• andreluis034@lm.put.tf
    link
    fedilink
    arrow-up
    0
    ·
    edit-2
    1 year ago

    That’s not quite right though, there’s the factor you know (password to your vault), and the factor you have (a copy of the encrypted vault).

    That would be true for offline vaults, but for services hosted on internet I don’t think so. Assuming the victim does not use 2FA on their Bitwarden account, all an attacker needs is the victim’s credentials (email and password). Once you present the factor you know, the vault is automatically downloaded from their services.


    This is something I hadn’t thought until know, but I guess password managers might(?) change the factor type from something you know (the password in your head) to something you have (the vault). At which point, if you have 2FA enabled on other services, you are authenticating with 2 things you have, the vault and your phone.

    • jpj007@kbin.social
      link
      fedilink
      arrow-up
      0
      ·
      1 year ago

      Assuming the victim does not use 2FA on their Bitwarden account

      A pretty tall assumption given that we’re already talking about someone who knows to turn on 2FA for other things. If someone knows about 2FA and password managers, they’d be insane not to have 2FA set up on the password manager itself.

      • andreluis034@lm.put.tf
        link
        fedilink
        arrow-up
        0
        ·
        edit-2
        1 year ago

        That’s a fair point. I just wanted to highlight that there may be cases where a password manager isn’t automatically protected by 2FA by the two factors you mentioned (The password you know and the copy of the vault) since in the case of bitwarden fulfilling one can give you the second. In order to actually achieve 2FA in this case, you would need to enable OTPs.