Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

Here's some analysis of password generators like this vs password managers (by me) http://crypto.stackexchange.com/a/5691/291


Thanks, I came here to make pretty much those same points. From the link:

Normal Encrypted DB: To steal your passwords, the attacker has to steal the database. Then she has two options: steal the master password or guess/bruteforce it.

Password Generation Method: To steal your password, the attacker has to steal your master password, or steal one of the derived passwords and guess/bruteforce the master password. Once she has it, she can generate any current and future passwords, until you stop using the generator with the same master password.




Consider applying for YC's Summer 2026 batch! Applications are open till May 4

Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: