Wherein we discuss how 1Password protects inter-process communication in the face of cross-app resource access (XARA) attacks.
Author Archive for: Jeff
Jeffrey Goldberg suffers from a pathological compulsion to explain things.
Entries by Jeff
Instead of inventing encryption that only government can break, we should just breed a special unicorn that magically blocks terrorist acts. —Ryan Paul Back doors into security systems weaken security. For everyone. This remains true despite wishful thinking on the part of those who may advocate back doors. The claim that back doors could be added […]
There are a lot of technical terms that mean something very specific to cryptographers but often mean something else to everyone else, including security professionals. Years ago I wrote about when it means to say that a cipher is “broken”. Today’s word is “infeasible”.
I’d like to take a moment to talk a little bit about how people who study password behavior go about their job.
If you would like to better understand when and why 1Password’s new TOTP feature (Time-Based One-Time Passwords) is useful, and what to do if you truly want two-factor security, this is the blog post for you.
Clipboards aren’t the greatest place to store sensitive information, which is why we’ve always worked to avoid them on every OS.
Our Watchtower service within 1Password for Mac and Windows will recommend password changes for a number of sites that we detect as using Drupal. Here you can see what that will look like.
A new security bug has Heartbleed-like ramifications. Fortunately, protecting yourself is still easy with 1Password.
There are steps we can and do take which dramatically reduce the chances that some malware running on your computer, particularly keystroke loggers, could capture your Master Password.
iOS 8 and its app extensions will enable a tremendous amount of power and convenience for apps, especially 1Password. But with great power comes the need for great security, and here is how your 1Password data will stay safe.