<?xml version="1.0"?>
<rss version="2.0"><channel><title>Data Security Latest Topics</title><link>https://discussion.enpass.io/forum/19-data-security/</link><description>Data Security Latest Topics</description><language>en</language><item><title>Trash clearing</title><link>https://discussion.enpass.io/topic/32170-trash-clearing/</link><description><![CDATA[<p>When a password is trashed or the password generator history is cleared, what is the mechanism behind this.</p><p>Is any of it still recoverable?</p><p>If i clear out the trash, what is the likelyhood of it being recoverable? Are these TMP files being trashed, is it normal DEL procedure?</p>]]></description><guid isPermaLink="false">32170</guid><pubDate>Fri, 17 Apr 2026 08:13:37 +0000</pubDate></item><item><title>Upgrade PBKDF2 to Argon2 or bcrypt</title><link>https://discussion.enpass.io/topic/29110-upgrade-pbkdf2-to-argon2-or-bcrypt/</link><description><![CDATA[<p>
	I've just learned that PBKDF2 encryption is outdated and vulnerable, and Argon2 or bcrypt are now the preferred password hashing implementation in modern password managers. When is Enpass going to upgrade or at least provide the option of using a secure password hasher?
</p>

<p>
	<a href="https://twitter.com/KeePassXC/status/1649417549510062081" rel="external nofollow">Raising the bar on security</a>
</p>
]]></description><guid isPermaLink="false">29110</guid><pubDate>Fri, 21 Apr 2023 17:21:46 +0000</pubDate></item><item><title>How to reset Breached Website warning?</title><link>https://discussion.enpass.io/topic/32140-how-to-reset-breached-website-warning/</link><description><![CDATA[<p>How do I get the breached website warning to reset for an entry? I have changed my password for the entry, but the breached website warning still appears.</p>]]></description><guid isPermaLink="false">32140</guid><pubDate>Sat, 07 Mar 2026 17:00:47 +0000</pubDate></item><item><title>Are Enpass Key Files Too Easy to Identify?</title><link>https://discussion.enpass.io/topic/31573-are-enpass-key-files-too-easy-to-identify/</link><description><![CDATA[<p>
	I would like to make a simple observation. To create or open a key file, the extension called ".keepasskey" is mandatory. In fact you cannot choose or create a different extension. For this reason it is very easy for an attacker to locate the enpass key file. For this reason, to keep it archived I have to rename it, and then when I need it I have to rename it again by adding the ".keepasskey" extension.<br />
	Wouldn't it be a good idea to be able to create and open the file without the extension?
</p>
]]></description><guid isPermaLink="false">31573</guid><pubDate>Thu, 18 Jul 2024 18:58:11 +0000</pubDate></item><item><title>Does Enpass connect to AWS?</title><link>https://discussion.enpass.io/topic/18353-does-enpass-connect-to-aws/</link><description><![CDATA[
<p>
	Hello:
</p>

<p>
	I have checked my mobile connections and I have seen that Enpass has connected to an Amazon AWS related IP in Ireland. I would like to know if it is normal and if Enpass works with these servers.
</p>

<p>
	Thank you.<br />
	 
</p>
]]></description><guid isPermaLink="false">18353</guid><pubDate>Wed, 29 Apr 2020 17:25:28 +0000</pubDate></item><item><title>2FA database update</title><link>https://discussion.enpass.io/topic/27232-2fa-database-update/</link><description><![CDATA[<p>
	Hello! On some sites on which I am registered there is a 2FA, but they are not in Enpass database. How often is the database updated? How do I add a site to your database?<br>
	For example, 2FA is implemented on the site <a href="https://account.keenetic.com" rel="external nofollow">https://account.keenetic.com</a> (see screen) but this site is not in the Enpass database...
</p>
<p><a href="https://discussion.enpass.io/uploads/monthly_2021_02/screen.png.838e6c6cd7af273681f52744eec3c9ce.png" class="ipsAttachLink ipsAttachLink_image"><img data-fileid="3045" src="https://discussion.enpass.io/uploads/monthly_2021_02/screen.thumb.png.c046451f1bb6013e859a2af6dcda49bd.png" width="1000" class="ipsImage ipsImage_thumbnailed" alt="screen.png" loading="lazy" height="770"></a></p>]]></description><guid isPermaLink="false">27232</guid><pubDate>Sun, 14 Feb 2021 11:47:28 +0000</pubDate></item><item><title>Sharing Vaults</title><link>https://discussion.enpass.io/topic/31927-sharing-vaults/</link><description><![CDATA[<p>
	As a new user I'm realising that sharing vaults isn't easy to configure. I've had one support item open but not really got answers.  I thought I'd ask a few basic questions here.
</p>

<p>
	As I understand it, I can only have 1 vault per cloud account AND sharing Primary vault isn't allowed. <br />
	I therefore need to have a second cloud provider and account in order to set up a secondary vault.  ie. A different account on the same cloud (eg Dropbox) as the primary vault, is NOT allowed.  <br />
	<strong>Are the above statements correct ? </strong>
</p>

<p>
	 
</p>

<p>
	If they are, and given I already actively use Dropbox and Onedrive and Icloud - and NEITHER of the accounts are shareable in that my wife ALSO uses those same providers independently, and we share folders. Am I correct in saying that enpass is incapable of utilising the Cloud folders that are shared and requires a separate shared cloud account UID/Login and a shared Vault password. The cloud account being from a cloud provider DIFFERENT from the cloud used for each persons Primary vault.   <br />
	Therefore to have a shared Vault I will need to find a 4th Cloud provider.  I don't use GoogleDrive but I do use and have a Google Account that is NOT shareable. So I'm running out of Cloud providers to set up a standalone single app access cloud where we can share a login. FOR FREE !!.   <br />
	<strong>Is this correct? </strong>
</p>

<p>
	<br />
	If not please advise what I am missing.  I had hoped to use a shared dropbox login, but I am unable to set up a vault on a second Dropbox account from the enpass desktop(windows). It tells me I need a different cloud account.   
</p>

<p>
	Having bought and paid for this family licence, and moving over from 1password, I was hoping for a simpler scenario.  I'm embarrassed to say I didn't do as much homework as I thought and had NOT realised the restrictions on sharing.  ie. The actual LOGIN must be shared.  All Cloud providers allow the sharing of folders but enpass cannot utilise that feature. Crazy eh!! 
</p>

<p>
	THE GOAL. <br />
	To have my wife and I to have access via iphone and Laptops, to a common shared vault. And to be able to sync across ALL as required. ie. if she changes a p/word then I can see the change. Simples - you'd think.  Basic you'd think.  I'm struggling.   <br />
	<br />
	AND<br />
	Given ALL cloud providers need 2 phase authentication when you login.  If we share a cloud account.  How do we BOTH acknowledge the 2 phase authentication.  Is this an issue or does the Enpass login bypass this somehow? 
</p>
]]></description><guid isPermaLink="false">31927</guid><pubDate>Mon, 27 Oct 2025 14:46:41 +0000</pubDate></item><item><title>Marek T&#xF3;th - DOM-based Extension Clickjacking</title><link>https://discussion.enpass.io/topic/31872-marek-t%C3%B3th-dom-based-extension-clickjacking/</link><description><![CDATA[<p>
	Czech Republic based security researcher Marek Tóth, unveiled a series of unpatched zero-day clickjacking security vulnerabilities impacting the browser-based plugins for a wide range of password managers:<br />
	<a href="https://marektoth.com/blog/dom-based-extension-clickjacking/" rel="external nofollow">https://marektoth.com/blog/dom-based-extension-clickjacking/</a>
</p>

<p>
	Is this now fixed in all Enpass Browser Extensions?<br />
	This is only mentioned in the release notes for the Chrome Extension (6.11.6):<br />
	„Fixed a clickjacking vulnerability in the extension by preventing popover windows from overlaying the inline menu (Reported by Marek Tóth)“
</p>
]]></description><guid isPermaLink="false">31872</guid><pubDate>Fri, 22 Aug 2025 06:12:43 +0000</pubDate></item><item><title>Update on DOM-Based Extension Clickjacking Vulnerability in Enpass Browser Extension (FIXED)</title><link>https://discussion.enpass.io/topic/31873-update-on-dom-based-extension-clickjacking-vulnerability-in-enpass-browser-extension-fixed/</link><description><![CDATA[<div style="background-color:#ffffff;color:#000000;font-size:12px;padding:0px;">
	<p style="background-color:transparent;padding:0px;text-align:left;vertical-align:baseline;">
		<span lang="en-in" style="font-size:12pt;padding:0px;" xml:lang="en-in"><span style="padding:0px;">Earlier this year, we learned about a browser extension vulnerability that could have exposed users to clickjacking. We </span><span style="padding:0px;">acted</span><span style="padding:0px;"> </span><span style="padding:0px;">promptly</span><span style="padding:0px;"> to investigate, patch, and </span><span style="padding:0px;">ultimately release</span><span style="padding:0px;"> a complete fix</span><span style="padding:0px;">.</span></span><span style="font-size:12pt;padding:0px;"> </span>
	</p>
</div>

<div style="background-color:#ffffff;color:#000000;font-size:12px;padding:0px;">
	<p style="background-color:transparent;padding:0px;text-align:left;vertical-align:baseline;">
		 
	</p>

	<p style="background-color:transparent;padding:0px;text-align:left;vertical-align:baseline;">
		<strong><span style="font-size:12pt;padding:0px;">Here's what happened </span></strong>
	</p>
</div>

<div style="color:rgb(0,0,0);font-size:12px;padding:0px;">
	<p style="padding:0px;text-align:left;vertical-align:baseline;">
		<span lang="en-in" style="font-size:12pt;padding:0px;" xml:lang="en-in"><span style="padding:0px;">On </span></span><strong><span lang="en-in" style="font-size:12pt;padding:0px;" xml:lang="en-in"><span style="padding:0px;">April 7, 2025</span></span></strong><span lang="en-in" style="font-size:12pt;padding:0px;" xml:lang="en-in"><span style="padding:0px;">, security researcher </span></span><strong><span lang="en-in" style="font-size:12pt;padding:0px;" xml:lang="en-in"><span style="padding:0px;">Marek Tóth</span></span></strong><span lang="en-in" style="font-size:12pt;padding:0px;" xml:lang="en-in"><span style="padding:0px;"> contacted </span><span style="border-bottom:1px solid transparent;padding:0px;">Enpass</span><span style="padding:0px;"> to responsibly </span><span style="padding:0px;">disclose</span><span style="padding:0px;"> a clickjacking vulnerability in the </span><span style="border-bottom:1px solid transparent;padding:0px;">Enpass</span><span style="padding:0px;"> browser extension.</span></span><span style="font-size:12pt;padding:0px;"> </span>
	</p>
</div>

<div style="background-color:#ffffff;color:#000000;font-size:12px;padding:0px;">
	<p style="background-color:transparent;padding:0px;text-align:left;vertical-align:baseline;">
		<span lang="en-in" style="font-size:12pt;padding:0px;" xml:lang="en-in"><span style="padding:0px;">Clickjacking is a web-based attack where a malicious site </span><span style="padding:0px;">tricks</span><span style="padding:0px;"> users into clicking something unintende</span><span style="padding:0px;">d. </span><span style="padding:0px;">In this </span><span style="padding:0px;">case</span><span style="padding:0px;">,</span><span style="padding:0px;"> a malicious webpage could </span><span style="padding:0px;">exploit</span><span style="padding:0px;"> the vul</span><span style="padding:0px;">nerability </span><span style="padding:0px;">to </span><span style="padding:0px;">tric</span><span style="padding:0px;">k a user</span><span style="padding:0px;"> </span><span style="padding:0px;">into</span><span style="padding:0px;"> steal</span><span style="padding:0px;">ing</span><span style="padding:0px;"> a credential stored in </span><span style="border-bottom:1px solid transparent;padding:0px;">Enpass</span><span style="padding:0px;"> by altering the attributes such as transparency of </span><span style="padding:0px;">the </span><span style="padding:0px;">inline autofill </span><span style="padding:0px;">menu</span><span style="padding:0px;">. </span></span><span style="font-size:12pt;padding:0px;"> </span>
	</p>
</div>

<div style="background-color:#ffffff;color:#000000;font-size:12px;padding:0px;">
	<p lang="en-us" style="background-color:transparent;padding:0px;text-align:left;vertical-align:baseline;" xml:lang="en-us">
		<span style="font-size:12pt;padding:0px;"> </span>
	</p>
</div>

<div style="background-color:#ffffff;color:#000000;font-size:12px;padding:0px;">
	<p style="background-color:transparent;padding:0px;text-align:left;vertical-align:baseline;">
		<strong><span lang="en-in" style="font-size:12pt;padding:0px;" xml:lang="en-in"><span style="padding:0px;">How We Responded</span><span style="padding:0px;"> Promptly</span></span><span style="font-size:12pt;padding:0px;"> </span></strong>
	</p>
</div>

<div style="background-color:#ffffff;color:#000000;font-size:12px;padding:0px;">
	<p style="background-color:transparent;padding:0px;text-align:left;vertical-align:baseline;">
		<span lang="en-in" style="font-size:12pt;padding:0px;" xml:lang="en-in"><span style="padding:0px;">As soon as we were notified, the </span><span style="border-bottom:1px solid transparent;padding:0px;">Enpass</span><span style="padding:0px;"> team </span><span style="padding:0px;">immediately</span><span style="padding:0px;"> </span><span style="padding:0px;">acknowledged and </span><span style="padding:0px;">began working on a fix.</span></span><span style="font-size:12pt;padding:0px;"> </span>
	</p>

	<p style="background-color:transparent;padding:0px;text-align:left;vertical-align:baseline;">
		 
	</p>

	<div style="background-color:#ffffff;padding:0px;text-align:left;vertical-align:baseline;color:#000000;font-size:12px;">
		<ul>
			<li style="font-size:12pt;background-color:transparent;padding:0px;text-align:left;vertical-align:baseline;">
				<span lang="en-in" style="font-size:12pt;padding:0px;" xml:lang="en-in"><strong><span style="padding:0px;">May 12, 2025</span></strong><span style="padding:0px;"> -</span><span style="padding:0px;"> </span><span style="padding:0px;">W</span><span style="padding:0px;">e issued </span><span style="padding:0px;">a</span><span style="padding:0px;"> </span><span style="padding:0px;">pa</span><span style="padding:0px;">rtial </span><span style="padding:0px;">fix </span><span style="padding:0px;">in </span></span><a href="https://www.enpass.io/release-notes/enpass-browser-extensions/" rel="external nofollow" style="color:inherit;padding:0px;"><span lang="en-in" style="color:#0f9ed5;font-size:12pt;padding:0px;" xml:lang="en-in"><span style="padding:0px;">Enpass Browser Extension v6.11.4</span></span></a><span lang="en-in" style="font-size:12pt;padding:0px;" xml:lang="en-in"><span style="padding:0px;">, which addressed cases where a malicious page or script could manipulate the transparency of input fields and the inline autofill menu.</span><span style="padding:0px;"> </span><span style="padding:0px;">T</span><span style="padding:0px;">horough mitigation required </span><span style="padding:0px;">additional</span><span style="padding:0px;"> efforts and hence, our engineers continued to work on a </span><span style="padding:0px;">permanent fix.</span></span>
			</li>
			<li style="font-size:12pt;background-color:transparent;padding:0px;text-align:left;vertical-align:baseline;">
				<span lang="en-in" style="background-color:transparent;font-size:12pt;padding:0px;" xml:lang="en-in"><span style="padding:0px;"><strong>August 13, 2025</strong> - </span></span><span lang="en-in" style="font-size:12pt;padding:0px;" xml:lang="en-in"><span style="padding:0px;">We rolled out the</span></span><span lang="en-in" style="background-color:transparent;font-size:12pt;padding:0px;" xml:lang="en-in"><span style="padding:0px;"> </span><span style="padding:0px;">re</span><span style="padding:0px;">leases</span><span style="padding:0px;"> </span><span style="padding:0px;">for all supported browsers via extension </span></span><a href="https://www.enpass.io/release-notes/enpass-browser-extensions/" rel="external nofollow" style="color:inherit;padding:0px;"><span lang="en-in" style="background-color:transparent;color:#0f9ed5;font-size:12pt;padding:0px;" xml:lang="en-in"><span style="padding:0px;">version 6.11.6 and later</span></span></a><span lang="en-in" style="background-color:transparent;font-size:12pt;padding:0px;" xml:lang="en-in"><span style="padding:0px;">.</span><span style="padding:0px;"> </span><span style="padding:0px;">The reporter has acknowledged that the fix works (</span></span><a href="https://marektoth.com/blog/dom-based-extension-clickjacking/" rel="external nofollow" style="color:inherit;padding:0px;"><span lang="en-in" style="background-color:transparent;color:#0f9ed5;font-size:12pt;padding:0px;" xml:lang="en-in"><span style="padding:0px;">check the related blog post</span></span></a><span lang="en-in" style="background-color:transparent;font-size:12pt;padding:0px;" xml:lang="en-in"><span style="padding:0px;">).</span></span><span style="font-size:12pt;padding:0px;"> </span>
			</li>
		</ul>
	</div>

	<p style="font-size:12pt;padding:0px;vertical-align:baseline;background-color:transparent;text-align:left;">
		 
	</p>
</div>

<div style="background-color:#ffffff;color:#000000;font-size:12px;padding:0px;">
	<p lang="en-gb" style="background-color:transparent;padding:0px;text-align:left;vertical-align:baseline;" xml:lang="en-gb">
		<strong><span lang="en-in" style="font-size:12pt;padding:0px;" xml:lang="en-in"><span style="padding:0px;">What You Should Do</span></span><span style="font-size:12pt;padding:0px;"> </span></strong>
	</p>
</div>

<div style="background-color:#ffffff;color:#000000;font-size:12px;padding:0px;">
	<p style="background-color:transparent;padding:0px;text-align:left;vertical-align:baseline;">
		<span lang="en-in" style="font-size:12pt;padding:0px;" xml:lang="en-in"><span style="padding:0px;">T</span><span style="padding:0px;">o stay protected, make sure </span><span style="padding:0px;">you’ve</span><span style="padding:0px;"> updated to the latest version</span><span style="padding:0px;"> (6.11.6)</span><span style="padding:0px;"> of the</span><span style="padding:0px;"> </span><span style="border-bottom:1px solid transparent;padding:0px;">Enpas</span><span style="border-bottom:1px solid transparent;padding:0px;">s</span><span style="padding:0px;"> browser extension. </span></span><span style="font-size:12pt;padding:0px;"> </span>
	</p>
</div>

<div style="background-color:#ffffff;color:#000000;font-size:12px;padding:0px;">
	<p lang="en-gb" style="background-color:transparent;padding:0px;text-align:left;vertical-align:baseline;" xml:lang="en-gb">
		<span style="font-size:12pt;padding:0px;"> </span>
	</p>
</div>

<div style="background-color:#ffffff;color:#000000;font-size:12px;padding:0px;">
	<p lang="en-gb" style="background-color:transparent;padding:0px;text-align:left;vertical-align:baseline;" xml:lang="en-gb">
		<strong><span lang="en-in" style="font-size:12pt;padding:0px;" xml:lang="en-in"><span style="padding:0px;">We </span><span style="padding:0px;">extend our sincere appreciation to </span><span style="padding:0px;">Marek Tóth </span><span style="padding:0px;">who reported this issue </span><span style="padding:0px;">responsibly</span><span style="padding:0px;">. </span></span></strong><span style="font-size:12pt;padding:0px;"> </span>
	</p>
</div>
]]></description><guid isPermaLink="false">31873</guid><pubDate>Fri, 22 Aug 2025 13:17:18 +0000</pubDate></item><item><title>Third-party audit deleted</title><link>https://discussion.enpass.io/topic/31849-third-party-audit-deleted/</link><description><![CDATA[
<p>
	I understand that you do not wish to open-source your product, but I am reluctant to use it because of the fact it is closed-source, the company is based in India (yes, this matters) and there is no information about the development team.
</p>

<p>
	Have you considered having an independent 3rd-party audit your source-code on a regular basis as a way to gain credibility without open-sourcing your product?
</p>

<p>
	Thanks,<br>
	Gili
</p>
]]></description><guid isPermaLink="false">31849</guid><pubDate>Thu, 01 Sep 2016 23:29:36 +0000</pubDate></item><item><title>Mac Version 6.11.10 from website might be virus infected</title><link>https://discussion.enpass.io/topic/31743-mac-version-61110-from-website-might-be-virus-infected/</link><description><![CDATA[<p>
	Good afternoon,
</p>

<p>
	running ClamXav on my newly setup M1 MacBook Air I got the message that Enpass would be infected with Trojan.OSX.Agent. The app was quarantined. To confirm (and as I wasn't sure which version - download or Apple AppStore - I was using) I first downloaded the App from the enpass.io website to get the same result again. Installing Enpass via Apple App Store gave a clean version that wasn't infected as of ClamXav.
</p>

<p>
	Kindly check on the supplied version of your website and mitigate the risk for my fellow macOS users.
</p>

<p><a href="https://discussion.enpass.io/uploads/monthly_2025_05/Bildschirmfoto2025-05-20um16_06_56.jpg.b1ddc46cef6b728a81831e2d2dcf30fc.jpg" class="ipsAttachLink ipsAttachLink_image"><img data-fileid="5373" src="https://discussion.enpass.io/uploads/monthly_2025_05/Bildschirmfoto2025-05-20um16_06_56.jpg.b1ddc46cef6b728a81831e2d2dcf30fc.jpg" width="937" class="ipsImage ipsImage_thumbnailed" alt="Bildschirmfoto 2025-05-20 um 16.06.56.jpg" loading="lazy" height="627.79"></a></p>]]></description><guid isPermaLink="false">31743</guid><pubDate>Tue, 20 May 2025 13:19:36 +0000</pubDate></item><item><title>Getting Breached alert from where???</title><link>https://discussion.enpass.io/topic/31752-getting-breached-alert-from-where/</link><description><![CDATA[<p>
	I'm a Lifetime Pro subscriber since at least 2018. I just started getting a Website Breached alert in the Audit screen for my Secondary vault. I've followed all the links included on both Android and Windows. The android app does show a link to a screen that describes HOW to find more details, like what website is actually causing this alert. But neither Android or Windows will show me that website. Both devices only show me a page that wants me to upgrade to 'Premium'. 
</p>

<p>
	I would consider upgrading to Premium (although I don't see that I require the benefits that Enpass touts I would get) but since I can't get the website for a single Breach alert, I'm not convinced that I would get the website even after upgrading. I'm not sure why I would get a Breached alert if I would need to upgrade to fix it.
</p>

<p>
	I'm concerned that there was some sort of Breach but I can't resolve it since I don't know where it came from. I manually walked through all 132 items to see if anything showed as a Breach but nothing showed a Breach.
</p>

<p>
	I'm running Windows 11 with Enpass 6.11.10(1948) and Android version 13 with Enpass 6.11.10.1096
</p>

<p>
	How do I get the website that has been Breached?
</p>
]]></description><guid isPermaLink="false">31752</guid><pubDate>Mon, 26 May 2025 21:29:26 +0000</pubDate></item><item><title>Feature Request &#x2013; Disable Screenshots in Enpass for macOS</title><link>https://discussion.enpass.io/topic/31665-feature-request-%E2%80%93-disable-screenshots-in-enpass-for-macos/</link><description><![CDATA[<p>
	
</p>

<div style="color:#000000;">
	Dear Enpass Support Team,
</div>

<div style="color:#000000;">
	 
</div>

<div style="color:#000000;">
	Thank you for continuously improving Enpass—it's an essential tool I rely on daily.
</div>

<div style="color:#000000;">
	 
</div>

<div style="color:#000000;">
	I'd like to suggest adding a feature to disable screenshots and screen recordings in your macOS app by leveraging the <code style="border:1px solid #cccccc;font-size:14.4px;padding:1px 3px;">NSApplication.shared.isScreenCaptureEnabled</code> property, available since macOS 11 (Big Sur). This feature significantly enhances security and privacy, especially when handling sensitive credentials. <strong>Competitors such as Strongbox have already integrated this functionality.</strong>
</div>

<div style="color:#000000;">
	 
</div>

<div style="color:#000000;">
	Implementing this feature would further strengthen Enpass’s security positioning and offer peace of mind to your users.
</div>

<div style="color:#000000;">
	 
</div>

<div style="color:#000000;">
	Thank you very much for considering this request—I look forward to your response.
</div>

<div style="color:#000000;">
	 
</div>

<div style="color:#000000;">
	Best regards
</div>

<p>
	 
</p>
]]></description><guid isPermaLink="false">31665</guid><pubDate>Tue, 18 Mar 2025 22:21:06 +0000</pubDate></item><item><title>Polymorphic Malicious Browser Extensions?</title><link>https://discussion.enpass.io/topic/31656-polymorphic-malicious-browser-extensions/</link><description><![CDATA[<p>
	I found this video:  <a href="https://www.youtube.com/watch?v=oWtR8vqbYX4" rel="external nofollow">https://www.youtube.com/watch?v=oWtR8vqbYX4</a> about polymorphic extension malware (there are also articles written about it). <br />
	I'm wondering how big or likely a threat this is for using a browser extension for a password manager and if there is anything than can be done to protect yourself, other than not using a g a browser extension for a password manager.  Would the trick still work if you only had your extension for a password manager as the only  extension on your browser?   <br />
	<br />
	<br />
	<br />
	 
</p>
]]></description><guid isPermaLink="false">31656</guid><pubDate>Tue, 18 Mar 2025 00:09:37 +0000</pubDate></item><item><title>Enpass tricked into auto-filling credentials into untrusted pages</title><link>https://discussion.enpass.io/topic/28933-enpass-tricked-into-auto-filling-credentials-into-untrusted-pages/</link><description><![CDATA[<p>
	Enpass 6.8.4 (1166) is vulnerable to this:
</p>

<p>
	<a href="https://github.com/google/security-research/security/advisories/GHSA-mhhf-w9xw-pp9x" rel="external nofollow">https://github.com/google/security-research/security/advisories/GHSA-mhhf-w9xw-pp9x</a>
</p>
]]></description><guid isPermaLink="false">28933</guid><pubDate>Tue, 24 Jan 2023 18:31:09 +0000</pubDate></item><item><title>Enpass In memory un encrypted text passwords</title><link>https://discussion.enpass.io/topic/31673-enpass-in-memory-un-encrypted-text-passwords/</link><description><![CDATA[<p>
	i am trying to decide to do my password migration to enpass...  Is the following still true?  This came from a different website... thank you..
</p>

<p>
	 
</p>

<p>
	 
</p>

<p style="background-color:#ffffff;color:#000000;font-size:16px;">
	I did another slightly more sophisticated test.
</p>

<p style="background-color:#ffffff;color:#000000;font-size:16px;">
	I opened the “enpass” process (password manager that I currently use) with HxD ( HxD - Freeware Hex Editor) I copied a password that is this “secret_password” then I blocked enpass and as if by magic the password continues to be stored in the memory of the enpass process even when it is closed.
</p>

<p style="background-color:#ffffff;color:#000000;font-size:16px;">
	 
</p>

<div style="background-color:#ffffff;color:#000000;font-size:16px;vertical-align:middle;">
	<a href="https://community.bitwarden.com/uploads/default/original/3X/5/8/5801b7b1d79842df7ef0bbb788505881f102ebd6.png" style="background-color:rgba(0,0,0,0);" title="Screenshot 2024-11-25 215729" rel="external nofollow"><img alt="Screenshot 2024-11-25 215729" data-ratio="56.45" height="389" srcset="https://community.bitwarden.com/uploads/default/optimized/3X/5/8/5801b7b1d79842df7ef0bbb788505881f102ebd6_2_690x389.png, https://community.bitwarden.com/uploads/default/original/3X/5/8/5801b7b1d79842df7ef0bbb788505881f102ebd6.png 1.5x, https://community.bitwarden.com/uploads/default/original/3X/5/8/5801b7b1d79842df7ef0bbb788505881f102ebd6.png 2x" style="border-style:none;vertical-align:middle;" width="690" src="https://community.bitwarden.com/uploads/default/optimized/3X/5/8/5801b7b1d79842df7ef0bbb788505881f102ebd6_2_690x389.png" loading="lazy"></a>

	<div>
		<a href="https://community.bitwarden.com/uploads/default/original/3X/5/8/5801b7b1d79842df7ef0bbb788505881f102ebd6.png" style="background-color:rgba(0,0,0,0);" title="Screenshot 2024-11-25 215729" rel="external nofollow"><span>Screenshot 2024-11-25 215729</span><span>993×561 169 KB</span></a>
	</div>
</div>

<p style="background-color:#ffffff;color:#000000;font-size:16px;">
	 
</p>

<p style="background-color:#ffffff;color:#000000;font-size:16px;">
	After 10 minutes with enpass locked the password continues to remain in unencrypted memory,<br>
	I also tried with keepass and the same thing happened with the database locked.<br>
	So be careful if you use enpass and keep
</p>
]]></description><guid isPermaLink="false">31673</guid><pubDate>Sun, 23 Mar 2025 23:25:14 +0000</pubDate></item><item><title>Passkey missing after importing .json</title><link>https://discussion.enpass.io/topic/31614-passkey-missing-after-importing-json/</link><description><![CDATA[<p>
	I have exported my standard vault as .json and imported it into a new WEBDAV vault. In the new vault, I noticed that all passkeys are missing. Is this a bug or a feature.  Is there a recommendation on how to copy an existing vault into a new vault, e.g. to change the cloud?
</p>

<p>
	Thank you for your help.
</p>

<p>
	Klaus
</p>
]]></description><guid isPermaLink="false">31614</guid><pubDate>Fri, 14 Mar 2025 07:34:06 +0000</pubDate></item><item><title>Powershell and Akamai usage?</title><link>https://discussion.enpass.io/topic/31579-powershell-and-akamai-usage/</link><description><![CDATA[<p>
	I just installed MalwareBytes Firewall Controller and am seeing an attempted outgoing connection to Akamai via a powershell script.  Does Enpass use those two technologies?
</p>
]]></description><guid isPermaLink="false">31579</guid><pubDate>Sat, 01 Feb 2025 21:04:09 +0000</pubDate></item><item><title>Is Enpass' password strength checker overly conservative leading to longer passwords than necessary?</title><link>https://discussion.enpass.io/topic/29712-is-enpass-password-strength-checker-overly-conservative-leading-to-longer-passwords-than-necessary/</link><description><![CDATA[<p>
	Please see this post which I found which is very similar to my questions:
</p>

<p>
	<a href="https://discussion.enpass.io/index.php?/topic/27234-password-strenght/#comment-77241" rel="">https://discussion.enpass.io/index.php?/topic/27234-password-strenght/#comment-77241</a>
</p>

<p>
	 
</p>

<p>
	They list several password checker sites, which all show a password as strong but which Enpass shows as weak. I would add these to the list:<br />
	<a href="https://www.passwordmonster.com/" rel="external nofollow">https://www.passwordmonster.com/</a><br />
	<a href="https://nordpass.com/secure-password/" rel="external nofollow">https://nordpass.com/secure-password/</a><br />
	<a href="https://bitwarden.com/password-strength/" rel="external nofollow">https://bitwarden.com/password-strength/</a>
</p>

<p>
	The answer in that other post was the following:<br />
	"Different password strength checkers use different ranges and algorithms to estimate strength of a password. Please go through this link to see how Enpass<br />
	estimates strength of a password."
</p>

<p>
	For me, I feel that this misses the point somewhat. The point for me is to answer the following:
</p>

<ul>
	<li>
		Do we agree to the original point, which is that all these other sites are providing more favorable assessments than Enpass?
	</li>
	<li>
		Do we agree, alone or in aggregate, that these sites provide assessments that we can rely on? i.e. if they say a password is strong, then it is strong? If they say it takes centuries to crack a password, then that is what it takes?
	</li>
	<li>
		Do we agree that this results in more unwieldy passwords when following Enpass advice?
	</li>
	<li>
		Are these unwieldy passwords warranted, or are they unnecessarily long and complicated? In the case of a three-word passphrase, should we really keep inflating a supposedly "weak" password to 4 or 5 or 6 or 7 words (and only 8 actually seems to induce an "excellent" rating in Enpass) when all these other password checkers say the three-word passphrase is STRONG and will take centuries to crack?
	</li>
</ul>

<p>
	In the end, I find myself having to exit Enpass and go over to these websites to feel confident that the password complexity is really necessary. Please, I hope no one says that ever-longer passwords "can't hurt." They do. They lead to non-compliance amongst many other things I'm sure, I don't pretend to be an expert. But I know this: not everyone in my family uses password managers. I'm trying to convince them, but we're not there yet. However, they do let me help register some accounts for them and even keep their credentials in Enpass for them, in case they forget. But for them they just enter passwords manually. Unnecessarily long passwords do not work. They just change them to something really ridiculous.
</p>

<p>
	Finally, if I'm on someone else's laptop with them, and need to log into one of my accounts, I'm stuck too. I can look up the password on my phone, sure, but now I have to type it all out, looking back and forth the whole time, and losing my place, often meaning I have to do the whole thing all over again. Shorter passwords would be great.
</p>

<p>
	So... it's a valid question. Can I work with Enpass Generator and all the automated filling and other features, or do I instead need to go to these other sites?
</p>

<p>
	Thank you to anyone who responds this weekend, I would normally submit this question directly to Enpass support but they are closed and it would be ideal to get some input now. Thanks
</p>

<p>
	 
</p>
]]></description><guid isPermaLink="false">29712</guid><pubDate>Sat, 17 Feb 2024 04:35:03 +0000</pubDate></item><item><title>Use Enpass offline</title><link>https://discussion.enpass.io/topic/31519-use-enpass-offline/</link><description><![CDATA[<p>
	I see that Enpass is doing network requests even when I am not storing my vault in a cloud. According to <a href="https://support.enpass.io/app/kb/as_an_offline_password_manager_why_does_enpass_connect_to_the_internet_and_display_network_activity.htm" rel="external nofollow">this article</a> Enpass uses internet access for some features. If I disable these features will I still be able to use Enpass? Or do I require to give Enpass network access to ensure my subscription is valid? I really prefer Enpass to not send any data from my device.
</p>
]]></description><guid isPermaLink="false">31519</guid><pubDate>Thu, 07 Nov 2024 10:28:29 +0000</pubDate></item><item><title>SQLCipher</title><link>https://discussion.enpass.io/topic/8779-sqlcipher/</link><description><![CDATA[<p>
	What version of SQLCipher is Enpass using? Noting 4.2.0 was released today.
</p>]]></description><guid isPermaLink="false">8779</guid><pubDate>Thu, 06 Jun 2019 13:28:51 +0000</pubDate></item><item><title>Data</title><link>https://discussion.enpass.io/topic/31453-data/</link><description><![CDATA[<p>
	.
</p>

<p><a href="https://discussion.enpass.io/uploads/monthly_2024_08/icon.png.8ed970e90c229511bd9eed0c376bd8d3.png" class="ipsAttachLink ipsAttachLink_image"><img data-fileid="5177" src="https://discussion.enpass.io/uploads/monthly_2024_08/icon.png.8ed970e90c229511bd9eed0c376bd8d3.png" width="64" class="ipsImage ipsImage_thumbnailed" alt="icon.png" loading="lazy" height="64"></a></p>]]></description><guid isPermaLink="false">31453</guid><pubDate>Wed, 28 Aug 2024 12:03:58 +0000</pubDate></item><item><title>Carbon Copy Cloner did not copy Enpass vaults and data</title><link>https://discussion.enpass.io/topic/31403-carbon-copy-cloner-did-not-copy-enpass-vaults-and-data/</link><description><![CDATA[<p>
	I use Carbon Copy Cloner to make a backup of my hard drive. The encrypted backup is put in a bank vault for safety. I noticed today that CCC copies the Enpass folder in my Home folder, but the "Backup" and "Vaults" folders on the backup are empty. I can manually drag the files over to the backup drive, but I'm wondering why this is happening. Is there something special about these folders that causes CCC to ignore them? Time Machine seems to copy the Enpass files without issue so this definitely a CCC or Mac OS thing.
</p>

<p>
	Thanks!
</p>
]]></description><guid isPermaLink="false">31403</guid><pubDate>Mon, 01 Jul 2024 17:19:42 +0000</pubDate></item><item><title>Enpass Security v Forum Spam</title><link>https://discussion.enpass.io/topic/30298-enpass-security-v-forum-spam/</link><description><![CDATA[<p>
	The Forum is floated by spam messages.
</p>

<p>
	If Enpass is not able to add proper spam detection to their forums or at least human supervision that reacts in a time frame distinctly under 24 hours – why should potential customers trust Enpass security if the public representation to user seeking for support is so bad?
</p>

<p><a href="https://discussion.enpass.io/uploads/monthly_2024_03/Enpass-Forum_Screenshot_240325_134918.jpg.3c6848c58ff9132f860b77cbc36aae1c.jpg" class="ipsAttachLink ipsAttachLink_image"><img data-fileid="4909" src="https://discussion.enpass.io/uploads/monthly_2024_03/Enpass-Forum_Screenshot_240325_134918.thumb.jpg.e2dc9976c4176475af12c14001b7439c.jpg" width="1000" class="ipsImage ipsImage_thumbnailed" alt="Enpass-Forum_Screenshot_240325_134918.jpg" loading="lazy" height="750"></a></p>]]></description><guid isPermaLink="false">30298</guid><pubDate>Mon, 25 Mar 2024 12:48:12 +0000</pubDate></item><item><title>post-quantum cryptography - PQC</title><link>https://discussion.enpass.io/topic/29742-post-quantum-cryptography-pqc/</link><description><![CDATA[<p>
	So, with Apple announcing it now 'uses new algorithms that cannot be beaten by quantum computers but which can still be run on and protect messages on today’s classical computers.'
</p>

<p>
	 
</p>

<p>
	Should we not be thinking about this for our own password tools now too. 
</p>

<p>
	If your passwords/notes are stolem now and decoded in 20 years, its still an issue. Thoughts?
</p>
]]></description><guid isPermaLink="false">29742</guid><pubDate>Thu, 22 Feb 2024 10:12:24 +0000</pubDate></item></channel></rss>
