I could tell, there's no strong verification

Speaker:

that you're not able to switch around fields within your encrypted

Speaker:

vault to be able to expose things.

Speaker:

So I think in one example, they talked about taking.

Speaker:

Uh, your username and password and moving the cipher text those particular

Speaker:

fields into a different field

Speaker:

Mm-hmm.

Speaker:

URL,

Speaker:

Mm-hmm.

Speaker:

could then expose part of your password potentially, uh,

Speaker:

depending on the password manager.

Speaker:

so it, and there's no check to say, is the vault still the

Speaker:

same as what it was initially?

Speaker:

Right.

Speaker:

And again, these, these are features that they could add, right?

Speaker:

The, that's the kind of thing where they could add that feature.

Speaker:

And maybe that's what, and again, it would be interesting

Speaker:

to see how they've responded.

Speaker:

Um.

Speaker:

And, uh, you know, at least one.

Speaker:

I I, you know, as I've said before, I am not a fan of ASPA based on multiple

Speaker:

issues that have happened in the past.

Speaker:

Um, that, that it, to me, it just doesn't seem like they put the, the

Speaker:

right emphasis on, again, usability versus, um, versus security.

Speaker:

Uh, I don't think that they, they, they appear to not put the right

Speaker:

emphasis on, uh, the security part.

Speaker:

one big takeaway I had from the paper though,

Speaker:

Sure.

Speaker:

you caught it, but, they, so they looked at three password managers,

Speaker:

Uhhuh.

Speaker:

Bit warden, LastPass, and Dashlane,

Speaker:

Yeah.

Speaker:

right?

Speaker:

Do you know what the number of users are across these three products?

Speaker:

What, what,

Speaker:

There are 60 million users and 23% of the market,

Speaker:

and what's your point with that?

Speaker:

which

Speaker:

that

Speaker:

that

Speaker:

more or less?

Speaker:

million people

Speaker:

Yeah.

Speaker:

using password managers, sorry, 200 a quarter

Speaker:

Oh,

Speaker:

are using password managers.

Speaker:

oh, that's in.

Speaker:

Interesting.

Speaker:

I never even, so, okay, so you took the the, they said that these three were this

Speaker:

many and then that's 25% of the market.

Speaker:

And then you extrapolated that to mean that there's a quarter of a billion people

Speaker:

that are using password managers, which means that the vast majority of people in

Speaker:

the world are not using password managers.

Speaker:

know we always ask that question, right?

Speaker:

How many

Speaker:

Yeah.

Speaker:

are using password managers?

Speaker:

So it could maybe, it might be a little off, but it shouldn't be

Speaker:

like a magnitude off, you know?

Speaker:

Right, right.

Speaker:

That is, that is actually a really interesting, um, yeah, I like that.

Speaker:

Um, I wonder how many people are, I think, I think the vast majority of

Speaker:

people, like we're gonna say non nerds.

Speaker:

Non-security focused people, they probably just use Chrome.

Speaker:

Right.

Speaker:

They probably just use the saved passwords in Chrome or Edge or Firefox or whatever.

Speaker:

Right.

Speaker:

So also a number on that too.

Speaker:

Okay.

Speaker:

Google and Apple's built-in password managers account for 55% of the market?

Speaker:

Of the 250 million.

Speaker:

Yes.

Speaker:

Okay.

Speaker:

depressing.

Speaker:

So they're counting those as password managers,

Speaker:

Yes.

Speaker:

huh?

Speaker:

Because I don't really count.

Speaker:

I mean, it's, again, that's the good, better, best.

Speaker:

It's better than nothing, but not much better.

Speaker:

Well, I should also caveat this by saying that, um, these are

Speaker:

coming from two different surveys

Speaker:

Mm-hmm.

Speaker:

So the Google and Apple one is coming from a survey of a thousand U US consumers.

Speaker:

Right versus the other one is coming from the actual 60 million number we talked

Speaker:

about earlier is coming from a different set of studies surveys, so it may not

Speaker:

be apples to apples to compare them,

Speaker:

Or apple apples to Androids.

Speaker:

yes, apples to androids if you wish.

Speaker:

Um.

Speaker:

But it still at least gives you some relative numbers,

Speaker:

Yeah, so I, I think, again, I think that the takeaway from this episode, I would,

Speaker:

you know what, I would reach out to your, if you, if your password manager, well,

Speaker:

you know, if your password manager is on this or not, I would reach out to them and

Speaker:

say, Hey, what do you think about this?

Speaker:

You know, what's your response to this article?

Speaker:

What are you doing to address this core sort of fundamental question, right?

Speaker:

Um.

Speaker:

be surprised if the other password managers who are not part of this initial

Speaker:

investigation are already publishing some FAQ or something in response.

Speaker:

Yeah, I wouldn't be surprised.

Speaker:

Yeah, agreed.

Speaker:

Um, the, uh.

Speaker:

That would be one thing to do is to contact your password manager, especially

Speaker:

if it's one of these three to say, Hey, it says that you're working on stuff.

Speaker:

What are you working on?

Speaker:

Right.

Speaker:

Uh, I know I use one of the three, so, uh, I, I'm gonna reach out to them.

Speaker:

I haven't, the article just came out a couple days ago.

Speaker:

Um, and uh, and I happen to see it on, on LinkedIn.

Speaker:

And, uh, I will, again, I will reiterate kind of what I said in the beginning.

Speaker:

One, I'm still a fan of password managers.

Speaker:

I still think it's better than the alternative.

Speaker:

Um, and I do think that it is really just a stop gap, right?

Speaker:

Like if we go back to, if we go back, it's kind of like target side deduplication.

Speaker:

If I will, if I can, if I must, if I, whatever.

Speaker:

So.

Speaker:

believe you.

Speaker:

So target side deduplication is stupid.

Speaker:

Right?

Speaker:

And I, and I know that, you know that there's some giant companies

Speaker:

that, that, that make a lot of money on target side Deduplication what?

Speaker:

Do, what, what, what's target side?

Speaker:

Deduplication persona.

Speaker:

Target side ddu is where you send the data over and in the storage system

Speaker:

you figure out what all the ddu, uh, what all the duplicates are, and then

Speaker:

you ddu it down before writing it to,

Speaker:

Right.

Speaker:

So you're de-duping at the target as opposed to de-duping at the source.

Speaker:

Right.

Speaker:

And it's dumb, but, but I'm saying it's dumb.

Speaker:

And I'll say why it's dumb.

Speaker:

I and I stand by the statement.

Speaker:

Um, because again, it's, it's, I think this is very, I think this is very, um.

Speaker:

This really is a great parallel here because it's dumb, but it's still

Speaker:

better than what we had before, right?

Speaker:

So it's, why do I say it's dumb?

Speaker:

It's dumb because your backup software is still pretending like it's writing to tape

Speaker:

for God's sakes, and it's sending full backups and, and full file incrementals.

Speaker:

And we're sending all of that across the, the land.

Speaker:

And then we're gonna do the magic on the other end.

Speaker:

We're getting, all we're getting is.

Speaker:

We're getting storage efficiency, we're getting no network efficiency.

Speaker:

Right.

Speaker:

Um, if you, if you could switch to source side deduplication, you get

Speaker:

both storage and network efficiency, uh, and also less work on the client.

Speaker:

Hang on.

Speaker:

Lemme I'll, I'll finish.

Speaker:

I'm, I'll bring it home.

Speaker:

I'll bring it home, but it does require.

Speaker:

An architectural change, right?

Speaker:

It does require you to change out your backup software, or it

Speaker:

requires your backup software to make a major architectural change.

Speaker:

That's why I'm saying it's a great parallel to here,

Speaker:

Yeah.

Speaker:

I think that PAs keys are definitely better, but we're still in the

Speaker:

early phases of adoption of PASIs.

Speaker:

I know I'm still in the early phases of PA passkey adoption, and I still find

Speaker:

it kind of weird and annoying because.

Speaker:

The, it is d it is tied to the device.

Speaker:

So it's like, you know, do I want to do this passkey?

Speaker:

Uh, I can only do the passkey on my phone or the passkey on my, on my Mac.

Speaker:

I can't, I can't share them

Speaker:

log in

Speaker:

'cause they're tied to the device.

Speaker:

The passkey is tied to the device by design.

Speaker:

Right.

Speaker:

Um,

Speaker:

you, does it, does your da, your password manager support

Speaker:

pass keys for the same account?

Speaker:

um,

Speaker:

same

Speaker:

yeah.

Speaker:

Well, but it's, but they're stored locally, you know what I mean?

Speaker:

Um,

Speaker:

stored in, is encrypted.

Speaker:

yeah.

Speaker:

I don't even, I don't even know.

Speaker:

This is what I'm saying.

Speaker:

We're still in the early phases of, we're still in the early phase.

Speaker:

I'm trying to go to Pasky when I can, but also.

Speaker:

Here.

Speaker:

So here I, I'll tell you, I'll tell you, I'll tell you where

Speaker:

passkey are driving me crazy.

Speaker:

And that's logging into QuickBooks.

Speaker:

Okay?

Speaker:

QuickBooks says, Hey, do you wanna log in with a passkey or do you wanna

Speaker:

log in with that stupid old password?

Speaker:

And, um, MFA and I go, I wanna log in with a passkey.

Speaker:

And it goes, great.

Speaker:

What's your PAs key?

Speaker:

And I go, here's my PAs key.

Speaker:

And it says, Hey, what's your MFA?

Speaker:

And I'm like, damn it.

Speaker:

Like,

Speaker:

that's the whole reason I went with the PAs key.

Speaker:

You know?

Speaker:

Right.

Speaker:

And so, and so, like it's, and, and maybe that's just an implementation thing on

Speaker:

the, in the, on the fact of, of Intuit.

Speaker:

Um, and, uh, just take my money, take my, they get, they get too much of my money.

Speaker:

That's what I think is Intuit gets too much of my money.

Speaker:

But, um.

Speaker:

And so I, I, I keep getting little, little implementation issues like that.

Speaker:

And it, and it's, it's different per app.

Speaker:

It's different per device.

Speaker:

And I think if I am having challenges and concerns and confusion,

Speaker:

then you know, Joe Jane user,

Speaker:

imagine my parents using it.

Speaker:

I can't.

Speaker:

Yeah.

Speaker:

I can't imagine.

Speaker:

Yeah.

Speaker:

Um, I can't imagine Lily using it, for example.

Speaker:

As smart as she is, she's brilliant.

Speaker:

Uh, that's my granddaughter.

Speaker:

For those who don't, she's, she's 12 and she's amazing.

Speaker:

And she's, as I like to say, she's officially entered the, that's

Speaker:

what you're wearing, phase of life.

Speaker:

Um, but yeah, so we're still in that early sort of growing pain stage of that.

Speaker:

But I guess what I'm saying is perhaps this is, this gives you yet

Speaker:

another reason why you should look into, uh, implementing PAs keys.

Speaker:

Start with like the most vulnerable things first, right?

Speaker:

Things like QuickBooks, things like, um, you know, your bank, what was that?

Speaker:

Amazon.

Speaker:

Yeah, Amazon.

Speaker:

Yeah, Amazon.

Speaker:

Yeah.

Speaker:

I mean, yeah, if you could log into Amazon and Costco.

Speaker:

In my life, you could wreak havoc.

Speaker:

I'm just saying you could, you know, next thing I know, there's

Speaker:

4,700 packages going to Wichita.

Speaker:

Um, and um, at some point, hopefully Amazon would be like, Hey, Curtis,

Speaker:

you got a new friend in Wichita.

Speaker:

I, I'd like to think that they would do that, but I

Speaker:

Yeah.

Speaker:

don't know.

Speaker:

But yeah, so I, I definitely think you should, you should look into doing it at

Speaker:

the really important things like banking.

Speaker:

Online shopping, um, you know, bookkeeping,

Speaker:

Yeah.

Speaker:

uh, and again, personas, pants, size,

Speaker:

any, what are any other takeaways for you from this?

Speaker:

Um,

Speaker:

No, I agree.

Speaker:

I think password managers are still valuable just because like

Speaker:

everything, you're always gonna find vulnerabilities over time.

Speaker:

No matter what the system is, right,

Speaker:

yeah.

Speaker:

be exposed.

Speaker:

It's just how quickly people react.

Speaker:

It doesn't mean stop using pass, uh, password managers.

Speaker:

Right, right,

Speaker:

You should still continue to use it because like you said, it's better

Speaker:

than whatever else was there before.

Speaker:

It may not be as good as what's coming in the future, but that's not mature yet.

Speaker:

right.

Speaker:

And uh, yeah, it'll just be, I wonder how many years we're gonna continue to have

Speaker:

to do the, like, at what point do some.

Speaker:

Sites say, sorry, but you have to use a passkey.

Speaker:

Right.

Speaker:

So I think, for example, I think like, uh, USAA, that's a credit union

Speaker:

that I, that I belong to, right?

Speaker:

They, um, a couple years ago they were like, we no longer do passwords.

Speaker:

We now do username and pin plus.

Speaker:

An MFA token that is generated by the semantic.

Speaker:

We use the semantic, um, you know, uh, VIP, the the semantic VIP software, right?

Speaker:

Uh, which is really just an MFA, uh, token.

Speaker:

And so you need the PIN plus the, which I think is pretty secure, right?

Speaker:

So you don't really, all you have to remember is that p the pin, but.

Speaker:

imagine now every single app or website you visit requires a separate MFA

Speaker:

Oh yeah.

Speaker:

No, I'm not, I'm definitely not a fan of the fact that I have to use the, the

Speaker:

other one, the IIUI use authe, right?

Speaker:

Uh, we talked about this.

Speaker:

I use Authe as my MFA for most things, and I do that over Google

Speaker:

Authenticator because, uh, being able to, again, security versus usability.

Speaker:

I like that I can, that the, that vault I can recover, uh, with a password.

Speaker:

But, um, and of course I have that password in my password manager.

Speaker:

Uh, catch 22 situation there.

Speaker:

Yeah, it, it is.

Speaker:

By the way, do you remember the lesson of inception?

Speaker:

It's all a dream.

Speaker:

No.

Speaker:

The technical, there's a technical lesson from inception, an IT

Speaker:

level to lesson from inception.

Speaker:

If you run a VM inside a vm, inside a vm, it's really slow.

Speaker:

The, the downside to the free MFA, uh, software is that it's not time

Speaker:

synchronized with, with the, the well it is, but it, it, it's a every 30 seconds.

Speaker:

It's, whereas like with the, with the semantic VIP, the 30 seconds

Speaker:

starts the moment you start the app, whereas, uh, these, the, the

Speaker:

free ones, it's just, it's just a.

Speaker:

Literally at, at every 30 seconds, install on the atomic clock.

Speaker:

They're on the atomic clock, you're on the atomic clock, and they just know

Speaker:

when the 30, so you're, if you start it up, you'll get the timer Anyway.

Speaker:

If you don't know what I'm talking about, you just gotta

Speaker:

go use one of the MFA things.

Speaker:

But, uh, but I will say this, if you're not using MFA or pass keys

Speaker:

on anything that matters, then you are just asking for a world to hurt.

Speaker:

Um, you know, uh.

Speaker:

Bad.

Speaker:

Bad, bad, bad.

Speaker:

Okay.

Speaker:

Well, it's been fun.

Speaker:

Persona,

Speaker:

Always is

Speaker:

what's your size?

Speaker:

72.

Speaker:

It's not

Speaker:

All right.

Speaker:

That is a wrap.