Jump to content


Popular Content

Showing content with the highest reputation since 09/12/2020 in Posts

  1. 1 point
    Understood. Thanks! Suggestion: Reverse chronological, so the one you just added is right there on top, and you don't have to scroll to reach it.
  2. 1 point
    OK, Fixed ! I create a specific answer for those who have the same issue: my Macbook was ahead of his time. World clocks were indicating 5:07PM while my Mac was 5:09PM. However, as I said, my Mac is supposed to sync on time.euro.apple.com. When reapplying this setting, the time changed on my Mac and now TOTP codes are working fine. Sorry for the false bug report. No sure to know why my Mac lost the sync though. Thanks
  3. 1 point
    Tested with v. 6.4.2 (668) on Macbook. It works just fine. Thx!
  4. 1 point
    Hi @Mussie, Welcome to the forums! To set an expiry date to the password in Enpass, click on the Password Field from the Edit screen → Select Expire after → Enter the number of days → Save the field → Save the item. For more details have a look at our user manual.
  5. 1 point
    Hi @Writer, Welcome to the forums! That's strange! We will notify the McAfee team about this false detection. Could you please share the McAfee product Name, DAT version and the engine version. Until then, you can try excluding Enpass from McAfee detection.
  6. 1 point
  7. 1 point
    Hi, Currently, your app includes date info when it was created and updated, but it would be great if the date field is searchable. I'm mainly interested to know when it was updated last and if it has not been updated, say for 90days, I would like to flag those for action. Better yet -- if you can allow the user to set an expiration date and generate a report for the list of entries that have expired, that too would be helpful. thanks, Mussie
  8. 1 point
    Hey Enpassians! We hope you are doing great and making the most of your time. The latest Beta v6.5.0 for on Windows Store comes with the ever-awaited "full-time Windows Hello" support. You can enjoy continuing using Windows Hello even after the system or app restarts. Go ahead and put your bio-metrics to test with the new feature. What's New: · One of the most requested features— "Full-time Windows Hello support" is here. Now you need not enter the master password after the system/app restart. · Added an option to delete the unnecessary fields from the saved web forms. Navigate to the 'Show Webform' on the detail page of the item. Fixes: · Fixed an issue where some of OneDrive users were getting a password-mismatch error as "Password of data on OneDrive is required." Now fixed. Affected users first need to delete data from OneDrive (option to delete data is present while disconnecting the sync from the cloud). · Few of our users reported an error code 1208400 while syncing with OneDrive. · The issue where the order of the fields is getting shuffled for a custom template on syncing with other devices. · An issue where custom icons display as black. · Fixed an issue where the deleted items were visible under associated tags. · Squashed a bug with CSV importer. · Instead of the word TOTP, Enpass now uses the terminology One-time passwords. · The issue with URL marked as private did not mask. · Some of the keyboard shortcuts were not working consistently in Enpass assistant. · The cloud icon didn't display on the vault list. Get your hands on this beta version and share your valuable feedback. If there are other improvements you'd like to see, please leave a comment below. Cheers!
  9. 1 point
    Sections headings are no longer able to be deleted in items. This was possible previously. I am using build 701
  10. 1 point
    golfball – As a bit of further info. Images work best if square or inside a square frame. Try to keep images at around 600 x 600 or smaller. Jpeg or png can be used if app theme is white, if app theme is black, png images look the cleanest. GIMP image editor is very effective at converting ico files (common for logos) to a png file and place rectangular logos within a square frame so it's correctly displayed within Enpass. I’ve attached an alternative transparent Google logo as an example.
  11. 1 point
    you need to read my message entirely, and in the context of enpass being an offline-first password manager. for access to data online 2FA is totally useful and awesome, but if you have the data already like your enpass vault on your computer, TOTP and the likes cannot add to the encryption due to the dynamic nature of the codes. you would need something like a smartcard with encryption keys for proper 2FA on offline data. a code that is dependent on the time like on TOTP, or dependent on several factors on U2F cannot be used to add encryption since you cant get that same code/data later on to add that to decryption. sorry for posting a link to my blog but I explained this in depth over there: https://blog.my1.dev/steganos-privacy-suite-19-is-a-joke TOTP and many other dynamic code formats can literally only be used to allow or deny access to something, however when the data is already sitting there, just encrypted, there's nothing you can allow or deny, as you could just either hotwire the checks in RAM to skip that part or decrypt the wallet yourself outside the password manager
  • Create New...