Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

The biggest downside to passwordstore, and I say this as somebody using it, is that your password-filenames are in clear.

That means an attacker who gains access to your files can see you have particular accounts:

     ~/.passwordstore/websites/evil.com
     ~/.passwordstore/websites/sexy.com
It's unfortunate these aren't encrypted, hashed, or otherwise masked.


And one can argue that if an attacker can do that, they are already inside the machine. To that effect, they could just put a bogus pass binary in ~/bin and extract all your passwords.

Yet if you use this solution (or keepass or whatever you want) you are exposing yourself to attacks to those codebases. Which normally are monstruos for the most juicy of programs: a password manager.




Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: