Use the “passwords” feature to check if one of yours is compromised. If it shows up, never ever reuse those credentials. They’ll be baked into thousands of botnets etc. and be forevermore part of automated break-in attempts until one randomly succeeds.

    • Godort@lemmy.ca
      link
      fedilink
      English
      arrow-up
      47
      ·
      21 hours ago

      I assure you, the rare security issues for password managers are far preferable to managing compromises every couple weeks.

      • Kyrgizion@lemmy.worldOP
        link
        fedilink
        English
        arrow-up
        19
        arrow-down
        1
        ·
        21 hours ago

        I’ve only really been in one breach. This one is actually a breach of a “security firm” (incompetent idiots) who aggregated login data from the dark web themselves, essentially doing the blackhats’ work for them.

        This is also EXACTLY why requiring online interactions to be verified with government ID is a terrible idea. Hackers will similarly be able to gain all possible wanted data in a single location. It’s simply too tempting of a target not to shoot for.

        • sugar_in_your_tea@sh.itjust.works
          link
          fedilink
          English
          arrow-up
          3
          ·
          4 hours ago

          If you think you’ve only been in one breach, you’re probably mistaken or very young. I don’t know how many breaches I’ve been involved in, but it’s at least double digits.

          I’m American, and my Social Security number has been leaked multiple times. Each time I’ve done everything possible to secure my accounts (random passwords, TOTP 2FA where possible, randomized usernames, etc), yet there’s always a new breach that impacts me.

          I’m not too worried though. My important accounts are pretty secure. I use one of the few banks (brokerage actually) that provides proper 2FA. My email and password manager use 2FA. My credit is frozen. Breaches happen, the important thing is to limit the impact of a breach.

        • JohnEdwa@sopuli.xyz
          link
          fedilink
          English
          arrow-up
          6
          ·
          edit-2
          16 hours ago

          Lucky you, I’ve been in at least 21 confirmed breaches so far.
          Which I don’t really care about, as I’ve been using unique passwords and a manager for well over two decades now. 178 of them, currently. …half to websites that probably died a decade ago.

          • thenoirwolfess@lemmynsfw.com
            link
            fedilink
            English
            arrow-up
            4
            arrow-down
            1
            ·
            16 hours ago

            One of my breaches was just Google Chrome (back when I used it) logging me entering my password in a self-hosted local web app via https but with no cert… Google. My breach was Google.

        • Darkassassin07@lemmy.ca
          link
          fedilink
          English
          arrow-up
          12
          ·
          21 hours ago

          I currently have 110 unique user+password combos. I wouldn’t want to change all those even once, if I were breached and had used similar credentials everywhere.

          Bitwarden keeps them well managed, synced between devices, and allows me to check the whole database for matches/breaches via haveibeenpwned integration. Plus because I prefer to keep things in-house as much as possible, I even self-host the server with vaultwarden walled off behind my own vpn, instead of using the public servers. (this also means it’s free, instead of a paid service)

          • ryannathans@aussie.zone
            link
            fedilink
            English
            arrow-up
            9
            ·
            edit-2
            20 hours ago

            For everyone else reading, bitwarden is an open source free password manager. The pro features are less password related and more about sharing access, file storage, and 2fa authenticator integration

            • Darkassassin07@lemmy.ca
              link
              fedilink
              English
              arrow-up
              4
              ·
              20 hours ago

              Fair point.

              The self-hosting part was mostly about total control over my own systems and less about the paid features. It’s very much not necessary.

              As far as pro features go, It was the TOTP authenticator integration that was kind of important to me. ~20% of my accounts have TOTP 2fa, and bitwardens clients will automatically copy the latest 2fa code into the clipboard when filling a password.

              Bitwarden will even tell you if a saved account could have 2fa (the service offers it), but it’s not setup/saved in bitwarden atm.

              • thenoirwolfess@lemmynsfw.com
                link
                fedilink
                English
                arrow-up
                4
                ·
                16 hours ago

                That’s fair. I use Aegis for OTP, but more frequently I get services pining at me to make a passkey, which Bitwarden also handles.

    • Joeffect@lemmy.world
      link
      fedilink
      English
      arrow-up
      22
      arrow-down
      1
      ·
      21 hours ago

      Don’t download shit from random websites… make sure its from legit places…

      • tburkhol@lemmy.world
        link
        fedilink
        English
        arrow-up
        11
        arrow-down
        4
        ·
        21 hours ago

        legit places…

        My university, 23andMe, Transunion, Equifax, CapitalOne, United Healthcare…

      • Kyrgizion@lemmy.worldOP
        link
        fedilink
        English
        arrow-up
        5
        arrow-down
        2
        ·
        21 hours ago

        These kinds of breaches are at the site level. Not much you can do as a regular user if the company doesn’t hash or salt their passwords, for example.

        • Pika@sh.itjust.works
          link
          fedilink
          English
          arrow-up
          9
          ·
          edit-2
          21 hours ago

          I believe they are replying to the article you posted in regards to the download from legit sites comment, not the fact that the sites have shit web practices (which while correct is a different thing).

          To the people who didn’t read the article posted in the comment prior, basically the software installed wasn’t the legitimate software, it was a modified software that was a trojan that was forwarding passwords stored in the keepass database to a home server.

          That’s not something that the sites are going wrong, nor is it the password managers fault. That’s fully the users fault for downloading a trojan.

        • Joeffect@lemmy.world
          link
          fedilink
          English
          arrow-up
          4
          ·
          21 hours ago

          Not from what the article says

          involves compromised download links and trojanized versions of the legitimate KeePass application that appear identical to the authentic software on the surface, while harboring dangerous capabilities beneath.

    • floofloof@lemmy.ca
      link
      fedilink
      English
      arrow-up
      3
      ·
      edit-2
      21 hours ago

      A password manager is still a good idea, but you have to not use a hacked one. So only download from official sites and repositories. Run everything you download through VirusTotal and your machine’s antivirus if you have one. If it’s a Windows installer check it is properly signed (Windows should warn you if not). Otherwise (or in addition) check installer signatures with GPG. If there’s no signature, check the SHA256 OR SHA512 hash against the one published on the official site. Never follow a link in an email, but always go directly to the official website instead. Be especially careful with these precautions when downloading something critical like a password manager.

      Doing these things will at least reduce your risk of installing compromised software.

      • sugar_in_your_tea@sh.itjust.works
        link
        fedilink
        English
        arrow-up
        2
        ·
        4 hours ago

        The company I work for forces everyone to do a training every year that goes over all of that and a few others. I assume most larger companies do the same.

        None of this has anything to do with password managers, but knowing how to install stuff properly.