I watched a video of a guy brute forcing WiFi passowords. I am no IT security specialist so unsure if what was said in video is true or not. But the video guy said to use some "Z's" and "9's" in passwords as that will take years to crack, since most if not all brute force scripts/programs start at A and 1.Article said the hackers still need to brute force your master password to gain access to your passwords. I for one have a very long random master password with numbers letters symbols etc. They would move one to someone elses password before getting into mine.
Using multi-factor auth helps reduce the risk as well. They would need not only your password but the next token to get into your data.Article said the hackers still need to brute force your master password to gain access to your passwords. I for one have a very long random master password with numbers letters symbols etc. They would move one to someone elses password before getting into mine.
Lastpass used to have a local version where you could download your vault from the cloud and work with it locally. Too bad they got rid of it.I've been using a local password app for years. I've been wanting to try a new one but all of them seem to sync to a cloud.
I've been using a local password app for years. I've been wanting to try a new one but all of them seem to sync to a cloud.
I used 2fa as well for ipct.I make it a rule that critical login information has to be done manually with 2-factor authorization: banking, paypal, ebay...anything with credit card info.
However, general logins such as to IPCT are remembered by Google. Though I am a IPCT+ member (hay...gotta support these fine folks here somehow other than my witty banter), the actual purchase of upgrade acct is done via paypal.
Yep have MFA enabled alsoUsing multi-factor auth helps reduce the risk as well. They would need not only your password but the next token to get into your data.
What are you using right now?With all that said, I am looking at other solutions now. This last breach pushed me over the edge I guess. It just seems indicative of LP growing complacent over the years. This was like breach #3 actual in total from what I recall and even though I use MFA and a really strong master password (which I changed yet again) I don't like the fact that a lot of the metadata included in the vaults that were stolen were in fact not encrypted. So the assumption is, they do have my name email address, URLs etc. and for me, it's the straw breaking the proverbial camel's back.
I never have grasped the concept of why you would want to put valuable or irreplaceable data, out on a remote server, in gawd knows what country, for gawd knows who to have access to it. Home built NAS out of an old PC with some WD RED drives in it has been my data storage for years. It doesn't have access to the internet. Has worked flawlessly and no one knows what it is just by looking at it.