Use the “passwords” feature to check if one of yours is compromised. If it shows up, never ever reuse those credentials. They’ll be baked into thousands of botnets etc. and be forevermore part of automated break-in attempts until one randomly succeeds.

    • KairuByte@lemmy.dbzer0.com
      link
      fedilink
      English
      arrow-up
      3
      ·
      12 hours ago

      Just as an example, 1Password has a secondary encryption key that they can’t even recover. If you lose it, you’re fucked. I doubt the chances of that being cracked are any good at all.

      • sugar_in_your_tea@sh.itjust.works
        link
        fedilink
        English
        arrow-up
        2
        ·
        4 hours ago

        Bitwarden has no secondary key, and the master key is never sent to the server. All they get is an email address and encrypted data. If you forget your key, your passwords cannot be accessed, which means an attacker is screwed too.

        There are tons of ways to give yourself ways to “recover” your password that don’t compromise you in a breach scenario:

        • logged in devices - they have the key decrypted and can generate a new one, re-encrypt, and overwrite the data server-side
        • store a physical copy of the password at home somewhere (notebook?)
        • share passwords with a trusted person (SO) for critical shared accounts
        • securely store an unencrypted backup of your password vault (say, on a personal computer with full disk encryption)

        Maybe that’s how 1password works, idk, but I do recommend verifying that there’s no password recovery option on whatever password manager service you use.

    • ayyy@sh.itjust.works
      link
      fedilink
      English
      arrow-up
      6
      ·
      15 hours ago

      Got any examples? Because I have…some…examples of password reuse being a real-life problem.

        • Aetherion@lemmy.world
          link
          fedilink
          English
          arrow-up
          3
          ·
          8 hours ago

          LastPass is the maximum shit. They got hacked like 3 times in a year and my company‘s password notes got leaked.

          We are now with Bitwarden and this was the biggest security hardening measure we have taken.

          • sugar_in_your_tea@sh.itjust.works
            link
            fedilink
            English
            arrow-up
            1
            ·
            4 hours ago

            Make sure whatever password manager you use doesn’t store the key on their servers. Bitwarden does this correctly (if you lose your PW, Bitwarden can’t recover it), and I’m sure some competitors do as well. LastPass apparently didn’t.

    • Echo Dot@feddit.uk
      link
      fedilink
      English
      arrow-up
      4
      ·
      14 hours ago

      I seem to remember that the passwords were encrypted so, all they got was the passwords people use for their password manager which because people were using the password manager and therefore had random passwords it didn’t really matter hugely.