Skip to content
  • Categories
  • Recent
  • Tags
  • Popular
  • World
  • Users
  • Groups
Skins
  • Light
  • Cerulean
  • Cosmo
  • Flatly
  • Journal
  • Litera
  • Lumen
  • Lux
  • Materia
  • Minty
  • Morph
  • Pulse
  • Sandstone
  • Simplex
  • Sketchy
  • Spacelab
  • United
  • Yeti
  • Zephyr
  • Dark
  • Cyborg
  • Darkly
  • Quartz
  • Slate
  • Solar
  • Superhero
  • Vapor

  • Default (No Skin)
  • No Skin
Collapse
Code Project
  1. Home
  2. The Lounge
  3. Could you trust an online password manager?

Could you trust an online password manager?

Scheduled Pinned Locked Moved The Lounge
javascriptcomsecuritycryptographybeta-testing
15 Posts 7 Posters 0 Views 1 Watching
  • Oldest to Newest
  • Newest to Oldest
  • Most Votes
Reply
  • Reply as topic
Log in to reply
This topic has been deleted. Only users with topic management privileges can see it.
  • P Offline
    P Offline
    patnsnaudy
    wrote on last edited by
    #1

    https://www.clipperz.com/beta/[^] Before you shoot it down... It's open source and all data is encrypted in the browser using encryption algorithms strong enough for US Top Secret data. Could you trust it? I'm not affiliated with the site, but was kicking around the idea of developing something similar. [edit]Here's their javascript crypto library from google code if you are interested http://code.google.com/p/clipperz/[^][/edit]

    V C R E E 5 Replies Last reply
    0
    • P patnsnaudy

      https://www.clipperz.com/beta/[^] Before you shoot it down... It's open source and all data is encrypted in the browser using encryption algorithms strong enough for US Top Secret data. Could you trust it? I'm not affiliated with the site, but was kicking around the idea of developing something similar. [edit]Here's their javascript crypto library from google code if you are interested http://code.google.com/p/clipperz/[^][/edit]

      V Offline
      V Offline
      Vasudevan Deepak Kumar
      wrote on last edited by
      #2

      Did you try Keepass (a free desktop password manager hosted at sourceforge.net)?

      Vasudevan Deepak Kumar Personal Homepage
      Tech Gossips
      A pessimist sees only the dark side of the clouds, and mopes; a philosopher sees both sides, and shrugs; an optimist doesn't see the clouds at all - he's walking on them. --Leonard Louis Levinson

      P 1 Reply Last reply
      0
      • P patnsnaudy

        https://www.clipperz.com/beta/[^] Before you shoot it down... It's open source and all data is encrypted in the browser using encryption algorithms strong enough for US Top Secret data. Could you trust it? I'm not affiliated with the site, but was kicking around the idea of developing something similar. [edit]Here's their javascript crypto library from google code if you are interested http://code.google.com/p/clipperz/[^][/edit]

        C Offline
        C Offline
        cp9876
        wrote on last edited by
        #3

        It's certainly possible to make it as secure as other forms of password storage, and to protect users' privacy, and it would have the convenience of being accessible from anywhere... however, I'd want to see it overseen by a review committee of relevant experts with immaculate pedigrees before I'd even consider using it - and even then I probably wouldn't. Why not just use an offline storage system like KeePass and upload your file to a server where you could access it from anywhere. The choice of name is a negative to start with - 'Clipper' was a crypto chip sponsored by the US government which had the benefit of a backdoor so that the Government could 'listen in' if they wanted to - see Clipper chip[^] edit - it would also be the ultimate phishing target!

        Peter "Until the invention of the computer, the machine gun was the device that enabled humans to make the most mistakes in the smallest amount of time."

        modified on Wednesday, February 20, 2008 2:30 AM

        1 Reply Last reply
        0
        • P patnsnaudy

          https://www.clipperz.com/beta/[^] Before you shoot it down... It's open source and all data is encrypted in the browser using encryption algorithms strong enough for US Top Secret data. Could you trust it? I'm not affiliated with the site, but was kicking around the idea of developing something similar. [edit]Here's their javascript crypto library from google code if you are interested http://code.google.com/p/clipperz/[^][/edit]

          R Offline
          R Offline
          R Giskard Reventlov
          wrote on last edited by
          #4

          I just finished developing a similar application (for learning and fun: the business model is poor) and it is as safe as it is probably possible to make it bearing in mind that, given sufficient time and resources, virtually any system can be cracked. Most of these sites found the security on javascript libraries encrypting everything client side and there are quite a few libraries readily available for free: googling will pick up several quite quickly. Personally I keep all of my private and confidential data scrawled on a piece of paper under my mattress...

          bin the spin home

          D 1 Reply Last reply
          0
          • R R Giskard Reventlov

            I just finished developing a similar application (for learning and fun: the business model is poor) and it is as safe as it is probably possible to make it bearing in mind that, given sufficient time and resources, virtually any system can be cracked. Most of these sites found the security on javascript libraries encrypting everything client side and there are quite a few libraries readily available for free: googling will pick up several quite quickly. Personally I keep all of my private and confidential data scrawled on a piece of paper under my mattress...

            bin the spin home

            D Offline
            D Offline
            Dan Neely
            wrote on last edited by
            #5

            Even if it's a fully trust worthy service you're still dealing with a single point of failure as a user. I refuse to use a locally stored password safe for that very reason.

            Otherwise [Microsoft is] toast in the long term no matter how much money they've got. They would be already if the Linux community didn't have it's head so firmly up it's own command line buffer that it looks like taking 15 years to find the desktop. -- Matthew Faithfull

            P 1 Reply Last reply
            0
            • P patnsnaudy

              https://www.clipperz.com/beta/[^] Before you shoot it down... It's open source and all data is encrypted in the browser using encryption algorithms strong enough for US Top Secret data. Could you trust it? I'm not affiliated with the site, but was kicking around the idea of developing something similar. [edit]Here's their javascript crypto library from google code if you are interested http://code.google.com/p/clipperz/[^][/edit]

              E Offline
              E Offline
              El Corazon
              wrote on last edited by
              #6

              patnsnaudy wrote:

              using encryption algorithms strong enough for US Top Secret data.

              :laugh: :laugh: :laugh: you do realize there is no such monster. No algorithm in the universe is strong enough to encrypt US top secret data and use on a non DoD network. Once TS data touches the medium, it is forever TS, network, machine, disk, or even a monitor. There is no such thing as a "cleaner" or an "encryption" that is strong enough for TS data. Period. Why? because the future is unknown. Just because we cannot break the encryption today does not mean someone won't find a flaw, a chink in the armor, or a short cut in the process, tomorrow.

              _________________________ Asu no koto o ieba, tenjo de nezumi ga warau. Talk about things of tomorrow and the mice in the ceiling laugh. (Japanese Proverb)

              D P 2 Replies Last reply
              0
              • E El Corazon

                patnsnaudy wrote:

                using encryption algorithms strong enough for US Top Secret data.

                :laugh: :laugh: :laugh: you do realize there is no such monster. No algorithm in the universe is strong enough to encrypt US top secret data and use on a non DoD network. Once TS data touches the medium, it is forever TS, network, machine, disk, or even a monitor. There is no such thing as a "cleaner" or an "encryption" that is strong enough for TS data. Period. Why? because the future is unknown. Just because we cannot break the encryption today does not mean someone won't find a flaw, a chink in the armor, or a short cut in the process, tomorrow.

                _________________________ Asu no koto o ieba, tenjo de nezumi ga warau. Talk about things of tomorrow and the mice in the ceiling laugh. (Japanese Proverb)

                D Offline
                D Offline
                Dan Neely
                wrote on last edited by
                #7

                Not for connection to the internet, but communication to/from satellites, aircraft, and ships is largely done via wireless and much of that data is classified. AFAIK the wired networks between installations are encrypted to protect against a cable tap as well. TS data send this way does have stronger crypto requirements than secret on the assumption that it needs to stay unbreakable for longer to avoid bad things happening if intercepted.

