The wonder women of AgileBits

The wonder women of AgileBits

In continuing our celebration of Women’s Equality Day, I wanted to take a moment to introduce you to some of the awesome women that I get to work with on the AgileBits team. Here’s a little bit about us and how we all get our start in the tech industry, and some of our future plans.



Aleen is the official writer for 1Password for iOS. She hails from Phoenix, Arizona, where she lives with her husband and two cats. She’s a diversity advocate, budding developer, wordsmith, and podcaster. If you’ve seen her at all on the Internets, you’ll also know that she’s in contention for the team’s coveted coolest hair award.

Aleen has always been interested in tech (she spent her 16th birthday reformatting her computer’s hard drive!) and has a degree in technical writing. She’s currently writing an app of her own to learn Swift 2.0, and she looks forward to helping out on the development team in the future.

You can read more about Aleen in her Behind the Mug feature.



Eva is a crafty geek who came to the tech industry reluctantly after attempting to avoid following in her programmer-parents’ footsteps. She loves tackling difficult problems, knitting, and all things Whedon. Eva works on our customer support and social media teams, and dreams of enhancing her PHP coding skills in her spare time. She and her husband are working on adopting a daughter and aspire to raise her to embrace her own geekiness, whatever form that may take.



Born in England, Laura has become a California girl by choice. She’s been working in tech since leaving school, first as a computer programmer and then as a teacher of programming, system design and database design for Tandem Computers. After raising two children, she pursued her tech passion and finally joined our team to wow our customers every day.



I guess I should tell you a little bit about myself, as well.

I’m an artist and a big sci-fi/fantasy geek (on the dressing-up-at-conventions level on the scale), and I’m responsible for leading the social media team here at AgileBits. When I’m not helping users in the forums or crafting content for 1Password on Facebook, you’re likely to find me exploring some new place with my camera or getting my hands messy in one sort of project or another.

AgileBits is my first foray into the tech world, and honestly, I couldn’t be enjoying it more. I love the challenge of solving problems for our customers and sharing the secure word about 1Password in a fun and creative way. (It’s also pretty great to be able to work from my choice of hammock or beanbag chair at the office!)



Michelle comes from an arts and sciences background and is responsible for keeping the AgileBits Toronto office organized and running smoothly. One of her favourite parts of her job is being able to send birthday treats to the AgileBits team members around the world. I have to say, it’s one of our favorite parts of her job, too!

Michelle is just about finished with her first big project at AgileBits: designing and coordinating our move into a shiny new office. You’ll soon get a good look at all her hard work, right here on the blog!



Peri is a musician who loves hiking, camping, and river excursions. She works on our customer support team, focussing her attention on 1Password for Android. After being the person in her family who always fixes the problems with everyone’s computers, an internship at Mozilla (the Ascend Project) introduced Peri to a few other AgileBits team members in her hometown of Portland. She just couldn’t resist joining us!



Sara is our Minister of Magic, responsible for making sure everything at AgileBits keeps running. Her favourite part of the job is working with awesome people. As one of the founders, she has often preferred a behind-the-scenes role, but is always ready to dive in and make sure our users know they are being heard and helping people feel the love. : )



Virginia is another Portlander who joined our team after attending Mozilla’s Ascend Project. When our official “Day Brightener” is not making users smile in the forums or via email, you’ll likely find her hosting a pub trivia night; singing karaoke; or off on some other pursuit of happiness, fun and adventure!

With a background in customer service and admin support, Virginia got her start in tech by talking to friends in the industry, attending conferences and meetups, and completing online coding tutorials. She’s been dreaming about development, but she’s enjoying customer support so much that she’s not sure she wants to give it up!



Winnie is a German expat living in Montreal. She’s an iOS developer with a passion for photography, travelling, and her two crazy cats. A teacher sparked Winnie’s love of programming, and she hasn’t looked back since! She loves being able to add new features and fix bugs in an app on which so many people depend.

Winnie is active in her local programming scene and is spending her spare time building an app that automates some of the processes in her home.

Want to be a part of this amazing team?

We’re always looking to add unique voices to our team. If you’re interested in talking to us about employment opportunities, please write to

Womens Equality Day

Female Tech Pioneers

In honor of Women’s Equality Day, we’d like to add some more awesome people to your internal wiki of women who have made remarkable strides in the technology industry. Many of us already know that Ada Byron, Countess of Lovelace, and Admiral Grace Murray Hopper were computer science pioneers, but we owe our thanks to many other talented women as well.

Dr. Patricia Bath

Patricia Bath

A highly accomplished laser scientist and ophthalmologist, Patricia Bath was the first black person to serve as a resident in ophthalmology at New York University, the first black woman to serve as a staff surgeon at the UCLA Medical Center, the first female ophthalmologist to be appointed to the faculty of the University of California at Los Angeles School of Medicine Jules Stein Eye Institute, and the first woman to chair an ophthalmology residency program in the United States. Just in case you thought she couldn’t get any cooler, Dr. Bath also invented the Laserphaco Probe, which revolutionized the way cataracts are removed. With this invention, she saved the sight of countless people all over the world, some of whom had been blind for decades.

To read more about Dr. Bath, check out her biography from the U.S. National Library of Medicine and the Black Inventor Online Museum.

Annie Easley

NASA_Science_and_Engineering_Newsletter_Annie_EasleyBack when the word “computer” referred to a person rather than a machine, Annie Easley was one at the National Advisory Committee for Aeronautics and later NASA. It didn’t take long for her to pursue a degree in mathematics and, a bit later, she learned how to program using SOAP and FORTRAN. She contributed significantly to the development of the Centaur Upper Stage Rocket, which helped launch over 100 unmanned satellites and probes. To learn more about Ms. Easley in her own words, check out her interview for the NASA Headquarters History Office “Herstory” Project.

Dr. Evelyn Boyd Granville


Evelyn Boyd Granville was the second black woman in the United States to receive a Ph.D. in mathematics. She went on to join IBM and, as a result, worked on both NASA’s Project Vanguard and Project Mercury. After leaving IBM, she worked for the North American Aviation Company on Project Apollo. Without the contributions of Dr. Granville, it’s hard to tell where our space program would have gone. To read more about Dr. Granville, check out the article she wrote for SAGE: A Scholarly Journal on Black Women.

Dr. Mary Kenneth Keller

mary_kellerDid you know that the first woman to earn a Ph.D. in Computer Science in the United States was a nun? Sister Mary Kenneth Keller graduated from the University of Wisconsin in 1965; she also helped develop BASIC at Dartmouth University. She founded the computer science department at Clarke University and served as chair of the department for almost 20 years. Sister Mary Kenneth was also a proponent of getting women involved in computing. To learn more about Sister Mary Kenneth, check out her Wikipedia page.

These are only four women of the many thousands who’ve left their indelible stamp on every technical space, and to whom we owe a debt of gratitude. Who are your favorite female tech pioneers? Let us know in the comments.

1Pi icon 1024

1Password 5.5 for iOS: The Fun in the Sun Edition

While all the AgileBits kids have been having a fun- & sun-filled summer vacation, our development, docs, and support teams have been toiling away in our air-conditioned nerd caves to bring you the best 1Password for iOS release since the last one!

Our focus for this release was keeping your security as convenient & refreshing as an ice-cold drink on a hot summer day. Let’s take a sip from the improvements to Vaults, Touch ID, the Extension, and the Apple Watch app.

Switching it up

Multiple vaults are the best way to keep different parts of your life secure, without a ton of clutter. We all have our personal data, family vaults, and even work accounts to keep safe & organized.

We’ve made switching between these roles of your life super simple with an all-new vault switcher. Simply tap the new Vault icon in the upper left to get the quick switcher. Select a vault and you are instantly switched to it.


Touchable on demand

In the olden days (meaning yesterday), if you opened 1Password and then tapped Cancel on the Touch ID prompt, 1Password would switch to the Master Password prompt. For your security and convenience, the new Master Password prompt is more flexible: now when you tap Cancel, there is a fingerprint icon on the Master Password screen. Simply tap this icon to immediately restore Touch ID.

Note: If you restart your device, or the Master Password timeout is reached, this new icon will not appear, as the Master Password will still be needed in those situations.


Improved short-term memory

The extension and the main app now share unlock settings, so when you unlock the main app, the extension will remember this and use Touch ID.

Again, restarting the device or reaching a Master Password timeout will still require you to enter your Master Password.

Never drop a PIN again

Unique passwords are great for your logins, and unique PINs for your credit cards are also fantastic. Remembering them? Not so much.

Credit Card items on Apple Watch will now show the PIN field. The next time you buy chips & salsa with your credit card you can take a quick look at your wrist for your purchasing needs.

Closing the Vault

There are many more improvements and fixes in 1Password 5.5 for iOS, and you can check them all out in the release notes or in the in-app Message Center, located in Settings.

While I need to close up the vault for this release, the team can’t wait to show you all the great things we’re working on for the next one! In the meantime, we’d love to hear your thoughts. Leave your comment here, in our discussion forums, on Twitter/ADN, or on Facebook.

1Password for Android header

Wi-Fi Sync comes to 1Password for Android

Yesterday evening, after several weeks of collaboration with our beta family, we published the highly anticipated 1Password version 4.5 for Android. The big news, of course, is that it is now possible to sync your primary vault with 1Password for Mac or Windows using the new Wi-Fi Sync feature.

Look, Ma, no hands! (or clouds)

1Password for Android Wi-Fi logo

We’re thrilled to offer you even greater control over how you sync your 1Password data. If you prefer to keep your vault on your local Wi-Fi network and not fuss with manually copying your 1Password vault to and from your Android phone or tablet, you’ll enjoy the convenience of Wi-Fi Sync. You can read about setting up Wi-Fi Sync in our user guide. If you’re interested in reading more about Wi-Fi Sync from a developer’s perspective, we posted a DevBits article about this on our blog last month.

In related news, you know that “pull to refresh” gesture, where you tap your screen and drag it down? Well, we kind of love it. But that’s not a good enough reason to use it. After all, we don’t just throw things into 1Password, all willy nilly-like. While we were working on improvements for 4.5, we thought, What if you could use that easy, convenient gesture to manually trigger a sync? That would be cool! So now you can.

Polyglottery, levelled up.

One of the ways in which we make 1Password more accessible to folks is by localizing it, and we were immensely proud when we began doing that last year. Today, we add Korean to the list of available localizations.

You are awesome and we love you.

You are some seriously passionate people! Every day, our inbox and forums are filled with new conversations. The time you take to submit feature requests and bug reports means the world to us. It helps our developers prioritize resource allocation so we can make 1Password even better for you. The complete rundown of the improvements in version 4.5 can be found on our version history page.

If you use 1Password beta for Android, we have to extend an extra special thank you to you. We love our beta families on every platform, but especially on Android! There are so many different Android devices and without your help, it would be exponentially more difficult for us to make sure every 1Password update is a solid one. Thank you for all that you do.

1Password 4.5 for Android is available now in your local Google Play Store. If you’d like to join our beta team, you’re most welcome! Please sign up on our website. Got feedback? That’s fantastic, we love to hear from you. Please share your thoughts with us in our Android forum.

Master Password feature

Do a little dance, make a Master Password

When you start using 1Password, creating a strong Master Password is the first and most important thing you’ll do. We all know that the Master Password is the sentry that protects your data, so choosing a super-secure password is the key to starting your journey towards better security. After all, this will be the ‘one password’ that you have to remember from now on, so you want to make it a good one! Our Chief Defender Against the Dark Arts has written an awesome blog post to help you through this important step, but there’s a lot of information in there and it can be a little bit overwhelming.

One of our goals with 1Password is to make security convenient. We’ve thought long and hard about how to make the process of choosing this important password simpler and more friendly for our new users.

Could we make the password creation process fun, and maybe even danceable? Why not?

We called on our friend, Jonathan Mann, to help us teach everyone how to create a strong Master Password. It turns out, his method involves a lot less reading.

Jonathan in the Toronto Office

We’ve been humming this song for weeks now, and I’m so glad we can finally share it with you! I’m pretty sure my favourite scene is the 35 bats, but I’d love to know which one makes you smile the most.



1Password inter-process communication: a discussion

Recently, security researcher Luyi Xing of Indiana University at Bloomington and his co-authors released the details of their research revealing security vulnerabilities in Apple’s Mac OS X and iOS that allow “a malicious app to gain unauthorised access to other apps’ sensitive data such as passwords and tokens for iCloud, Mail app and all web passwords stored by Google Chrome.”  It has since been described in the technology press, including an article in the Register with a somewhat hyperbolic title. I should point out that even in the worst case, the attack described does not get at data you have stored in 1Password.

The fact of the matter is that specialized malware can capture some of the information sent by the 1Password browser extension and 1Password mini on the Mac under certain circumstances.  But roughly speaking, such malware can do no more (and actually considerably less) than what a malicious browser extension could do in your browser.

For 1Password, the difficulty is in fully authenticating the communication between the 1Password browser extension and 1Password mini; however, this problem is not unique to 1Password. The difficulty of securing inter-process communication on the operating system is a problem system-wide. A recent paper, “Unauthorized Cross-App Resource Access on MAC OS X and iOS” (PDF),  by Luyi Xing (Li) and his colleagues shows just how difficult securing such communication can be. Since November 2014, we’ve been engaged in discussion with Li about what, if anything, we can do about such attacks. He and his team have been excellent at providing us with details and information upfront.

As always, we are limited in what we can do in the face of malware running on the local machine. It may be useful to quote at length the introduction of that article

I have said it before, and I’ll say it again: 1Password […] cannot provide complete protection against a compromised operating system. There is a saying […] “Once an attacker has broken into your computer […], it is no longer your computer.” So in principle, there is nothing that 1Password can do to protect you if your computer is compromised.

In practice, however, there are steps we can and do take which dramatically reduce the chances that some malware running on your computer [could obtain your 1Password data].

That was written more specifically about  keystroke loggers, and there are some things that set the new attack apart. Like superficial keystroke loggers it doesn’t require “admin” or “root” access, but they were able to sneak a proof of concept past Apple reviewers.

The threat

The threat is that a malicious Mac app can pretend to be 1Password mini as far as the 1Password browser extension is concerned if it gets the timing right. In these cases, the malicious app can collect Login details sent from the 1Password browser extension to the fake 1Password mini. The researchers have demonstrated that it is possible to install a malicious app that might be able to put itself in a position to capture passwords sent from the browser to 1Password.

Note that their attack does not gain full access to your 1Password data but only to those passwords being sent from the browser to 1Password mini. In this sense, it is getting the same sort of information that a malicious browser extension might get if you weren’t using 1Password.


1Password provides its own security. What I mean by this is that for the bulk of what we do, we don’t generally rely upon security mechanisms like sandboxing or iOS Keychain. So it doesn’t matter whether those sorts of security measures provided by the operating system fail.

The careful reader will note, however, that I used phrases like “for the bulk of what we do” and “don’t generally rely upon” in the previous paragraph. There are some features and aspects for which some of 1Password’s security makes use of those mechanisms, and so vulnerabilities in those mechanisms can allow for harm to us and our customers.

1Password mini listens to the extension

Application sandboxing is a good thing for security. But it limits how the 1Password browser extension can actually exchange data with 1Password itself. Indeed, the extension (correctly) has no direct access to your data. Keeping your data out of the browser (a relatively hostile environment) is one of our security design choices. But this does mean that the 1Password browser extension needs to find a way to talk to something that does actually manage your data. 1Password mini (originally the 1Password Helper) was invented for this purpose.

One of the few ways that a browser extension can communicate locally is through a websocket. Browser extensions are free to talk to the Internet as a whole, but we certainly don’t want our browser extension doing that; we only want it talking to 1Password locally. So we restrict the browser extension to only talking to 1Password mini via a local websocket.

Mutual authentication

Obviously we would want 1Password mini and the browser extension to only talk to bona fide versions of each other, so this becomes a problem of mutual authentication. There should be some way for 1Password mini to prove to the extension that it is the real one, and there should be a way for the browser extension to prove to 1Password mini that it is a real 1Password browser extension.

The difficulty that we face is that we have no completely reliable mechanism for that mutual authentication. Instead, we employ a number of separate mechanisms of authentication, but each has its own limitations. We have no way to guarantee that when the browser extension reaches out to 1Password mini it is really talking to the genuine one.

There are a number of checks that we can (and do) perform to see if everyone is talking to who they think they are talking to, but those checks are not perfect. As a result, malware running on your Mac under your username can sometimes defeat those checks. In this case, it can pretend to be 1Password mini when talking to the browser extension and thus capture any information sent from the 1Password browser extension that is intended for the mini.

What can be done

Neither we nor Luyi Xing and his team have been able to figure out a completely reliable way to solve this problem. We thank them for their help and suggestions during these discussions. But, although there is no perfect solution, there are things that can be done to make such attacks more difficult.

What you can do

1. Check “Always Keep 1Password Mini Running” in Preferences > General

In the specific attack that Luyi Xing demonstrates, the malicious malware needs to be launched before the genuine 1Password mini is launched. By setting 1Password mini to always run, you reduce the opportunity for that particular attack.

keep mini running



2. Keep using the 1Password browser extension

Although what is described is an attack against the communication between 1Password mini and the browser extension through specialized malware, using the 1Password browser extension protects you from a more typical malware attack of pasteboard/clipboard sniffers. Likewise, the 1Password extension helps fend off phishing attacks because it will refuse to fill into pages that don’t match the domain for your saved Logins.

Quite simply, the 1Password extension not only makes life easier for you, but it is an important safety feature on its own.

3. Pay attention to what you install

As always be careful about what software you run and install on your system. On your Mac, open System Preferences > Security & Privacy > General. You’ll see an Allow apps downloaded from: setting there. We strongly recommend confirming that this setting is configured so that only apps from trusted sources can be opened. You can read more about the setting and its options on Apple’s support site.

Now Xing and his team point out that this isn’t a guaranteed way to prevent malware being installed. They were able to get a malicious app approved by the Mac App Store review process. However, I think it is reasonable to assume that now that Apple reviewers know what to look for, it will be much harder for that specific kind of malware to get through.

What we can do

There are additional (defeasible) mechanisms that we can add to our attempts at mutual authentication between the extension and 1Password mini. I will briefly mention a few that we’ve considered over the years.

Encryption with an obfuscated key

One option is to have a shared obfuscated key in both 1Password mini and the extension. (Remember that the browser extension never sees your Master Password so any secret it stores for authentication cannot be protected by your Master Password.)

Obfuscation only makes things harder for attackers until someone breaks the obfuscation, and every system designer should assume that obfuscation will be broken. See our discussion of Kerckhoffs’ Principle in our article, “You have secrets; we don’t,” for some background on why we tend to be reluctant to use obfuscation. Of course, it may be warranted in the absence of a more effective alternative, so this remains under consideration.

In anticipation of a likely suggestion, I should point out that even the magic of public key encryption wouldn’t save us from having to rely on obfuscation here; but I will save that discussion for our forums.

Using the OS X keychain

Another option would be to store authentication secrets in the OS X keychain, so that both our browser extension and 1Password mini would have access to it. This could be made to work for authenticating 1Password mini to the extension for those browsers that allow easy use of the OS X keychain.

This might solve half the problem for some browsers, but to date we’ve been focusing on solutions that work across all of the browsers we support.

An extreme solution

In the extreme case, we could have some explicit pairing (sort of like Bluetooth) between 1Password mini and the extension.  That is, the browser extension may display some number that you have to type into 1Password mini (or the other way around).  With this user intervention we can provide solid mutual authentication, but that user action would need to be done every time either the browser or 1Password mini is launched.

Quite frankly, there is no really good solution for this. To date, our approach has been to put in those authentication checks that we have and keep an eye out for any hints of malware that exploits the known limitations of what we do.

Is 1Password for iOS affected?

The research paper isn’t limited to discussing inter-process communication (IPC) that is done through websockets, but covers a wide range of mechanisms used on Apple systems. This includes some mechanisms that we may use for some features in 1Password for iOS.

Shared data security

1Password for iOS shares some of its data with the 1Password app extension. As most of that data is encrypted with your Master Password, it is not a substantial problem if that data becomes available to attackers. The exception, of course, is the TouchID secret.

As yet, we have not had a chance to test whether there is any exposure there, but watch this space for updates.


We truly are grateful for the active security community, including Luyi Xing and his team, who take the time to test existing security measures and challenge us to do better. Our analysis of the researchers’ findings will continue and we will post an update if further action is necessary.

Anniversary sale polaroids

9th Anniversary Sale-abration!

Update: The 9th Anniversary Sale ended on June 20th, 2015.

Let me take you back in time to the days when AgileBits was known as Agile Web Solutions. About 10 years ago, Dave Teare and Roustem Karimov decided to spend a month writing a quick little password management app to help them share data more efficiently while they worked to build their Palm app empire. Response to the little tool was great, and soon the pair had made the app available for download in their store.

Our intrepid co-founders quickly realized that they had a Thing on their hands. A really Real Thing! At the same time, Dave & Roustem had begun a little love affair with the Mac, and decided it was the perfect platform for their ambitious application. And so, nine years ago, on June 18, 2006, 1Password 1.0 for Mac was born. (For a real blast from the past, check out the original 1Passwd website!)


Palm may be a thing of the past, but Dave and Roustem’s “hobby” has grown into a powerful and secure data management tool for most major desktop and mobile operating systems, including Mac OS X, Windows, iOS, and Android. What began as two coders and one support person has grown into a team of almost 60.

polaroidsWe’re so proud of how much 1Password has evolved over the past nine years, largely due to feedback and support from millions of customers just like you. To celebrate, we’re offering a 30% discount on 1Password for Mac and Windows. You can get both 1Password for Mac and Windows in the AgileBits Store, and 1Password for Mac is in available from the Mac App Store.

This is a limited-time offer, so take advantage of the celebration and get your 1Password license today!

1Password for Android header

Fingerprint unlock coming to 1Password for Android [Update: Sneak peek!]

A strong Master Password is critical to keeping your 1Password vault secure. It’s also not the easiest thing to type out on a mobile device. What if you had another way to unlock your vault, in addition to your master password? One that is both convenient and secure?

For some time now, we’ve been wanting to give you the ability to unlock 1Password for Android using your fingerprint. The challenge has been that there was no standard way for us to implement it that would work across a variety of devices made by different manufacturers. And so we waited, and you waited.

Now, our wait is over.

The Android M Developer Preview was just announced at Google I/O, Google’s annual developer conference going on right now in San Francisco. For us, one of the most exciting new features is the standardized fingerprint support that is coming to the Android platform. This means that we have some awesome news for you:

We will be adding support for fingerprint unlock to 1Password for Android when Android M launches later this year!

Fingerprint unlock (1Password for Android)

We don’t usually talk about upcoming features, but we were just too excited about this one to keep it a secret.

As we get closer to the launch of Android M, we will need your help to beta test fingerprint unlock. If you’d like to be among the first to try it out, we invite you to join our beta team. We will share more information in time; for now, we hope you are as excited about this new development as we are!

Update: We had the privilege of being demoed at Google I/O today! If you happened to be in the audience, we’d love to hear what you thought of the demo. And if you weren’t, we’re happy to be able to show you a very, very quick sneak peek. Here’s what it might be like to access your 1Password vault using fingerprint unlock.

Windows v4 blog

Turbo boost 1Password for Windows with new 4.5 version

Ctrl+\ has become muscle memory for millions of 1Password users all around the world. It’s hard to beat the speed of a customizable keyboard shortcut. Unless, of course, we focus on what happens after you invoke the 1Password extension in your web browser.

The technology behind the extension is what fills your 1Password information in web forms. It’s an incredibly complex system that we lovingly call The Brain, and it has received a serious upgrade in 1Password 4.5 for Windows. What this means for you is that filling web forms is now faster and more accurate than ever before.

An upgraded Brain is only one of the time-saving, experience-enhancing improvements in 1Password 4.5, which is a free update and available to download right now from our website.

Time-based, One-Time Passwords (TOTPs)

These single-use passwords are becoming more commonplace as a supplementary security measure to protect online accounts. If you’re not familiar with them, our blog post will help you learn how to use them in 1Password. Not only is it possible to add a time-based, one-time password to your Login items in 1Password 4.5, but it’s a cinch to do it.

Personalize Secure Notes with custom fields

Custom fields are great. They let you modify an item’s details view to hold exactly the information you want, formatted in a way that makes sense to you. In version 4.5, we’ve introduced custom fields to the Secure Notes item type.

Adding custom fields to your secure notes

1Password speaks your language

We have begun localizing 1Password for Windows and are kicking things off with nine languages. Thanks to our wonderful translators, they are:

  • Czech
  • Dutch
  • English
  • French
  • German
  • Italian
  • Polish
  • Spanish
  • Swedish

If you’d like to help translate 1Password into your language, you can create a free Crowdin account and join us at

Report website issues with Synapse

The 1Password extension is pretty much continuously being improved. It has to be, because there are umpteen billion websites out there, many with their own quirks and many others constantly changing. Now, you can help us ensure maximum compatibility by reporting any website issues you encounter.

In the extension menu, select the option to report an issue with the current website.

In the old days, you’d report a website and we’d ask you all sorts of questions, trying to learn any detail that might help us reproduce and diagnose the problem. No more! There are no lengthy questions to answer and you don’t have to know every minute detail about your web browser or the website. Our new website reporter makes it super easy: simply select the option in the extension menu and all the relevant information is already filled out for you.

Accessibility, Wi-Fi Sync, and more

If you use the NVDA screen reader, you should notice a marked improvement in this release. We are committed to making 1Password fully accessible to you, and there’s always room for improvement. We’d love your help in determining what most needs our attention. Please let us know how we’re doing!

Last on the list of highlights, but certainly not least, is Wi-Fi Sync. This is a wonderful way for you to sync 1Password for Windows with 1Password for iOS when you’re on the same wireless network, if you prefer not to use cloud-based services. We are constantly working to improve performance and reliability, and Wi-Fi Sync has received a nice coat of polish in this update.

1Password 4.5 for Windows is available now as a free update for existing owners (Help > Check for New Version), or you can grab a new copy from our downloads page. Thank you for choosing 1Password!

One can never have too many palm tree pictures.

The sixth annual AGConf includes record number of smiles … and selfies

One of the awesome things about AgileBits is that we’re a mostly remote company. We hail from six different countries around the world, and two different continents. Before we opened our Toronto office two years ago, in fact, there was no headquarters (except, perhaps Dave and Roustem’s basements). This means that a large portion of the company gets to work from wherever their hearts desire: home office, coffee shop, city park, you name it. Which is completely awesome … except that we never really get to hang out as a team. That’s why the entire AgileBits gang tries to meet up every year or so in a sunny, palm-tree-filled location to talk 1Password, and to get to know each other a little better.

AgileBits Group Photo 2015

AGConf[5] followed in the proud tradition of AGConf[4] and saw the team weigh anchor on our now favourite cruise ship, the Liberty of the Seas.

Cruising and collaborating

Of course, one of the best things about having the whole team in one place is that it provides an all-too-rare opportunity for in-person collaboration. This opportunity was not wasted as we hauled out laptops in hotel lobbies, cruise ship lounges, and even poolside patios to share ideas and get support questions answered. It was so neat to be able to sit next to a friend who is normally a thousand miles away and solve a tricky question face-to-face instead of conversing solely via emoji and gif (and the occasional word) in Slack.

You’ve already seen the fruits of some of this collaboration in recent updates to 1Password, and our shiny new Knowledgebase, but we have even more great things that we’re excited to show you … soon!

All aboard!

Of course, even a work-cation can’t be all work and no play … and there was certainly a ton of fun available on board the ship.  From an all-you-can-eat frozen yogurt bar and all-day buffets to fancy ‘family’ dinners in a swanky dining room, we never went hungry. There were hot tubs to keep us relaxed, lounges for us to take over to play innumerable games of the Resistance, and a handy karaoke bar for when we just needed to get our groove on. (Note to the daring: never challenge Khad and his wife to a sing-off … you will not win.)


On this voyage, the Liberty of the Seas stopped in Belize and Cozumel, and we took full advantage of the opportunity to explore these tropical locations.

What a trip!

As always, our annual meet-up has left us all feeling refreshed, inspired, and ready to take 1Password to the next level.

Presented without comment: