LastPass Review: Remains the leading password manager, despite security history

CNET is also available in English.

Don’t show that anymore.

Read more: The best password manager to use in 2020

While you will find a higher point of technical security among some premium installations and software, you will also find that they are at the expense of usability, the ultimate vital factor, I would say, in the long-term establishment. .

Given how much the box of security programs is being invaded through sheepskin malware, I cannot present a flexible privacy service (which is rarely open source), especially after everything I’ve said about never trusting loose virtual personnel. Networks.

But here we are. And if you’re going to accept it as true with a loose password manager, this is the one I recommend.

LastPass offers a loose point that will allow you to buy all your passwords and sync them on your phone, tablet and laptop. At $36 a year, the LastPass Premium Edition is a counterfeit offering, softened by including YubiKey and 1GB of storage encryption. An annual $48 subscription will allow you to get the family plan: six individual accounts, shared folders, and a dashboard that goes beyond your own security research and allows you to manage the circle of family accounts.

Cheaper features may be available: Bitwarden’s premium premium edition starts at $10, but LastPass is on par with the maximum of its peers in terms of price. Competitors Keeper and 1Password, for example, charge $30 and $36 respectively for their premium premium premium. premium subscriptions.

If you’re new to password managers, here’s how it works: you sign up for an account and create a number one password. Then use this primary password to sign in to your password manager instead of entering your login details elsewhere. That’s how LastPass works too, however, it’s hard to find loose privacy software that has as many features as LastPass.

The autofill feature of your browser extension, which allows you to click a drop-down menu in the username and password fields to indicate your login details for any site in your selection, is transparent enough to temporarily normalize the use of LastPass like you where other password managers may have trouble navigating JavaScript requests , LastPass is discrete.

Global security is also improved through LastPass username and password generator, making it less difficult to create more powerful passwords each time, rather than being tempted to reuse others. This feature is more productive when combined with LastPass auto-prompts: not only does LastPass stumble upon knowledge access fields and invite you to sign in with a new password in your (rather than directly in your browser, which you deserve never do), but it encourages you to generate one for singles with just one click.

LastPass multi-factor authentication, a practice we introduce for all programs that contain sensitive data, is also ideal for strengthening secure connections. If you are able to purchase the Premium Edition, LastPass will also compare your data with login databases known to be compromised through your Dark Web tracking option, which alerts you if your email has been reported. Even if you don’t get into the update, the loose edition still has a full board of graphics that illustrate your overall security. For example, a visual indicator analyzes your password collection and shows the percentage that is considered too low.

One of the tricky things about browser extensions for privacy control equipment is that loose versions tend to offer incomplete services, so you want to supplement your coverage with conflicting extensions from other companies, leading to a general privacy flaw.

That’s why the fluid capacity of LastPass browser extensions cannot be overstated. They get along with almost every single extension I’ve used. The same can be said of your mobile applications. Even though the App Store license patterns have been replaced. For years, I’ve never encountered any major conflicts between LastPass and other apps. This ease of use also extends to platforms. I haven’t figured out an operating formula or device that can’t run LastPass yet. I address it to journalists, lawyers, activists, family circle – you call it – not only for its compatibility, but because I discovered it intuitive and user-friendly in its configuration.

I can create folders for site computers (thoroughly partitioned regions are designed to involve your credentials and bank details) and I can import and export password blocks. area to take notes in the cloud and set up an emergency tap to access my account if I can’t.

Usability and design are not limited to how smart a program looks. The maximum hard-to-correct security flaw is human failure. While security bugs stick to attempts to make software more convenient, it’s extremely productive to make a privacy tool engaging from a behavioral point of view, even if it’s a little less secure. It uses an easy-to-use password manager, and it’s infinitely better for others to use imperfect security than anything at all.

The loose edition of LastPass plays like the paid edition of many other password managers.

