WelcomeWelcome | FAQFAQ | DownloadsDownloads | WikiWiki

Author Topic: lastpass breach  (Read 2946 times)

Offline gadget42

  • Hero Member
  • *****
  • Posts: 922
lastpass breach
« on: December 22, 2022, 10:55:30 PM »
20221222-2152pm-cdt-usa-searched forum for "lastpass" but no results...so an fyi

Password manager says breach it disclosed in August was much worse than thought.

https://arstechnica.com/information-technology/2022/12/lastpass-says-hackers-have-obtained-vault-data-and-a-wealth-of-customer-info/
** WARNING: connection is not using a post-quantum kex exchange algorithm.
** This session may be vulnerable to "store now, decrypt later" attacks.
** The server may need to be upgraded. See https://openssh.com/pq.html

Offline NewUser

  • Full Member
  • ***
  • Posts: 174
Re: lastpass breach
« Reply #1 on: December 23, 2022, 12:56:08 AM »
Glad I use KeePass.

Offline gadget42

  • Hero Member
  • *****
  • Posts: 922
** WARNING: connection is not using a post-quantum kex exchange algorithm.
** This session may be vulnerable to "store now, decrypt later" attacks.
** The server may need to be upgraded. See https://openssh.com/pq.html

Offline gadget42

  • Hero Member
  • *****
  • Posts: 922
** WARNING: connection is not using a post-quantum kex exchange algorithm.
** This session may be vulnerable to "store now, decrypt later" attacks.
** The server may need to be upgraded. See https://openssh.com/pq.html

Offline NewUser

  • Full Member
  • ***
  • Posts: 174
Re: lastpass breach
« Reply #4 on: January 02, 2023, 12:28:44 AM »
The moral of this story is you can't (always) trust the cloud.

Offline gadget42

  • Hero Member
  • *****
  • Posts: 922
** WARNING: connection is not using a post-quantum kex exchange algorithm.
** This session may be vulnerable to "store now, decrypt later" attacks.
** The server may need to be upgraded. See https://openssh.com/pq.html

Offline gadget42

  • Hero Member
  • *****
  • Posts: 922
Re: lastpass breach
« Reply #6 on: December 09, 2024, 04:28:37 AM »
enjoyed this password manager commentary enough to share:

https://lock.cmpxchg8b.com/passmgrs.html
** WARNING: connection is not using a post-quantum kex exchange algorithm.
** This session may be vulnerable to "store now, decrypt later" attacks.
** The server may need to be upgraded. See https://openssh.com/pq.html