Use the “passwords” feature to check if one of yours is compromised. If it shows up, never ever reuse those credentials. They’ll be baked into thousands of botnets etc. and be forevermore part of automated break-in attempts until one randomly succeeds.

  • Kyrgizion@lemmy.worldOP
    link
    fedilink
    English
    arrow-up
    5
    arrow-down
    2
    ·
    14 hours ago

    These kinds of breaches are at the site level. Not much you can do as a regular user if the company doesn’t hash or salt their passwords, for example.

    • Pika@sh.itjust.works
      link
      fedilink
      English
      arrow-up
      6
      ·
      edit-2
      14 hours ago

      I believe they are replying to the article you posted in regards to the download from legit sites comment, not the fact that the sites have shit web practices (which while correct is a different thing).

      To the people who didn’t read the article posted in the comment prior, basically the software installed wasn’t the legitimate software, it was a modified software that was a trojan that was forwarding passwords stored in the keepass database to a home server.

      That’s not something that the sites are going wrong, nor is it the password managers fault. That’s fully the users fault for downloading a trojan.

    • Joeffect@lemmy.world
      link
      fedilink
      English
      arrow-up
      4
      ·
      14 hours ago

      Not from what the article says

      involves compromised download links and trojanized versions of the legitimate KeePass application that appear identical to the authentic software on the surface, while harboring dangerous capabilities beneath.