In 2015, LastPass, a favorite of password managers, and LogMeIn, a recently hated company after declaring that it would rate its desktop software remotely, so when LogMeIn announced its goal of buying LastPass for $110 million that year, the Internet gave the death order. however, he is not dead. And, unlike LogMeIn, it hasn’t suddenly stopped providing its loose software. Fast-forward through August 2020, when the ink was seized in the $4. 3 billion acquisition of LogMeIn through personal equity corporation Francisco Partners and Evergreen Coast Capital, the mega-headquarters subsidiary. Elliott Management. LastPass vulture still has a million developing user base.

Yes, that means LastPass is a US-based company. But it’s not the first time And his knowledge is stored in a five eyes jurisdiction: a massive surveillance and intelligence exchange agreement between countries like the US. USA, United Kingdom, Australia and Canada. And yes, the LastPass and LogMeIn terms of service brazenly state that they will comply with requests from government agencies to access your information. However, unlike VPNs, a Five Eyes jurisdiction over a password manager is not a decisive factor for me.

With administrators like LastPass, your data is encrypted on the visitor’s side, i. e. locally, on your computer, so the biggest risk to your privacy is necessarily that your password manager receives a subpoena and a gag order. In theory, there wouldn’t be anything to turn over to the government anyway.

For example, LogMeIn told Forbes in 2019 that LastPass earned fewer than 10 such requests in line with the year. For a privacy company that surpassed the 25 million-user brand by September 2020, this is a ridiculously small number of requests. One more criterion is which corporate you do with those apps.

When LastPass imposed a legal order from the U. S. Drug Enforcement Administration, it imposed a legal order from the U. S. Drug Enforcement Administration. But it’s not the first time In 2019, asking you to hand over information, add passwords and a person’s home address, the company necessarily shrugged. .

As I said about VPNs, surviving a subpoena confidentiality check is one of the most secure tactics that a privacy tool can gain my trust. about an illegible knowledge cache while your parent company reports aloud federal anti-encryption policies is calling me.

However, this goodwill is questioned by the fact that LastPass is proprietary software, which means that its source code is not absolutely open source (available for public inspection). However, congratulations to the coders who read this, who will rightly point out that LastPass browser extensions are JavaScript, so they are de facto open source and that LastPass released their customer’s line-of-order code in 2015.

In any case, third-party audits would be useful here. On at least two of your security documents, LastPass claims to have them. Currently, however, LastPass only has a minimum organizational audit for 2018-2019, as well as a list of the corporations it works with, but they are not the droids for what we are.

In a security audit for a password manager, you need to view source code auditing, cryptographic research, and white box penetration testing, only for LastPass mobile programs and desktop client, but for your backend technology. Why doesn’t LastPass lead here?

With acceptance as true with 25 million people at stake, LastPass is guilty of providing the public with more independent third-party cybersecurity audits, such as those conducted for its RememBear, NordPass, and Bitwarden peers. And while LogMeIn maintains a colección. de audits for several of its properties, the company says that its additional cloud security audit for LastPass will only be performed if you indicate a non-disclosure agreement.

To make sure I didn’t miss anything, I ordered the products from LastPass.

“Security is basic to what we do and we try to have some transparency with our users. We agree that such security audits and penetration testing are vital to comparing our service, but due to the sensitive nature of those reports, we cannot get them obtained without NDA,” a corporate spokesperson told me in an email.

The source code is personal and audits are missing, but we know LastPass collects some of your data. This includes critical touch data and billing features, as expected, but also includes the unique identification number of your device, operating system, etc. Ip handling from which you sign in, location data, and apps that LastPass uses to purchase passwords. LogMeIn has stated that it does not collect users’ browsing history.

Of all the types of attacks that a password manager will have to avoid, sometimes it is the hardest against brute force attacks, which aim to decrypt passwords by breaking encryption.

LastPass encrypts your data with AES-256: this is the popular fundamental to the encryption you expect from any privacy product. It also uses something called PBKDF2: this is how your master password becomes a key to unlock that encryption.

Of course, if the type of user that the US government has not been able to do is the only one who has been able to do so. But it’s not the first time It would point to its full quantum computing capacity and an absurd amount of paint hours (e. g. Edward Snowden), LastPass would possibly not be your most productive bet.

But the rest of us, with the exception of some internal and bizarre vulnerabilities in LastPass’ unique password account recovery feature, can be convinced that we didn’t reach anyone with the 100100 PBKDF2 iterations needed to get closer to our passwords.

The logo of a smart privacy tool is a blank background sheet. This is how the company responds to incidents and vulnerabilities. Is it transparent and timely to tell the public?At what point were users affected?

In the case of LastPass, the company has created an environment that encourages bug hunters and security researchers. Despite its long list of discovered vulnerabilities, so far there have been only two main user knowledge breaches (only one was malicious and resulted in a loss of user knowledge). Temporarily respond to vulnerabilities and deploy updates with its orderly record of published notes. However, it has had more disruptions than many of its competence and its follow-up dates back to 2011.

The 2015 violation won the highest media policy and is the only violation observed on LastPass’ official website. That same year, however, Asana’s leading security officer, Sean Cassidy, discovered a phishing vulnerability created through a CSRF bug. A study paper also emerged detailing other CSRF errors and how LastPass’ Safari bookmark option turned out to be vulnerable if users were tricked into clicking on certain parts of an attacker’s site.

Hits continued to arrive in 2016: two vulnerabilities were found. One learned through security researcher Mathias Karlsson, and the other through Google Project Zero bug killer Tavis Ormandy, the latter of which led LastPass to urge users to update their browsers.

However, Ormandy did not end with LastPass. In 2017, he discovered another browser extension leak that LastPass corrected. His paintings foreshadowed that of York University researchers in 2019, who discovered a vulnerability that would allow malicious copy programs to exploit LastPass’ autocomplete feature. , Ormandy was returning for some other help, finding a third browser extension vulnerability, which LastPass has resolved, that would disclose the login data that you entered on a previously visited site.

Without seeing the audits, it’s hard to know exactly why LastPass has amassed such a long list of bugs discovered compared to its competitors. This duration can attest to the incessant popularity and evolution of complex software, or be noticed as evidence of slipped progression and recurring problems.

When I contacted the company about this, LastPass stated that it welcomed bug hunters and correctly warned users that they opposed opting for a seller who would not publicly disclose an error or incident.

“LastPass is the leading password manager for both consumers and businesses; there is no other password manager on the market that is used more widely. As such, we are more likely to draw the attention of security researchers,” said a corporate spokesman, in an email.

“LastPass can offer a more powerful and safe product in components thanks to paintings made throughout the study community. We continue to inspire your contributions through our premium third-party error program,” he added. “We are convinced that LastPass is more powerful to get attention. “

LastPass is right to be more powerful in attracting attention. Every time Ormandy took it, sharp metal and general protection hardened, and that’s somewhat popular. If I were an insect security researcher with ambition and ethics (or if I only needed a few hundred dollars), my drive would be to acquire popular privacy equipment with proprietary software in jurisdictions under national mass surveillance. parameters, a fair shooting practice.

However, the company’s problems would be more powerful if there were no signs in the noise here. Further investigation of the criminal record sheet shows that this is not a cloud of random error issues, but a map of LastPass battles to dominate some of the Achilles themselves. heels that affect almost all password managers. When a password manager uses a browser extension to complete the fields of their username and password, for example, it opens a broad vector for all kinds of risks.

These dangers have been magnified in the case of LastPass through a URL visibility factor and its traditionally unsafe API, meaning that a potentially malicious online page can simply be presented as a valid online page and “talk” to LastPass, convincing it to transmit its credentials to the valid site. Using only one consumer in the workplace would mitigate this risk to the fullest. But password managers only work when other people use them, and no one uses desktop consumers as occasionally as mobile apps and browser extensions.

We all want to see those audits. If the public can more obviously measure the arc and trajectory of LastPass’ long-term strategy to protect their API from the old risks of JavaScript browser extensions, the security of both password managers in the market would gain advantages from the paints of its developers that solve the notorious problem of autocomplete. In addition, the privacy and security of both users on the Internet may be more secure. That’s what a leader would do.

Also, will LastPass be more powerful to get attention?

Leave a Comment

Your email address will not be published. Required fields are marked *