Encryption is great. By magic (well, by math) it converts data from a useful form to complete gibberish that can only be turned back into useful data with secret number called a key. I happen to think that the term “key” that we use for encryption and decryption keys is a poor metaphor, as it […]
Author Archive for: Jeff
About Jeffrey Goldberg
Jeffrey Goldberg suffers from a pathological compulsion to explain things.
Entries by Jeffrey Goldberg
We should remember on this World Password Day that passwords have been around for thousands of years. They can’t be all bad if we’ve kept them around so long, but some things need to change. This year we are partnering with Intel to talk about layers of security, and in this article I’m going talk […]
Today we are upping the $$$ of our bug bounty program to further stress test the security of 1Password, and most importantly reinforce our commitment to keeping our customers’ data as safe and secure as it can be.
No 1Password data is put at any risk through the bug reported about CloudFlare. 1Password does not depend on the secrecy of SSL/TLS for your security. The security of your 1Password data remains safe and solid. We will provide a more detailed description in the coming days of the CloudFlare security bug and how it (doesn’t) affect […]
When you unlock 1Password there are lots of secrets it needs to manage. There are the secrets that you see and manage such as your passwords and secure notes and all of the other things you trust to 1Password. But there are lots of secrets that 1Password has to juggle that you never see.
We unequivocally encourage security researchers to poke around 1Password. It is an extremely important part of the process that helps us deliver and maintain a more secure product to everyone. There is now a public Bug Bounty program available for 1Password!
Watchtower tells you when a site has been compromised without telling us which sites you have in your 1Password vault. Jeff explains how we put your privacy first when designing this feature.
This is going to be a long and technical article, but the point can be stated more simply: The kinds of security architectures in which it is easy to insert a back door are typically less secure than the security architectures in which it is hard to insert a back door. The back doors that […]
1Password is private by design. We cannot lose, use, or abuse data that we never have. Your data, your business.
Wherein we discuss how 1Password protects inter-process communication in the face of cross-app resource access (XARA) attacks.