216 lines
19 KiB
HTML
216 lines
19 KiB
HTML
<!DOCTYPE html>
|
|
<html class="no-js" itemscope itemtype="://schema.org/Product">
|
|
<head>
|
|
<meta charset="utf-8">
|
|
<meta http-equiv="X-UA-Compatible" content="IE=edge,chrome=1">
|
|
<title itemprop="name">Master Password — Secure your life, forget your passwords.</title>
|
|
<meta itemprop="description" content="Master Password is an ingenious password solution that makes your passwords truly impossible to lose." />
|
|
<meta itemprop="image" content="img/about.png" />
|
|
<meta name="apple-itunes-app" content="app-id=510296984" />
|
|
<meta name="viewport" content="width=device-width">
|
|
<meta name="viewport" content="width=device-width, initial-scale=1.0">
|
|
|
|
<link rel="icon" href="img/favicon.png" type="image/x-png" />
|
|
<link rel="shortcut icon" href="img/favicon.png" type="image/x-png" />
|
|
<link rel="stylesheet" href="css/bootstrap.min.css">
|
|
<link rel="stylesheet" href="css/bootstrap-responsive.min.css">
|
|
<link rel="stylesheet" href="css/main.css?7">
|
|
|
|
<script src="js/vendor/modernizr-2.6.2.min.js"></script>
|
|
<script src="js/vendor/prefixfree.min.js"></script>
|
|
</head>
|
|
<body itemscope itemtype="://schema.org/MobileSoftwareApplication" id="what">
|
|
<!--[if lt IE 7]>
|
|
<p class="chromeframe">You are using an <strong>outdated</strong> browser. Please <a href="http://browsehappy.com/">upgrade your browser</a> or <a href="http://www.google.com/chromeframe/?redirect=true">activate Google Chrome Frame</a> to improve your experience.</p>
|
|
<![endif]-->
|
|
|
|
<nav class="navbar navbar-fixed-top">
|
|
<div class="navbar-inner">
|
|
<div class="container">
|
|
<button type="button" class="btn btn-navbar" data-toggle="collapse" data-target=".nav-collapse">
|
|
<span class="icon-bar"></span>
|
|
<span class="icon-bar"></span>
|
|
<span class="icon-bar"></span>
|
|
</button>
|
|
<a class="brand" href="./">●●●|</a>
|
|
<div class="nav-collapse collapse">
|
|
<ul class="nav">
|
|
<li class="active"><a href="what.html">What is it? How do I use it?</a></li>
|
|
<li><a href="security.html">Is it safe?</a></li>
|
|
<li><a href="algorithm.html">How does it work?</a></li>
|
|
</ul>
|
|
<ul class="nav pull-right">
|
|
<li><a href="irc://irc.freenode.net/#masterpassword" onclick="_gaq.push(['_trackPageview', '/outbound/irc']);">#masterpassword</a></li>
|
|
<li class="divider-vertical"></li>
|
|
<li><a href="faq.html">FAQ</a></li>
|
|
<li><a href="support.html">Support</a></li>
|
|
<li><a href="https://github.com/Lyndir/MasterPassword/" onclick="_gaq.push(['_trackPageview', '/outbound/github']);">Source</a></li>
|
|
</ul>
|
|
</div><!--/.nav-collapse -->
|
|
</div>
|
|
</div>
|
|
</nav>
|
|
|
|
<header>
|
|
<img class="background" src="img/mp-process-angled.png" data-stellar-ratio="2.5" />
|
|
<div class="container">
|
|
|
|
<div class="content">
|
|
<h2>Master Password is a wholly <strong>different way</strong> of doing passwords.</h2>
|
|
</div>
|
|
|
|
</div>
|
|
</header>
|
|
|
|
<section><div class="content">
|
|
|
|
<div class="thumb clearfix">
|
|
|
|
<h1>The Master Password way</h1>
|
|
<p>Stop writing down your passwords.</p>
|
|
<p>Stop storing your passwords in a "secure" place, such as a vault, a keychain, an app or "the cloud".</p>
|
|
<p>In fact, just stop thinking about passwords at all.</p>
|
|
<p>Master Password users have no more passwords. They have a password. Their password is their single master key for unlocking all doors.</p>
|
|
|
|
<h2 name="how">One, two, enter.</h2>
|
|
<p>As a Master Password user, there are about three steps to entering any site:</p>
|
|
<ol>
|
|
<li>Enter your master password to unlock your Master Password app.</li>
|
|
<li>Find the name of the site you want to get into, copy its key.</li>
|
|
<li>Paste the site's key into the site and log in.</li>
|
|
</ol>
|
|
<p>Most browsers will then ask you to "save" the site's password. For most people, this is a good idea and will subsequently allow you to log in without having to use Master Password at all.</p>
|
|
|
|
<h2>How do I get started?</h2>
|
|
<p>Depending on how many sites you currently hold active accounts on, this is likely going to be your biggest curve.</p>
|
|
<p>Master Password <strong><em>generates passwords</em> for you to use</strong>. That means, you <em>cannot use your old passwords with it</em> (in truth, you could, but that would defeat the purpose - you <em>shouldn't</em>).</p>
|
|
<p>For every site where you currently hold an account:<br />
|
|
