Skip to content
View in the app

A better way to browse. Learn more.

Enpass Discussion Forum

A full-screen app on your home screen with push notifications, badges and more.

To install this app on iOS and iPadOS
  1. Tap the Share icon in Safari
  2. Scroll the menu and tap Add to Home Screen.
  3. Tap Add in the top-right corner.
To install this app on Android
  1. Tap the 3-dot menu (⋮) in the top-right corner of the browser.
  2. Tap Add to Home screen or Install app.
  3. Confirm by tapping Install.

Third-party audit deleted

Featured Replies

On 8/12/2020 at 4:14 PM, Ankur Gupta said:

The request to add the second factor in authentication is something that is not required for Enpass because of its offline nature. Since the data is not saved on our servers, there is no requirement of the second factor for its release

I wouldnt even say no requirement but most common 2FA used in the web (TOTP, SMS, U2F) would be pure snakeoil as they couldnt contribute to the encryption in any way

  • Replies 181
  • Views 282.8k
  • Created
  • Last Reply

Top Posters In This Topic

Most Popular Posts

  • At least an answer please? AFAIK "Security of our data is your utmost priority." We have questions and thoughts, yet there is not even an answer from the maintainers. This itself means a serious secur

  • Hemant, Thank you for your response. I don't think anyone is expecting frequent audits. Once a year or every 3 years should be enough. As to the cost... that's the cost of doing business. Th

  • +1 If you choose not to share the source, its sorta up to you to pay some third party to review the code with NDA. And as Gili said, no one expects reoccuring audits. Its mostly, or at least

Posted Images

2FA is not snakeoil. Its purpose is to protect people in case of infected client computers. If keyloggers, viruses or packet sniffers steal your password, they can't just use it to log into your account.

you need to read my message entirely, and in the context of enpass being an offline-first password manager.

for access to data online 2FA is totally useful and awesome, but if you have the data already like your enpass vault on your computer, TOTP and the likes cannot add to the encryption due to the dynamic nature of the codes.

you would need something like a smartcard with encryption keys for proper 2FA on offline data.

a code that is dependent on the time like on TOTP, or dependent on several factors on U2F cannot be used to add encryption since you cant get that same code/data later on to add that to decryption.

sorry for posting a link to my blog but I explained this in depth over there: https://blog.my1.dev/steganos-privacy-suite-19-is-a-joke

 

TOTP and many other dynamic code formats can literally only be used to allow or deny access to something, however when the data is already sitting there, just encrypted, there's nothing you can allow or deny, as you could just either hotwire the checks in RAM to skip that part or decrypt the wallet yourself outside the password manager

Edited by My1

  • 1 month later...

In another thread I read that 2FA is on the road map. Is there any more concrete information available like upcoming release or so?

Having 2FA available to login more secure into Enpass - for me it's an absolute essential feature for password managers in these times, no matter if they work online or offline. I would like to have something like a hardware token via NFC on my phone as an extra security option in addition to the master keyword. The optional key file itself - for me it's something like a device registration, because the key file i.e. is permanently 'integrated' into the mobile app.

When you have 2FA and periodically executed security audits, then Enpass will be my password safe further on.

  • 1 month later...
  • 4 months later...

The last Enpass audit was in 2018. Is there any plan to repeat this audit as it is coming up to 3 years without one

Thanks

Yes an audit with a good well recognized audit company ! 
not a corrupted one ! 

  • 3 weeks later...

Hi @el613

I understand your concern regarding the security audit and appreciate your keenness towards Enpass.

We agree with you that a security-audit plays an important role for a password manager application, and we have planned one for this year itself down the line with the release of some exciting features.

  • 6 months later...
On 4/28/2021 at 12:58 PM, Pratyush Sharma said:

Hi @el613

I understand your concern regarding the security audit and appreciate your keenness towards Enpass.

We agree with you that a security-audit plays an important role for a password manager application, and we have planned one for this year itself down the line with the release of some exciting features.

So now Nov'2021 - would be unreasonable to ask for a progress update on the Security Audit that will be completed 'this year'?

  • 2 weeks later...

Bump ... the product cannot be considered secure without regular security audits - and done by external auditors.

  • 1 month later...

bump. The year is over & is now 2022...

I've been lurking around Enpass for years, hoping that you might realise that without a security audit happening at regular intervals, then the product can't really be taken seriously and be recommended to others.
You have a nice app and the functionalty is good. This means that I want to be able to recommend it, but your consistent lax security protocols always leave me wondering "why?"

What gives with no regular security audits (every year or two)?
The codebase should be stable enough to ensure that any features don't create critical or major security issues.

The app definetly needs a code audit again. Especially because it is closed source

  • 2 weeks later...

Agreed. While a security audit can be expensive, it's vital in gaining the trust of users. Unless the product is open source, an audit is all that reviewers and users can really go off of. 

  • 3 months later...

This is a joke.

On 4/28/2021 at 1:58 PM, Pratyush Sharma said:

Hi @el613

I understand your concern regarding the security audit and appreciate your keenness towards Enpass.

We agree with you that a security-audit plays an important role for a password manager application, and we have planned one for this year itself down the line with the release of some exciting features.

Its been more than 1 year. When is it planned?

  • 1 month later...

Hello all,

I am excited to share that recently Enpass has been audited for security of the Windows App. The complete audit report is available here on our website. Soon we’ll be starting the process for rest of the platforms.

Thanks for your patience.

  • Moderator changed the title to Repeat Audit
4 hours ago, Mohit Thapa said:

Hello all,

I am excited to share that recently Enpass has been audited for security of the Windows App. The complete audit report is available here on our website. Soon we’ll be starting the process for rest of the platforms.

Thanks for your patience.

Excellent. Well done!

Glad to see that few remarks.

The HTTP-service mentioned I presume is the WiFi-Sync-part, which isn't utilized if one doesnt use wifi sync nor start the Service?

 

23 minutes ago, Ivarson said:

The HTTP-service mentioned I presume is the WiFi-Sync-part, which isn't utilized if one doesnt use wifi sync nor start the Service?

WiFi sync is a different service than this. The http service mentioned is used by mobile apps for manual vault "Backup and Restore over Wi-Fi".  Just because Enpass Core part (C++) is shared across all platforms, buffer overflow was found in source code audit.

Desktop apps do not use this service.

On 7/18/2022 at 10:31 AM, Mohit Thapa said:

Hello all,

I am excited to share that recently Enpass has been audited for security of the Windows App. The complete audit report is available here on our website. Soon we’ll be starting the process for rest of the platforms.

Thanks for your patience.

While the audits are generally positive, various vulnerabilities were noted by the auditors; have these vulnerabilities been addressed and remediated? The audit reports make no mention of this happening...

@LM77

Thank you for your question. I would like to draw your attention to the fact that on every 'Identified Vulnerabilities' found in the Audit report, a note is provided by the team (like what actions have been taken by Enpass developers to rectify it).

E.g., if you look at the 'Enpass Windows App and Admin console for Business', Page-08:
ENP-01.thumb.png.14422609b3bbd098e56f152e9fbe8e57.png

Create an account or sign in to comment

Account

Navigation

Search

Search

Configure browser push notifications

Chrome (Android)
  1. Tap the lock icon next to the address bar.
  2. Tap Permissions → Notifications.
  3. Adjust your preference.
Chrome (Desktop)
  1. Click the padlock icon in the address bar.
  2. Select Site settings.
  3. Find Notifications and adjust your preference.