![]() ![]() ![]() This is 100% JavaScript and open in the sense that you can see it - you can use network sniffing with a proxy (e.g. Use the Non-binary Chrome, Firefox, Opera, or Safari extension. There is a way to see if LastPass is doing what they're saying. How can I be sure that the bolded part is true? Is the method they describe capable of actually doing what they promise, can it prevent them from accessing my passwords? And how could I verify that they're actually doing what they're promising and not transmitting my password in any form they can access to their servers? We've taken every step we can think of to ensure your security No one at LastPass can ever access your sensitiveĭata. JavaScript (for the website) and exclusively encrypting and decrypting We'veĪccomplished this by using 256-bit AES implemented in C++ and Still providing online accessibility and syncing capabilities. Locally created one way salted hashes to provide you with the best ofīoth worlds for your sensitive information: Complete security, while LastPass strongly believes in using local encryption, and Stated weakness of vulnerability to XSS as long as you're using theĪdd-on. LastPass is an evolved Host Proof hosted solution, which avoids the ![]() I'm looking at several password managers now and I'm especially curious about Lastpass. The recent, widely publicized security incident where millions of Linkedin were exposed reminded me to tighten up my password practices. ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |