{"id":24737,"date":"2026-02-23T15:56:51","date_gmt":"2026-02-23T15:56:51","guid":{"rendered":"https:\/\/thisbiginfluence.com\/?p=24737"},"modified":"2026-02-23T15:56:51","modified_gmt":"2026-02-23T15:56:51","slug":"password-managers-share-a-hidden-weakness","status":"publish","type":"post","link":"https:\/\/thisbiginfluence.com\/?p=24737","title":{"rendered":"Password Managers Share a Hidden Weakness"},"content":{"rendered":"<p> <br \/>\n<\/p>\n<div>\n<p><span class=\"lead-in-text-callout\">An FBI informant<\/span> helped run the <a href=\"https:\/\/www.wired.com\/story\/lin-rui-siang-incognito-market\/\">Incognito dark web market<\/a> and allegedly <a href=\"https:\/\/www.wired.com\/story\/an-fbi-asset-helped-run-a-dark-web-site-that-sold-fentanyl-laced-drugs-for-years\/\">approved the sale of fentanyl-laced pills<\/a>, together with these from a vendor linked to a confirmed dying, WIRED reported this week. In the meantime, <a href=\"https:\/\/www.wired.com\/story\/jeffrey-epstein-cbp-agents-us-virgin-islands\/\">Jeffrey Epstein\u2019s ties to Customs and Border Protection officers<\/a> sparked a Division of Justice probe. Paperwork say that CBP officers within the US Virgin Islands had been nonetheless pleasant with Epstein years after his 2008 conviction, illustrating the notorious intercourse offender\u2019s techniques for cultivating allies.<\/p>\n<p class=\"paywall\">WIRED printed a information detailing specialists\u2019 <a href=\"https:\/\/www.wired.com\/story\/how-to-organize-safely-in-the-age-of-surveillance\/\">tips and preferred tools for surveillance-resistant organizing<\/a> and collaboration. In opsec fails, feedback and different metadata left on a PDF detailing Homeland Safety\u2019s proposal to construct \u201cmega\u201d detention and processing facilities <a href=\"https:\/\/www.wired.com\/story\/metadata-exposes-authors-of-ices-mega-detention-center-plans\/\">reveal the DHS personnel involved in the plan\u2019s creation<\/a>. And the Division of Homeland Safety is making strikes to mix its face and fingerprint applied sciences right into a <a href=\"https:\/\/www.wired.com\/story\/dhs-wants-a-single-search-engine-to-flag-faces-and-fingerprints-across-agencies\/\">centralized, searchable database<\/a> throughout all its businesses.<\/p>\n<p class=\"paywall\">Fears about doable drug cartel drone exercise over Texas sparked a latest airspace shutdown in New Mexico and El Paso, Texas, however the episode in the end <a href=\"https:\/\/www.wired.com\/story\/the-el-paso-no-fly-debacle-is-just-the-beginning-of-the-drone-defense-mess\/\">underscored the challenges of safely deploying anti-drone weapons<\/a> close to cities. A database left accessible to anybody on-line <a href=\"https:\/\/www.wired.com\/story\/a-mega-trove-of-exposed-social-security-numbers-underscores-critical-identity-theft-risks\/\">contained billions of records<\/a>, together with passwords and Social Safety numbers. The state of affairs is way from distinctive, but it surely underscores ongoing potential identity-theft danger because it appeared that a few of the information has not but been exploited by criminals.<\/p>\n<p class=\"paywall\">In the event you\u2019re seeking to make $10,000, the Fulu Basis\u2014a nonprofit that pays out bounties for eradicating user-hostile options\u2014is on the hunt for a solution to <a href=\"https:\/\/www.wired.com\/story\/a-10k-bounty-awaits-anyone-who-can-hack-ring-cameras-to-stop-sharing-data-with-amazon\/\">use Ring cameras while preventing them from sending data to Amazon<\/a>. And the Mexican metropolis of Guadalupe, which can host parts of the 2026 World Cup, will <a href=\"https:\/\/www.wired.com\/story\/robot-dogs-are-on-going-on-patrol-at-the-2026-world-cup-in-mexico\/\">deploy four new robot dogs<\/a> to assist present safety throughout matches at BBVA Stadium.<\/p>\n<p class=\"paywall\">However wait, there\u2019s extra! Every week, we spherical up the safety and privateness information we didn\u2019t cowl in depth ourselves. Click on the headlines to learn the total tales. And keep protected on the market.<\/p>\n<p class=\"paywall\">We at WIRED have <a href=\"https:\/\/www.wired.com\/story\/best-password-managers\/\">recommended password managers<\/a> for years. They&#8217;re, arguably, the one sensible and handy system for creating and implementing distinctive, sufficiently robust passwords throughout each on-line account in your life. However the danger\u2014at the least when utilizing cloud-based password managers that again up your credentials and make them accessible throughout gadgets\u2014is that the password supervisor firm itself turns into some extent of vulnerability. If considered one of these corporations is breached or suffers a knowledge leak, these flaws may expose an untold variety of secret credentials.<\/p>\n<p class=\"paywall\">Password supervisor corporations have responded to these fears with guarantees of \u201czero data\u201d methods wherein they declare credentials are encrypted in order that even they&#8217;ll\u2019t entry them in an unencrypted state. However a brand new research from safety researchers at ETH Zurich and USI Lugano exhibits how regularly these claims are exhibiting cracks\u2014or failing altogether if a malicious insider or hacker is sufficiently expert at exploiting cryptographic flaws.<\/p>\n<p class=\"paywall\">The researchers particularly analyzed password managers from Bitwarden, Dashlane, and LastPass\u2014although they warn their findings seemingly apply to others, too\u2014and located that they might typically acquire entry to customers\u2019 credentials. In some circumstances, they might entry customers\u2019 total \u201cvault\u201d of passwords and even acquire the flexibility to jot down to these vaults at will. The cryptographic vulnerabilities they discovered different between password managers and existed solely when sure options had been enabled, equivalent to the important thing escrow methods that enable the backup and restoration of passwords. However additionally they say most of the flaws they discovered had been comparatively easy and present the shortage of scrutiny round password managers\u2019 \u201czero data\u201d claims. Learn the total analysis paper <a data-offer-url=\"https:\/\/eprint.iacr.org\/2026\/058\" class=\"external-link\" data-event-click=\"{&quot;element&quot;:&quot;ExternalLink&quot;,&quot;outgoingURL&quot;:&quot;https:\/\/eprint.iacr.org\/2026\/058&quot;}\" href=\"https:\/\/eprint.iacr.org\/2026\/058\" rel=\"nofollow noopener\" target=\"_blank\">here<\/a>.<\/p>\n<p class=\"paywall\">Just about no a part of American society, it more and more appears, has escaped point out within the newly launched emails of the late convicted pedophile and intercourse trafficker Jeffrey Epstein\u2014together with the cybersecurity and expertise neighborhood represented on the Defcon hacker convention. Defcon this week formally banned three folks whose ties to Epstein had come to mild within the Justice Division\u2019s incomplete and extremely redacted launch of paperwork associated to Epstein: cybersecurity entrepreneur Vincent Iozzo\u2014who had already been faraway from overview board on the web site of Black Hat, Defcon\u2019s extra company sister convention\u2014in addition to former MIT Media Lab director Joichi Ito and tech investor Pablos Holman. (A spokesperson for Iozzo stated the ban was \u201cperformative\u201d and never primarily based on any \u201cwrongdoing,\u201d in a press release to TechCrunch, whereas Holman and Ito didn\u2019t reply to its requests for remark.) All three males had intensive interactions with Epstein, together with lengthy after he was uncovered as a intercourse offender and trafficker each in court docket and in intensive media reporting.<\/p>\n<p class=\"paywall\">Greater than twenty years in the past, the federal government area \u201cfreedom.gov\u201d was used for information and \u201cvictory\u201d info <a href=\"https:\/\/web.archive.org\/web\/20040110053228\/http:\/\/freedom.gov\/\">about the war in Iraq<\/a>. For the reason that area was reregistered on January 12, after years being offline, it has been a part of a State Division effort to create an anti-censorship \u201con-line portal,\u201d based on a <a href=\"https:\/\/www.reuters.com\/world\/us-plans-online-portal-bypass-content-bans-europe-elsewhere-2026-02-18\/\">Reuters report<\/a> this week.<\/p>\n<p class=\"paywall\">The report says the portal might have been created to \u201callow folks in Europe and elsewhere\u201d to see content material banned by their governments, citing hate speech- and terrorism-related content material as examples. The web site might incorporate VPN expertise to get round geolocation blocks. The event of the location, which may assist to additional fracture differing web freedom regimes and political tensions between the US and Europe, comes at a time when many US government-funded <a data-offer-url=\"https:\/\/www.theguardian.com\/world\/2026\/feb\/19\/us-funding-for-global-internet-freedom-effectively-gutted\" class=\"external-link\" data-event-click=\"{&quot;element&quot;:&quot;ExternalLink&quot;,&quot;outgoingURL&quot;:&quot;https:\/\/www.theguardian.com\/world\/2026\/feb\/19\/us-funding-for-global-internet-freedom-effectively-gutted&quot;}\" href=\"https:\/\/www.theguardian.com\/world\/2026\/feb\/19\/us-funding-for-global-internet-freedom-effectively-gutted\" rel=\"nofollow noopener\" target=\"_blank\">internet freedom programs have been shut down<\/a>.<\/p>\n<\/div>\n<p><br \/>\n<br \/><a href=\"https:\/\/www.wired.com\/story\/security-news-this-week-password-managers-share-a-hidden-weakness\/\">Source link <\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>An FBI informant helped run the Incognito dark web market and allegedly approved the sale of fentanyl-laced pills, together with these from a vendor linked to a confirmed dying, WIRED reported this week. In the meantime, Jeffrey Epstein\u2019s ties to Customs and Border Protection officers sparked a Division of Justice probe. Paperwork say that CBP [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":24739,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[9],"tags":[2005,8678,8677,1268,5813],"class_list":["post-24737","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-tech","tag-hidden","tag-managers","tag-password","tag-share","tag-weakness"],"_links":{"self":[{"href":"https:\/\/thisbiginfluence.com\/index.php?rest_route=\/wp\/v2\/posts\/24737","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/thisbiginfluence.com\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/thisbiginfluence.com\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/thisbiginfluence.com\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/thisbiginfluence.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=24737"}],"version-history":[{"count":1,"href":"https:\/\/thisbiginfluence.com\/index.php?rest_route=\/wp\/v2\/posts\/24737\/revisions"}],"predecessor-version":[{"id":24738,"href":"https:\/\/thisbiginfluence.com\/index.php?rest_route=\/wp\/v2\/posts\/24737\/revisions\/24738"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/thisbiginfluence.com\/index.php?rest_route=\/wp\/v2\/media\/24739"}],"wp:attachment":[{"href":"https:\/\/thisbiginfluence.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=24737"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/thisbiginfluence.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=24737"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/thisbiginfluence.com\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=24737"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}