John Connor
Lifer
Cool John, feel free to elaborate and comment on why this is more or less secure than alternatives
Because you're in control. It's not someone else's server. Simple as that. You think that's getting hacked?
Cool John, feel free to elaborate and comment on why this is more or less secure than alternatives
Do you guys ever need to access passwords while you're not at home?
Do you guys ever need to access passwords while you're not at home?
I use my phone and KeepassDroid. It uses the same database as the desktop clients. I always sigh a little inside when I have to use it though. My database password is... extensive, and it's tedious typing it on a touch screen.Do you guys ever need to access passwords while you're not at home?
iPhone - yes. iPad - if on vacation, otherwise no.Do you guys ever need to access passwords while you're not at home?
I use Keepass too. In the past, I used to keep a copy of the database on my USB drive on my keys along with a self-contained copy of Keepass. Lately, I haven't needed any passwords away from home beyond the important few I have memorized.Do you guys ever need to access passwords while you're not at home?
I guess that depends on a few things, such as your ISP, your gear at home, and what type of server you want to run.
Do you open ports to the WAN for you "cloud"
Do you guys ever need to access passwords while you're not at home?
Yea, my password is also extensive. Safe in cloud desktop makes you type it in all the way the first time you run it after boot, but it has a "quick" setting you can turn on to only enter the last or first 4 of the password after thatI use my phone and KeepassDroid. It uses the same database as the desktop clients. I always sigh a little inside when I have to use it though. My database password is... extensive, and it's tedious typing it on a touch screen.
Keepass has an App.
I do something similar. I do record hints (that I understand) but not something someone would know what to do with, in my local data.Didn't click the link, but I've always felt that an online password manager is a target for hackers.
I have a complex base password I can remember with some parts where I dynamically substitute some characters. I only have to remember which characters I chose for that particular site/service. If I have to write it down, I don't need to write down the entire password. Just the chosen substitutions, which I can obfuscate.
Great! Let's all start doing that until those passwords are statistically common and end up in every password dictionary.The best way you can create a password is with music lyrics. Take your favorite song or any song and say, use the first part of the lyrics. Like the song Paint It Black by the Rolling Stones. So you have the first part of the song that goes like this:
I see a red door and I want it painted black
No colours anymore, I want them to turn black
So what you would do is take the first letter of each word to form a password and throw in some numbers and symbols.
ISARDAIWIPBNCAIWTTTB-1234!@#$
It doesn't have to be that long though.
This is the bases of my password generation and my passwords are damn long and complicated. My computers that are all encrypted use this scheme and the password is well over 20 characters long using upper case and lower case letters, numbers and symbols.
Bruce Schneier (/ˈʃnaɪər/; born January 15, 1963[1]) is an American cryptographer, computer security professional, privacy specialist and writer. He is the author of several books on general security topics, computer security and cryptography.
Schneier is a fellow at the Berkman Center for Internet & Society at Harvard Law School, a program fellow at the New America Foundation's Open Technology Institute. He has been working for IBM since they acquired Resilient Systems where Schneier was CTO.[2][3][4] He is also a contributing writer for The Guardian news organization.[5]