User Activity

  • Posted a comment on discussion Open Discussion on KeePass

    Noted.

  • Modified a comment on discussion Open Discussion on KeePass

    You are posting to a 5-year old (stale) thread. The reasons for the design decision to leave some fields unencrypted has already been adequately described by the developer in https://sourceforge.net/p/keepass/discussion/329220/thread/8d194356af/?limit=25#1ebb above. These reasons are mostly unrelated to performance. Since these reasons haven't changed, it is unlikely that fields in KeePass that don't currently support in-memory protection will support it in the foreseeable future.

  • Modified a comment on discussion Open Discussion on KeePass

    You are posting to a 5-year old (stale) thread. The reasons for the design decision to leave some fields unencrypted has already been adequately described by the developer in https://sourceforge.net/p/keepass/discussion/329220/thread/8d194356af/?limit=25#1ebb above. These reasons are mostly unrelated to performance. Since these reasons haven't changed, it is unlikely that fields that don't currently support encryption in KeePass will support encryption in the foreseeable future.

  • Modified a comment on discussion Open Discussion on KeePass

    You are posting to a 5-year old (stale) thread. The reasons for the design decision to leave some fields unencrypted has already been adequately described by the developer in https://sourceforge.net/p/keepass/discussion/329220/thread/8d194356af/?limit=25#1ebb above. These reasons are mostly unrelated to performance. Since these reasons haven't changed, fields that don't currently support encryption in KeePass won't support encryption in the foreseeable future.

  • Posted a comment on discussion Open Discussion on KeePass

    You are posting to a 5-year old (stale) thread. The reasons the design decision to leave some fields unencrypted has already been adequately described by the developer in https://sourceforge.net/p/keepass/discussion/329220/thread/8d194356af/?limit=25#1ebb above. These reasons are mostly unrelated to performance. Since these reasons haven't changed, fields that don't currently support encryption in KeePass won't support encryption in the foreseeable future.

  • Modified a comment on ticket #2979 on KeePass

    If you are worried about a malicious actor changing the database master key uncheck Change Master Key - No Key Repeat in Tools>Options…>Policy. If this option is unchecked the malicious actor would need the current database master key to change the database master key. The option can't be defeated without first closing the KeePass instance, with the result that the attacker is locked out of the database.

  • Posted a comment on ticket #2979 on KeePass

    If you are worried about a malicious actor changing the database master key uncheck Change Master Key - No Key Repeat in Tools>Options…>Policy. The malicious actor would need the current database master key to change it. The option can't be defeated without first closing the KeePass instance, with the result that the attacker is locked out of the database.

  • Posted a comment on ticket #2979 on KeePass

    See the final paragraph of my post. KeePass provides some help to mitigate accidental exposure of data in an active database, but ultimately it is your responsibility to control access to your device. If a malicous actor gains access to your device you have a serious problem see https://keepass.info/help/base/security.html#secspecattacks.

View All

Personal Data

Username:
wellread1
Joined:
2007-08-02 21:36:31

Projects

This is a list of open source software projects that wellread1 is associated with:

  • Project Logo KeePass A lightweight and easy-to-use password manager Last Updated:

Personal Tools

MongoDB Logo MongoDB