• 0 Posts
  • 12 Comments
Joined 1 year ago
cake
Cake day: June 2nd, 2023

help-circle
  • Since the vault is end-to-end encrypted, it shouldn’t matter where it is hosted, even if it is in the cloud. Here is what a security researcher and a password cracker Jeremy M. Gosney has said about this after the LastPass incident.

    ”Is the cloud the problem? No. The vast majority of issues LastPass has had have nothing to do with the fact that it is a cloud-based solution. Further, consider the fact that the threat model for a cloud-based password management solution should *start* with the vault being compromised. In fact, if password management is done correctly, I should be able to host my vault anywhere, even openly downloadable (open S3 bucket, unauthenticated HTTPS, etc.) without concern. I wouldn’t do that, of course, but the point is the vault should be just that – a vault, not a lockbox.”




  • This is wrong. By enabling privacy.resistFingerprinting you cannot make yourself more unique in Firefox because you’re already unique. I would read this guide by the Arkenfox project about fingerprinting. The guy has worked for the Tor browser, so he knows his stuff. The summary is that the privacy.resistFingerprinting is the best tool that Firefox has against fingerprinting, but it can only ”fool naive scripts.” If you’re really worried about fingerprinting and want to defeat advancing fingerprinting, the only option is to use either Tor or Mullvad Browser depending on your threat model.