masto.pt é um dos muitos servidores Mastodon independentes que podes utilizar para participar no fediverso.
Masto.pt é uma instância de Mastodon para residentes em Portugal.

Administrado por:

Estatísticas do servidor:

434
utilizadores ativos

#keepassdx

0 publicações0 participantes0 publicações hoje

»KeePassXC und Autotype:
Ein Passwort-Manager ist ein Muss. Wie einfach die Bedienung ist, erläutert dieser Artikel. Es gibt auch Alternativen.«

Ich weise Menschen auf @keepassxc hin doch anscheinend ist es für viele noch "zu kompliziert" *aarrrgh* IT-Sicherheit fängt beim Nutzen an aber auch in vielen Firmen muss dies umgedacht werden. Wenn die gehackt werden, sind die nie selber schuld :(

🔐 gnulinux.ch/keepassxc-und-auto

GNU/Linux.chKeePassXC und AutotypeEin Passwort-Manager ist ein Muss. Wie einfach die Bedienung ist, erläutert dieser Artikel. Es gibt auch Alternativen.
Responder na conversa

@tychotithonus : if anything, people should stop making up passwords themselves.

Here's what they should do (IMHO): infosec.exchange/@ErikvanStrat; with Android screenshot: infosec.exchange/@ErikvanStrat.

Infosec ExchangeErik van Straten (@ErikvanStraten@infosec.exchange)W.r.t. password managers (pw mgrs): 1) Make sure that you *NEVER* forget your master password. 2) Make an *OFFLINE* backup of the (encrypted) pw database after each modification. For example, rotate between multiple USB storage media. 3) Use a pw mgr that can generate strong (random, long, unguessable) passwords. Use that functionality to generate a unique pw for each account. LAST BUT NOT LEAST 4) At least on mobile devices, configure the OS and pw mgr to locate your credentials *automatically* based on the domain name of the website you're visiting (using "autofill", which lets the OS pass the domain name –as used by the browser– to the pw mgr). EXAMPLE WHY If you receive an email (with SPF, DKIM and DMARC all fine) from:     whomever@circle-ci.com that instructs you to revalidate your 2FA settings in, e.g.:     https:⧸⧸circle-ci.com/revalidate Then a properly configured pw mgr will not come up with ANYTHING - because the record is for (without the dash):     https:⧸⧸circleci.com The deja vu after the 2022 attack (https://github.blog/news-insights/company-news/security-alert-new-phishing-campaign-targets-github-users/), described in https://discuss.circleci.com/t/circleci-security-alert-warning-fraudulent-website-impersonating-circleci/50899, is still alive and kicking since March this year (see https://crt.sh/?q=circle-ci.com and https://www.virustotal.com/gui/domain/circle-ci.com/detection). The fake site even looks better than the original one (I don't know whether it is actually malicious, or will just warn users who attempt to log in). NOTE: if your pw mgr does not find a matching record in the pw mgr database, do NOT manually locate the "circleci.com" record. If you do: do NOT autofill or copy/paste your credentials for https:⧸⧸circleci.com to https:⧸⧸circle-ci.com! Using those creds, the fake site may immediately log in to the authentic website AS YOU - pwning your account. WHAT I'M USING I'm using KeePassium on iOS and KeePassDX on Android; they work just fine (disclaimer: I'm not in any way related to their authors, and do no warrant their reliability). @steelefortress #Passwords #PasswordManagers #PasswordManager #KeePassium #iOS #iPadOS #KeePassDX #Android #Autofill #DomainName #DomainNames #DomainNameCheck

Heute ist mal wieder der „Ändere dein Passwort“-Tag. Worauf es wirklich ankommt:

🔹 Jedes Konto braucht ein einzigartiges Passwort.
🔹 Verwende lange, zufällig generierte Passwörter.
🔹 Kein Mensch muss sich die merken – dafür gibt es Passwort-Manager. 👇
🔹 Extra-Schutz? Aktiviere Zwei- oder Mehr-Faktor-Authentifizierung (2FA, MFA).

kuketz-blog.de/empfehlungsecke

www.kuketz-blog.deEmpfehlungseckeDie Empfehlungsecke beinhaltet aktuelle Empfehlungen zu Messengern, Browser-Add-ons und weiteren Themen • IT-Sicherheit & Datenschutz aus Karlsruhe
Responder na conversa

If max. allowed password length < 20 characters: DO complain!

For people interested in dumb password rules: check out dumbpasswordrules.com or follow @dumbpasswordrules (it's an automated account, replies are probably not read by them).

Tip: use a password manager. Let it generate a unique password for each account. Make frequent backups of the database. On android/iOS/iPadOS, use AutoFill!

More info: infosec.exchange/@ErikvanStrat; with Android screenshot: infosec.exchange/@ErikvanStrat.

@tychotithonus

dumbpasswordrules.comDumb Password RulesA compilation of sites with dumb password rules.

En mi smartphone, uso lo siguiente:

Sistema operativo:
@e_mydata

Navegador web: #Iceraven
Notas: @jtx
Scanner: #BarcodeScanner
Bloqueador de anuncios: #AdAway
Bloqueador de llamadas y SMS: #SpamBlocker
Descarga de vídeos: #Seal
Visor de #Youtube : #NewPipe
Gestor de contraseñas: #KeePassDX
Información meteorológica: #Cirrus
Running: #OpenTracks
Red social: #Mastodon
RSS: #FeedFlow
Mapas: #MagicEarth
Sincronización en nube: #Nextcloud
Conversos de unidades: #ConverteNow
Navegación: #TrailSense

#KeePassDX ist so furchtbar verglichen mit #KeePass2Android – oder mach ich was falsch?

Ich möchte mich in einer App oder Webseite anmelden. Dann wähle ich mit DX also im Loginfeld meine DX-Tastatur aus ("Magikeyboard KeePassDX)". Damit erscheint unten ein Streifen mit Buttons, ich muss beim Tippen erst in DX die DB entsperren, ok. Aber dann schickt die App mich in die Suche und ich muss den Eintrag suchen. Hab ich ihn getippt, lande ich wieder zurück beim Loginprompt – nun aber …

Responder na conversa

@mikarv : I understand why you'd want that for input fields other than credentials on Android.

For passwords, using Autofill (on both Android and iOS) is a lot safer if you use a password manager (see infosec.exchange/@ErikvanStrat for details).

I've not yet ran into websites where logging in using Autofill did not work, but I've not knowingly tested sites that block paste into credential fields.

Responder na conversa

W.r.t. password managers (pw mgrs):

1) Make sure that you *NEVER* forget your master password.

2) Make an *OFFLINE* backup of the (encrypted) pw database after each modification. For example, rotate between multiple USB storage media.

3) Use a pw mgr that can generate strong (random, long, unguessable) passwords. Use that functionality to generate a unique pw for each account.

LAST BUT NOT LEAST
4) At least on mobile devices, configure the OS and pw mgr to locate your credentials *automatically* based on the domain name of the website you're visiting (using "autofill", which lets the OS pass the domain name –as used by the browser– to the pw mgr).

EXAMPLE WHY
If you receive an email (with SPF, DKIM and DMARC all fine) from:

    whomever@circle-ci.com

that instructs you to revalidate your 2FA settings in, e.g.:

    https:⧸⧸circle-ci.com/revalidate

Then a properly configured pw mgr will not come up with ANYTHING - because the record is for (without the dash):

    https:⧸⧸circleci.com

The deja vu after the 2022 attack (github.blog/news-insights/comp), described in discuss.circleci.com/t/circlec, is still alive and kicking since March this year (see crt.sh/?q=circle-ci.com and virustotal.com/gui/domain/circ). The fake site even looks better than the original one (I don't know whether it is actually malicious, or will just warn users who attempt to log in).

NOTE: if your pw mgr does not find a matching record in the pw mgr database, do NOT manually locate the "circleci.com" record. If you do: do NOT autofill or copy/paste your credentials for https:⧸⧸circleci.com to https:⧸⧸circle-ci.com! Using those creds, the fake site may immediately log in to the authentic website AS YOU - pwning your account.

WHAT I'M USING
I'm using KeePassium on iOS and KeePassDX on Android; they work just fine (disclaimer: I'm not in any way related to their authors, and do no warrant their reliability).

@steelefortress

The GitHub Blog · Security alert: new phishing campaign targets GitHub usersOn September 16, GitHub Security learned that threat actors were targeting GitHub users with a phishing campaign by impersonating CircleCI to harvest user credentials and two-factor codes. While GitHub itself was not affected, the campaign has impacted many victim organizations.
Responder na conversa

@tasket wrote:
<<< Using password managers is great. But having them directly interact with web browsers is a dubious proposition [...] >>>

Most people nowadays use smartphones (in particular in airplanes and in airports where these attacks happened).

Both iOS and Android have an autofill feature that works great. The user can use any PWM (password manager) they want; no browser plugins are required. The OS takes care of interfacing between the browser (or any app that shows a page with fields apparently meant for supplying user credentials) and the PWM.

I've been testing KeePassDX on Android and KeePassium on iOS, and I'm getting more and more comfortable with them (disclaimer: use at your own risk). They work fine with every browser on those OSes that I tested.

Compared to passkeys, there are some caveats:

1) If the user tries to log in to a fake site, the PWM will not find the domain name of the fake site in it's database. In that case the user should NOT be tempted to search the database for the domain name of the real site and have the PWM fill in those credentials on the phishing site (passkeys simply will not allow you to do that, but they have a zillion of disadvantages that PWMs do not have).

2) The user must confirm that an https connection is used (passkeys mandate this by themselves). If not, then the domain name shown in the browser's address bar may be spoofed.

3) Obviously the user must also make sure that the PWM's database is backed up after each change, and that unlocking it requires a strong password that the user does not forget - in particular when not typing it regularly, because of using Touch ID or Face ID to unlock said database (effectively retrieving the actual password from secure storage in the phone - after authenticating with biometrics or, alternatively, a screen unlock code).

Frust: Ich habe ja vor etwa zwei Wochen #GrapheneOS installiert. Als Passwortverwaltung nutze ich #KeePassDX. Seit heute kommt jedes Mal, wenn ich auf die Datenbank zugreifen will, diese komische Fehlermeldung mit der ich herzlich wenig anfangen kann: "open failed: ENOENT (No such file or directory)". Ohne Passwortverwaltung ist die Usability eher dürftig 😕