dmv.community is one of the many independent Mastodon servers you can use to participate in the fediverse.
A small regional Mastodon instance for those in the DC, Maryland, and Virginia areas. Local news, commentary, and conversation.

Administered by:

Server stats:

166
active users

#passwordmanager

0 posts0 participants0 posts today

US seizes $23 million in crypto linked to LastPass breaches

U.S. authorities have seized over $23 million in cryptocurrency linked to the theft of $150 million from a Ripple crypto wallet in January 2024. Investigators believe hackers who breached LastPass in 2022 were behind the attack.

#LastPass #PasswordManager #cryptocurrency #crypto #ripple #databreach #security #cybersecurity #hackers #Hacking

bleepingcomputer.com/news/secu

BleepingComputer · US seizes $23 million in crypto stolen via password manager breachBy Sergiu Gatlan
Continued thread

FOSS NEWS

Firefox 136 released with vertical tabs, official ARM64 Linux binaries, hardware video decoding for AMD GPUs on Linux, new HTTPS-First behavior for upgrading page loads to HTTPS, support for copying PNG images out of the browser etc.:
9to5linux.com/mozilla-firefox-

Firefox 137 beta available with HEVC playback support on Linux, ability to identify all links in PDF documents and turn them into hyperlinks etc.:
9to5linux.com/firefox-137-ente

Thunderbird 136 released with dark mode toggle for messages, new Appearance setting to control message threading and sorting order globally, bug fixes and security patches:
omgubuntu.co.uk/2025/03/thunde

KeePassXC 2.7.10 released with support for importing passwords from Proton Pass (only unencrypted JSON files, no Passkeys currently), support for KeePass2 TOTP config settings, support for generating passphrases using a mix of uppercase and lowercase words ("MIXED case"), UI improvements etc.:
9to5linux.com/keepassxc-2-7-10

/e/OS 2.8 released with LineageOS 21 base, privacy policy linked in account manager, App Lounge gets a refined warning message for manual updates and a more readable format for F-Droid app descriptions, software updates, bug fixes:
alternativeto.net/news/2025/3/

Internxt Drive becomes the first cloud storage with post-quantum encryption:
news.itsfoss.com/internxt-driv

(Linux news in original post)

#WeeklyNews#News#FOSS
Replied in thread

@sophieschmieg @neilmadden

IMO we need to stop coming up with algorithms to securely store "derivatives" of typically weak passwords, as

IT WILL FAIL.

From akkadia.org/drepper/SHA-crypt.:

In addition, the produced output for [...] MD5 has a short length which makes it possible to construct rainbow tables.

Please correct me if I'm wrong, but even in 2025 suggesting that a rainbow table is feasible for (lets cut a few bits for MD5 weaknesses) random numbers of 120 bits in length is BS (in order to create FUD).

If I'm right about that, the least bad thing to do is:

1) Everyone should use a password manager (pwmgr) because people simply do not have the ability to come up with a sufficiently strong password that is *unique for each account*, let alone for multiple accounts (sometimes hundreds), to remember them absolutely error-free, and to recall which password was chosen for which account.

Note: IMO password *reuse* currently is the biggest threat. Entering a reused password on a fake (phishing) website may have devastating consequences, because (when a password is reused for multiple accounts) chances are that ALL those accounts are compromised. Note that the complexity and uniqueness of the password are IRELLEVANT. And, what KDF is used on the server, is IRRELEVANT as well.

2) Let the pwngr generate a (cryptographically) random password, as long and with as much entropy as allowed by the server.

3) Use a strong master password and NEVER forget it (typical beginner failure).

4) Make sure the database is backed up in more than one place, and make a backup after each modification.

5) Make sure that the device the password mamager is used on, *never* gets compromised.

6) Double check that https:// is used. Better, make sure to use a browser that blocks http:// connections and warns you (Safari on iOS/iPadOS now supports "Not Secure Connection Warning"). In all browsers such a setting is OFF by default: ENABLE IT!

7) On a mobile device: use "Autofill". The OS then transfers the domain name (shown in the browser's address bar) to the pwmgr. If a matching domain name is *not found* in the pw database, assume that you're on a (fake) phishing website! In that case: DO NOT ATTEMPT TO LOG IN by looking up credentials yourself. Reasons for 7, two examples:
----
fake: circle-ci·com
real: circleci.com
----
fake: lîdl.be
real: lidl.be
----

If people would follow this advice (which is not just mine), even MD5 for storing a one-way derivative of the password on the server would be fine.

HOWEVER: don't use MD5 - because "never use MD5 for whatever" is easier to remember than "don't use MD5 if preimage attacks are possible".

P.S. I'm not a cryptographer (although I'm quite interested in the matter).

Being on my way out of #firefox (for #privacy and #ethics reason), I need a browser which is:
- #opensource
- Runs on #linux , #macos and #iOS (I'll leave Apple once device is too old, but for now it's a must)
- ideally, syncs bookmarks between devices
- supports extensions (blockers, password manager)
- with #passwordmanager , benefit from auto-fill

Considering #duckduckgo , #OrionBrowser , #Brave (but I don't like their approach with coins etc).

I'll update this thread as my investigation progresses 😅

MystSafe is aiming to disrupt the password manager market with a unique privacy-respecting solution. MystSafe key features: open source, anonymous access, zero activity tracking, crypto-grade encryption and privacy-protecting techniques. Learn more: mystsafe.com
#Crypto #Privacy #Cybersecurity #PasswordManager #Blockchain #OpenSource

MystsafeMystSafe | The Only Privacy-Preserving Password ManagerMystSafe is a secret vault with anonymous access and zero activity tracking protected by cryptocurrency-grade tech