We'd like to remind Forumites to please avoid political debate on the Forum... Read More »
We're aware that some users are experiencing technical issues which the team are working to resolve. See the Community Noticeboard for more info. Thank you for your patience.
📨 Have you signed up to the Forum's new Email Digest yet? Get a selection of trending threads sent straight to your inbox daily, weekly or monthly!
LastPass Password Manager - Time to move on?
Options
Comments
-
400ixl said:womble12345 said:k_man said:
This bypasses any 2FA, auto lockout protection etc.
If the master password is simple to dictionary attack, then you should be concerned and be starting to change the passwords on accounts, prioritising those which could have a financial consequence. After setting a new secure master password of course.0 -
There's a good blog post from a security researcher here on why LastPass have been so bad in this breach: https://palant.info/2022/12/26/whats-in-a-pr-statement-lastpass-breach-explained/0
-
goodValue said:As regards using your own file for storing passwords, I know my own situation will be different to the majority of users.
It would be one file, on one device (laptop).
Each password would be copied/pasted when needed.
Does this still fall foul of issues of keeping up to date/security/losing file that were mentioned?
Reduces likelihood of password reuseAllows use of strong unique passwords (depending how they are being generated)
But:
If your laptop fails, you lose all login details*
You don't have details when not at your laptopIf your laptop is compromised with malware, then all your details are easy accessible to hackers
As above if your laptop is stolen.
*If you have backups of the password file, then these become vulnerable. But no offline attack is required as the unencrypted notepad file is already instantly accessible.
The strong encryption (albeit LastPass' was poor compared other password managers) buys you time after a breach to take action, while the offline attacks take place (which will take months per database/user in most cases)
A breach of your notepad is an emergency immediately.Miser1964 said:Anything that reduces the risk from using the same password over and over is worth considering.
If you only use one PC at home, then having a password notebook is an option as it can't be hacked.
Another option to create reasonable passwords is to generate from a process such as combining -
Non dictionary root, i.e. "99FG*haA" which you can write down and keep in wallet as it's hard to remember.
Memorable, hard to find online addition, i.e. favourite colour "Green"
Unique element - 1st, 3rd and 4th letter of website name, i.e. "aaz" for Amazon
giving "99FG*haAGreenaaz" as strong, unique password you can regenerate using the process.
Clever Fox Password Book Spiral – Mini Internet Address & Password Organizer with Laminated Alphabetical Tabs – Small Password Keeper Journal – Hardcover, Pocket Size, 12x14.5cm (Mystic Blue) : Amazon.co.uk: Stationery & Office Supplies
Any password generation system that means breach of one password makes working out others easier, is a bad system1 -
k_man said:Dictionary attacks very rarely use multiple words (due to the extra processing required).
So while you are correct, in that a single word, even if very long, is not a good password
E.g.
supercalifragilisticexpialidocious
While long, is a single word, and will be found in a dictionary attack.
word1word2word3word4
Is very unlikely to be found in an automated attack, unlessIt has been used before, been leaked, and is now in one of the dictionaries used.
The attacker knows the password is 4 words, and the source word list, and the source word list is small.
ETA: for most passwords, this is moot anyway, as long random unique multi character non memorable passwords should be used, and stored in a password manager.
Long, multi word or phrase based (including nonsense words, and non consistent joining characters for extra strength) should only be for the 3 or 4 passwords that need to be remembered
https://www.pentestpartners.com/security-blog/three-word-passwords/#:~:text=Cracking characteristics,that's an extra 6 hours.
0 -
km1500 said:k_man said:Dictionary attacks very rarely use multiple words (due to the extra processing required).
So while you are correct, in that a single word, even if very long, is not a good password
E.g.
supercalifragilisticexpialidocious
While long, is a single word, and will be found in a dictionary attack.
word1word2word3word4
Is very unlikely to be found in an automated attack, unlessIt has been used before, been leaked, and is now in one of the dictionaries used.
The attacker knows the password is 4 words, and the source word list, and the source word list is small.
ETA: for most passwords, this is moot anyway, as long random unique multi character non memorable passwords should be used, and stored in a password manager.
Long, multi word or phrase based (including nonsense words, and non consistent joining characters for extra strength) should only be for the 3 or 4 passwords that need to be remembered
https://www.pentestpartners.com/security-blog/three-word-passwords/#:~:text=Cracking characteristics,that's an extra 6 hours.
NTLM hashes allow multiple passwords to be attacked at the same time, so in their test all 3 word passwords would be discovered in around 5 days (their specific example was found in 6 hours).
However, most password managers (and secure systems) use additional salting, meaning only one user's password can be attempted at a time. And due to multiple iterations of hashing these can only be attempted at a few tens of thousands of passwords a second.
Or, hundreds of thousands of times slower, and for only one password at a time.
If users really can remember multiple truly random and unique multi character passwords, then they should use them.
The rest of us will remember a few long word or phrase based passwords, and let the password manager manage all the long unique (unmemorable) ones.
And rely on strong encryption to give us time to address any breaches.
1 -
goodValue said:As regards using your own file for storing passwords, I know my own situation will be different to the majority of users.
It would be one file, on one device (laptop).
Each password would be copied/pasted when needed.
Does this still fall foul of issues of keeping up to date/security/losing file that were mentioned?
You would be more secure using a password manager which stored the wallet locally at the very least, Again, with a strong master password.1
Confirm your email address to Create Threads and Reply

Categories
- All Categories
- 350.8K Banking & Borrowing
- 253K Reduce Debt & Boost Income
- 453.5K Spending & Discounts
- 243.8K Work, Benefits & Business
- 598.6K Mortgages, Homes & Bills
- 176.8K Life & Family
- 257.1K Travel & Transport
- 1.5M Hobbies & Leisure
- 16.1K Discuss & Feedback
- 37.6K Read-Only Boards