Password managers' promise that they can't see your vaults isn't always true

All eight of the top password managers have adopted the term “zero knowledge” to describe the complex encryption system they use to protect the data vaults that users store on their servers.

New research shows that these claims aren’t true in all cases, particularly when account recovery is in place or password managers are set to share vaults or organize users into groups. The researchers reverse-engineered or closely analyzed Bitwarden, Dashlane, and LastPass and identified ways that someone with control over the server—either administrative or the result of a compromise—can, in fact, steal data and, in some cases, entire vaults. The researchers also devised other attacks that can weaken the encryption to the point that ciphertext can be converted to plaintext.

They used several techniques. Bitwarden is affected. It’s important to note most attacks assume an attacker has full control over the password manager servers.

We don’t know yet which others password managers are impacted, as they didn’t test those as deep and couldn’t disclose them.

1 Like

It seems in the older topic is talked about the same research:

I have might my standpoint there.

Sorry I hadn’t seen

A post was merged into an existing topic: Popular password managers fall short of “zero-knowledge” claims

Duplicate of the thread linked above