Sorry, you'll have to log into the site once with your old password and update the password to the new and much stronger password Master Password has generated for you.</p>
|
|
<p>For every site you sign up with from now on:<br />
|
|
Simple: stop trying to come up with a good new password for your next account. Just copy/paste Master Password's generated password for this site into the password and confirm password fields.</p>
|
|
|
|
<h3>I want pictures.</h3>
|
|
<p>All right. Here's Robert on his iPhone:</p>
|
|
<p><img src="img/howto-twitter-signup.png" /></p>
|
|
<p>He wants to sign up for Twitter. Robert filled in all the fields, except for password. Not wanting to worry about what his twitter secret is going to be, he switches to Master Password.</p>
|
|
<img src="img/howto-mp-login.png" /></p>
|
|
<p>Of course, he begins by unlocking his user with his master password. Robert can skip this step by going into Master Password's preferences and setting it to either save his master key or remember his login, but he choses not to.</p>
|
|
|
|
<p><img src="img/howto-mp-create.png" />
|
|
<img src="img/howto-mp-create-confirm.png" /></p>
|
|
He creates a password for Twitter by using its <strong>bare domain name</strong>: <code>twitter.com</code>. He knows not to use <strike><code>mobile.twitter.com</code></strike> or <strike><code>Twitter</code></strike> or anything non-standard, because that would be very difficult to remember correctly on a later date. If he has multiple twitter accounts, he could prefix the name with a user name and an @: <code>rmitchell@twitter.com</code>,
|
|
<code>superbob@twitter.com</code>.</p>
|
|
<p><strong>Optional:</strong><br />
|
|
<img src="img/howto-mp-type-change.png" />
|
|
<img src="img/howto-mp-type-basic.png" /></p>
|
|
<p>If the account Robert's signing up for is with a website that prohibits symbols for some daft reason, Robert can change the type to <em>Basic</em> or something similar instead. Robert can also bump up the complexity to get an even more secure password if he wants.</p>
|
|
<p><img src="img/howto-twitter-paste.png" />
|
|
<img src="img/howto-twitter-done.png" /></p>
|
|
<p>When Robert created the site in Master Password, it copied the password to his pasteboard. Now, Robert just switches back to Safari and pastes his brand-new password he doesn't care to remember in twitter's password field. All done!</p>
|
|
|
|
<h2>Why, that sounds more complicated.</h2>
|
|
<p>More complicated than what, exactly? Using <code>robert17</code> for all your sites? Well, yes. That's also rather the point.</p>
|
|
<p>The point is to eliminate the many sources of insecurities related to password authentication, and yet keeping the process surprizingly trivial. What you get in exchange for these two extra first-time only steps is very robust, unique passwords which are not hackable even from a site's leaked password hashes, in addition to the freedom to forget all about passwords. Entirely.</p>
|
|
<ul>
|
|
<li>You get to stop worrying about what password you used for your bank or the government tax portal, because they both use ridiculous and different password policies.</li>
|
|
<li>You get to stop writing down passwords and keeping those notes safe from others as well as safe from loss.</li>
|
|
<li>You get to stop messing with password vaults that promise to encrypt your stuff, but can't help you when you're at a friend's house, or after your apartment fire.</li>
|
|
<li>You can stop sharing the keys to your digital life with online password websites that promise all the military grade encryption while being gagged and tapped by a government agency.</li>
|
|
</ul>
|
|
|
|
<h2 name="others">I use this other password manager, and it's awesome.</h2>
|
|
<p>I shall not endeavour to quarrel with the point on the awesome scale of your other password manager. That said, Master Password was designed from the ground up specifically because of the many flaws that existed in all the popular password managers at the time. And the times haven't changed for the better since.</p>
|
|
<p>I'm going to provide an excessively brief description of the primary flaws other password managers suffer, which Master Password is free from. Please <a href="support.html">contact me</a> if you have something to add, ask or correct.</p>
|
|
|
|
<p>While each of these services have many great pros, I will only mention those that Master Password lacks.</p>
|
|
<ul>
|
|
|
|
<li><strong>Password Vaults</strong>: 1Password, Mac OS X Keychain, KeePass, ...
|
|
<p><em>Pros:</em> Some allow you the ability to change your master password or reset it if you forgot it.</p>
|
|
<p><em>Cons:</em> Your vault needs to be backed up, and you can only access your passwords if you can access the vault. Syncing the vault to all your devices is troublesome and generally relies on uploading your secrets to a company's servers. Total data loss is catastrophic.</p></li>
|
|
|
|
<li><strong>Online Vaults</strong>: LastPass, Secret Server, Mitto, ...
|
|
<p><em>Pros:</em> Some allow you the ability to change your master password or reset it if you forgot it. Some support "two-factor" authentication.</p>
|
|
<p><em>Cons:</em> Access to your secrets depends on an active data connection. You've given the keys to your global digital identity to some company you probably shouldn't trust as much as you wish you could. Their website stating that they "can't access your data" doesn't change this, nor does it make any assurances about tomorrow.</p></li>
|
|
|
|
<li><strong>Password Generators</strong>: SuperGenPass, PasswordMaker, PassHash, ...
|
|
<p><em>Pros:</em> They got the same idea as us! Yay!</p>
|
|
<p><em>Cons:</em> Sadly, nearly all of these, while claiming the same benefits as Master Password, suffer from critical flaws which either defeat their benefits (reverting them to mere password vaults) or use critically weak crypto, with the result of actually making it trivial to reverse your master password - and by extension, access to all your accounts.</p></li>
|
|
|
|
</ul>
|
|
|
|
<h2 name="cons">What are Master Password's cons? Or is it flawless?</h2>
|
|
<p>Master Password also has cons. Let's be frank and list the cons that the other solutions generally don't suffer:</p>
|
|
<p><em>Cons:</em> Changing your master password requires you to update all your site passwords. A compromised or forgotten master password requires you to do the same.</p>
|
|
|
|
<p>There are some other cons, which I consider <em>"fake cons"</em>, with a justification of why I label them as such:</p>
|
|
<ul>
|
|
<li><em>My boss gave me this password to use...</em>
|
|
<p>Master Password's generated passwords only work if you use the password generated for you. You cannot use a password somebody else gave you. Only - you can: Master Password implements a hybrid solution, allowing you to save custom passwords in the app. They are AES encrypted with your master key, but like all vault-based password managers, are not immune to loss if you ever lose your phone and
|
|
backups..</li>
|
|
<li><em>I can't reset if I forgot my master password!</em>
|
|
<p>Uh, no. If you forgot your master password, you're probably an alien replica of yourself. So no, you can't reset. If you're not a replica, just make a new user with a new master password and reset all your site passwords. Remember your master password this time.</li>
|
|
<li><em>I noticed everybody's doing this two-factor thing now.</em>
|
|
<p>Two factor authentication is defined as authenticating yourself with two methods that are so distinct that a single attack cannot compromise both. Many sites claim to use two-factor authentication but actually rely only on an extra password hidden in an app on your phone or computer. If an attacker can steal your master password, he can probably download the hidden password too. Or read in your two-factor response while you're typing it in. On top of that, you're using a password manager: after your "two-factor" authentication, you get a single password to perform another one-factor authentication with a site. As a hacker, I'd go for the weakest link to break your chain.</li>
|
|
</ul>
|
|
|
|
<h2 name="trust">You speak of trust, how can I trust you?</h2>
|
|
<p>A very valid question, and arguably the most important one to ask!</p>
|
|
<p>Trust is a very difficult thing to guarantee. Powerful entities will solicit your trust by appearing with it and coming well recommended. Trust can also be assured by legalese or contracts. If you have the means and energy to hold an entity responsible for his claims and actions, this might be sufficient for you.</p>
|
|
<p>Most of us mere mortals cannot afford this level of trust enforcement, however. We're mostly left in the position of trusting claims blindly, in the hopes that companies will not violate those claims for fear of taking a seizable public-relations hit.</p>
|
|
<h3>I propose that none of these forms of trust are sufficient adequate.</h3>
|
|
<p>In fact, Master Password is what it is because it aims to avoid any requirement of trust in the solution's author. Master Password requires no services or proprietary storage format. I've published Master Password's algorithm for you to inspect and licensed to you the full source code to the implementations for you to use.</p>
|
|
<p>What that gives you, is the ability to either inspect and learn how Master Password works or to take this information to a professional (be it an academic, mathematician or payed developer) and have him do this for you.</p>
|
|
<p>While at first glimpse, this may not seem terribly useful to you - particularly when you don't have the skill set to perform this verification yourself - but it's actually a pretty big deal to show your naked self as proof of having nothing to hide. If you want to go all the way, you could even build the application from scratch rather than rely on the binaries provided by our distributions.</p>
|
|
<p>This is the closest we can get to voiding any need for trust in Master Password, and it's more than you're likely to find in most other popular password solutions.</p>
|
|
|
|
</div>
|
|
|
|
</div></section>
|
|
|
|
<footer><div class="muted content">
|
|
|
|
<p><em>Master Password is a security product and algorithm by <a href="http://www.lhunath.com" onclick="_gaq.push(['_trackPageview', '/outbound/lhunath']);">Maarten Billemont</a>, <a href="http://www.lyndir.com" onclick="_gaq.push(['_trackPageview', '/outbound/lyndir']);">Lyndir</a> (© 2011-2014).</em><br>Usage implies agreement with our <a href="privacy.html">privacy policy and disclaimer</a>.</p>
|
|
<p><a href="http://gorillas.lyndir.com" onclick="_gaq.push(['_trackPageview', '/outbound/gorillas']);">Gorillas</a> ● <a href="http://deblock.lyndir.com" onclick="_gaq.push(['_trackPageview', '/outbound/deblock']);">DeBlock</a> ● <a href="https://github.com/Lyndir" onclick="_gaq.push(['_trackPageview', '/outbound/github']);">GitHub</a> ● <a href="http://thanks.lhunath.com" onclick="_gaq.push(['_trackPageview', '/outbound/thanks']);">Send Thanks</a></p>
|
|
|
|
</div></footer>
|
|
|
|
<!-- Scripts -->
|
|
<script src="//ajax.googleapis.com/ajax/libs/jquery/1.9.1/jquery.min.js"></script>
|
|
<script>window.jQuery || document.write('<script src="js/vendor/jquery-1.9.1.min.js"><\/script>')</script>
|
|
|
|
<script src="js/vendor/bootstrap.min.js"></script>
|
|
|
|
<script src="js/plugins.js"></script>
|
|
<script src="js/main.js"></script>
|
|
|
|
<!-- Internet Defense League -->
|
|
<script type="text/javascript">
|
|
window._idl = {};
|
|
_idl.variant = "modal";
|
|
(function() {
|
|
var idl = document.createElement('script');
|
|
idl.type = 'text/javascript';
|
|
idl.async = true;
|
|
idl.src = ('https:' == document.location.protocol ? 'https://' : 'http://') + 'members.internetdefenseleague.org/include/?url=' + (_idl.url || '') + '&campaign=' + (_idl.campaign || '') + '&variant=' + (_idl.variant || 'banner');
|
|
document.getElementsByTagName('body')[0].appendChild(idl);
|
|
})();
|
|
</script>
|
|
|
|
<!-- Google Analytics -->
|
|
<script>
|
|
var _gaq=[['_setAccount','UA-90535-15'],['_trackPageview']];
|
|
(function(d,t){var g=d.createElement(t),s=d.getElementsByTagName(t)[0];
|
|
g.src=('https:'==location.protocol?'//ssl':'//www')+'.google-analytics.com/ga.js';
|
|
s.parentNode.insertBefore(g,s)}(document,'script'));
|
|
</script>
|
|
|
|
<!-- Google +1 -->
|
|
<script type="text/javascript" src="https://apis.google.com/js/plusone.js"></script>
|
|
|
|
<!-- Tender -->
|
|
<script src="https://masterpassword.tenderapp.com/tender_widget.js" type="text/javascript"></script>
|
|
</body>
|
|
|
|
</html>
|