Show more

A majority of Americans, including 77% of young people, approve of labor unions.

Just thought I'd pop in and remind you of that.

Many of you have been asking for my thoughts on the #LastPass breach, and I apologize that I'm a couple days late delivering.

Apart from all of the other commentary out there, here's what you need to know from a #password cracker's perspective!

Your vault is encrypted with #AES256 using a key that is derived from your master password, which is hashed using a minimum of 100,100 rounds of PBKDF2-HMAC-SHA256 (can be configured to use more rounds, but most people don't). #PBKDF2 is the minimum acceptable standard in key derivation functions (KDFs); it is compute-hard only and fits entirely within registers, so it is highly amenable to acceleration. However, it is the only #KDF that is FIPS/NIST approved, so it's the best (or only) KDF available to many applications. So while there are LOTS of things wrong with LastPass, key derivation isn't necessarily one of them.

Using #Hashcat with the top-of-the-line RTX 4090, you can crack PBKDF2-HMAC-SHA256 with 100,100 rounds at about 88 KH/s. At this speed an attacker could test ~7.6 billion passwords per day, which may sound like a lot, but it really isn't. By comparison, the same GPU can test Windows NT hashes at a rate of 288.5 GH/s, or ~25 quadrillion passwords per day. So while LastPass's hashing is nearly two orders of magnitude faster than the < 10 KH/s that I recommend, it's still more than 3 million times slower than cracking Windows/Active Directory passwords. In practice, it would take you about 3.25 hours to run through rockyou.txt + best64.rule, and a little under two months to exhaust rockyou.txt + rockyou-30000.rule.

Keep in mind these are the speeds for cracking a single vault; for an attacker to achieve this speed, they would have to single out your vault and dedicate their resources to cracking only your vault. If they're trying 1,000 vaults simultaneously, the speed would drop to just 88 H/s. With 1 million vaults, the speed drops to an abysmal 0.088 H/s, or 11.4 seconds to test just one password. Practically speaking, what this means is the attackers will target four groups of users:

1. users for which they have previously-compromised passwords (password reuse, credential stuffing)
2. users with laughably weak master passwords (think top20k)
3. users they can phish
4. high value targets (celbs, .gov, .mil, fortune 100)

If you are not in this list / you don't get phished, then it is highly unlikely your vault will be targeted. And due to the fairly expensive KDF, even passwords of moderate complexity should be safe.

I've seen several people recommend changing your master password as a mitigation for this breach. While changing your master password will help mitigate future breaches should you continue to use LastPass (you shouldn't), it does literally nothing to mitigate this current breach. The attacker has your vault, which was encrypted using a key derived from your master password. That's done, that's in the past. Changing your password will re-encrypt your vault with the new password, but of course it won't re-encrypt the copy of the vault the attacker has with your new password. That would be impossible unless you somehow had access to the attacker's copy of the vault, which if you do, please let me know?

A proper mitigation would be to migrate to #Bitwarden or #1Password, change the passwords for each of your accounts as you migrate over, and also review the MFA status of each of your accounts as well. The perfect way to spend your holiday vacation! Start the new year fresh with proper password hygiene.

For more password insights like this, give me a follow!

Here’s what I want from a password manager:

1. Stores my passwords in the caldera of an active volcano.
2. I can access it with a 6-digit PIN from any computer on the Internet.

I don’t understand why this is so hard for the industry to get right.

Saw Tár and will be thinking about it for a VERY long time wow

Adult Swim Yule Long, AKA The Fireplace is a 90 minutes to remember. Out now for the holiday spirit!

youtu.be/Jkw_RB5U1ms

Cruise control is such cool feature when I remember that I control this rental car's speed near 70 mph with only the tip of my left thumb.

I think Google driving directions just read an advertisement for a pharmacy to me. Spoiler, my destination was not a pharmacy.

The Silicon Valley birth industry has companies that are doing some wacky computational eugenics for rich people. It's wilder than I could imagine but totally not surprising now that I know it exists.

Check out the latest TrueAnon podcast about it!

patreon.com/posts/76282256

I've been waiting for this. The extreme cold is 10 times worse because of climate change. They are using the 'dancing jet stream' as the villian. I totally believe that (so the Dr. doesn't get blocked).
If we want to go into physics, you can look up on WikiP that the jet stream is passive to hot and cold zones. It's like a shadow, and cannot move air particles. It is just a continuous roll, like a thunderstorm, except there is a slight vector westward on the descending air. This can be 'sailed' by jet planes. Please don't think about physics, it keeps you up at night.

Oh to be young again, and believe I was really clever recommending technical cybersecurity solutions to the average human being.

2022 wrap up of SCIENCE IN SPACE. I'm fortunate enough to have someone on my team who had an astrophysics project go up on Artemis I.

I'm sad the SOPHIA flying telescope is grounded. Bye bye you wacky airplane.

parallax.payloadspace.com/p/lo

The best character in Avatar: The Way of Water is the shitlib marine biologist who sells out to a whaling ship captain to continue doing research.

Mary had a little Lambda
S3 its source of truth
And every time that Lambda ran
Her bill went through the roof

Show more
Qoto Mastodon

QOTO: Question Others to Teach Ourselves
An inclusive, Academic Freedom, instance
All cultures welcome.
Hate speech and harassment strictly forbidden.