                Otherwise [Microsoft is] toast in the long term no matter how much money they've got. They would be already if the Linux community didn't have it's head so firmly up it's own command line buffer that it looks like taking 15 years to find the desktop. -- Matthew Faithfull

                E 1 Reply Last reply
                0
                • D Dan Neely

                  Not for connection to the internet, but communication to/from satellites, aircraft, and ships is largely done via wireless and much of that data is classified. AFAIK the wired networks between installations are encrypted to protect against a cable tap as well. TS data send this way does have stronger crypto requirements than secret on the assumption that it needs to stay unbreakable for longer to avoid bad things happening if intercepted.

                  Otherwise [Microsoft is] toast in the long term no matter how much money they've got. They would be already if the Linux community didn't have it's head so firmly up it's own command line buffer that it looks like taking 15 years to find the desktop. -- Matthew Faithfull

                  E Offline
                  E Offline
                  El Corazon
                  wrote on last edited by
                  #8

                  dan neely wrote:

                  and much of that data is classified.

                  you know classified is a long way from TS.... TS satellite data is direct beam. You would pretty much have to fly in the path of the beam... and if you survive long enough to do that, you still have the job of unencrypting, but TS must be done multi-method, not just encryption.

                  _________________________ Asu no koto o ieba, tenjo de nezumi ga warau. Talk about things of tomorrow and the mice in the ceiling laugh. (Japanese Proverb)

                  1 Reply Last reply
                  0
                  • P patnsnaudy

                    https://www.clipperz.com/beta/[^] Before you shoot it down... It's open source and all data is encrypted in the browser using encryption algorithms strong enough for US Top Secret data. Could you trust it? I'm not affiliated with the site, but was kicking around the idea of developing something similar. [edit]Here's their javascript crypto library from google code if you are interested http://code.google.com/p/clipperz/[^][/edit]

                    E Offline
                    E Offline
                    Erik Funkenbusch
                    wrote on last edited by
                    #9

                    It looks pretty good, but there are some obvious problems if you are security paranoid: 1) it's only 128 bit RSA encryption, which while not easily brute forced by the average phisher or trojan writer would be almost trivial for any organized system (FBI, NSA, etc..) 2) The encryption code is downloaded each time you access it (or stored in cache), which means that it's vulnerable to man-in-the-middle attacks. The code could get trojaned or "secretly" updated by an outside agent. It really needs a nice FF plug-in or ActiveX control that does a real client-side encryption with a strong key and cipher. I also don't like that you have to log into their system first and access the sites from their bookmark list.

                    -- Where are we going? And why am I in this handbasket?

                    P 1 Reply Last reply
                    0
                    • V Vasudevan Deepak Kumar

                      Did you try Keepass (a free desktop password manager hosted at sourceforge.net)?

                      Vasudevan Deepak Kumar Personal Homepage
                      Tech Gossips
                      A pessimist sees only the dark side of the clouds, and mopes; a philosopher sees both sides, and shrugs; an optimist doesn't see the clouds at all - he's walking on them. --Leonard Louis Levinson

                      P Offline
                      P Offline
                      patnsnaudy
                      wrote on last edited by
                      #10

                      Yeah I've been using keepass for a long time, but I have it installed on several machines on different networks and I don't want to use the ftp feature for storing a common password list. My problem is when I update the password file I have to update all of my PCs.

                      1 Reply Last reply
                      0
                      • D Dan Neely

                        Even if it's a fully trust worthy service you're still dealing with a single point of failure as a user. I refuse to use a locally stored password safe for that very reason.

                        Otherwise [Microsoft is] toast in the long term no matter how much money they've got. They would be already if the Linux community didn't have it's head so firmly up it's own command line buffer that it looks like taking 15 years to find the desktop. -- Matthew Faithfull

                        P Offline
                        P Offline
                        patnsnaudy
                        wrote on last edited by
                        #11

                        So what do you use? I have too many passwords to remember them all.

                        1 Reply Last reply
                        0
                        • E El Corazon

                          patnsnaudy wrote:

                          using encryption algorithms strong enough for US Top Secret data.

                          :laugh: :laugh: :laugh: you do realize there is no such monster. No algorithm in the universe is strong enough to encrypt US top secret data and use on a non DoD network. Once TS data touches the medium, it is forever TS, network, machine, disk, or even a monitor. There is no such thing as a "cleaner" or an "encryption" that is strong enough for TS data. Period. Why? because the future is unknown. Just because we cannot break the encryption today does not mean someone won't find a flaw, a chink in the armor, or a short cut in the process, tomorrow.

                          _________________________ Asu no koto o ieba, tenjo de nezumi ga warau. Talk about things of tomorrow and the mice in the ceiling laugh. (Japanese Proverb)

                          P Offline
                          P Offline
                          patnsnaudy
                          wrote on last edited by
                          #12

                          I realize all encryption can be cracked, but I think this is using AES which is strong enough for TS data. Based on a quote on wikipedia, so it must be true. :) "The design and strength of all key lengths of the AES algorithm (i.e., 128, 192 and 256) are sufficient to protect classified information up to the SECRET level. TOP SECRET information will require use of either the 192 or 256 key lengths. The implementation of AES in products intended to protect national security systems and/or information must be reviewed and certified by NSA prior to their acquisition and use."[^]

                          E 1 Reply Last reply
                          0
                          • E Erik Funkenbusch

                            It looks pretty good, but there are some obvious problems if you are security paranoid: 1) it's only 128 bit RSA encryption, which while not easily brute forced by the average phisher or trojan writer would be almost trivial for any organized system (FBI, NSA, etc..) 2) The encryption code is downloaded each time you access it (or stored in cache), which means that it's vulnerable to man-in-the-middle attacks. The code could get trojaned or "secretly" updated by an outside agent. It really needs a nice FF plug-in or ActiveX control that does a real client-side encryption with a strong key and cipher. I also don't like that you have to log into their system first and access the sites from their bookmark list.

                            -- Where are we going? And why am I in this handbasket?

                            P Offline
                            P Offline
                            patnsnaudy
                            wrote on last edited by
                            #13

                            Good points, but I thought they were using AES not sure why (not really sure if that's better than RSA). Did you see data that said they were using RSA?

                            1 Reply Last reply
                            0
                            • P patnsnaudy

                              I realize all encryption can be cracked, but I think this is using AES which is strong enough for TS data. Based on a quote on wikipedia, so it must be true. :) "The design and strength of all key lengths of the AES algorithm (i.e., 128, 192 and 256) are sufficient to protect classified information up to the SECRET level. TOP SECRET information will require use of either the 192 or 256 key lengths. The implementation of AES in products intended to protect national security systems and/or information must be reviewed and certified by NSA prior to their acquisition and use."[^]

                              E Offline
                              E Offline
                              El Corazon
                              wrote on last edited by
                              #14

                              patnsnaudy wrote:

                              Based on a quote on wikipedia, so it must be true.

                              if you found it on wikipedia, it must of course be right... and since the quote came in 2003 the quote must be good forever also. :-D

                              _________________________ Asu no koto o ieba, tenjo de nezumi ga warau. Talk about things of tomorrow and the mice in the ceiling laugh. (Japanese Proverb)

                              P 1 Reply Last reply
                              0
                              • E El Corazon

                                patnsnaudy wrote:

                                Based on a quote on wikipedia, so it must be true.

                                if you found it on wikipedia, it must of course be right... and since the quote came in 2003 the quote must be good forever also. :-D

                                _________________________ Asu no koto o ieba, tenjo de nezumi ga warau. Talk about things of tomorrow and the mice in the ceiling laugh. (Japanese Proverb)

                                P Offline
                                P Offline
                                patnsnaudy
                                wrote on last edited by
                                #15

                                I'm glad that you see it my way. ;P I'm not at all up to date on my enctyption algorithms, but I'm thinking that a good implementation of AES still must be decent.

                                1 Reply Last reply
                                0
                                Reply
                                • Reply as topic
                                Log in to reply
                                • Oldest to Newest
                                • Newest to Oldest
                                • Most Votes


                                • Login

                                • Don't have an account? Register

                                • Login or register to search.
                                • First post
                                  Last post
                                0
                                • Categories
                                • Recent
                                • Tags
                                • Popular
                                • World
                                • Users
                                • Groups