<?xml version="1.0"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
	<id>https://consumerrights.wiki/api.php?action=feedcontributions&amp;feedformat=atom&amp;user=2001%3AA61%3A12AD%3AC101%3A5ED3%3AB86A%3AC267%3A3FB4</id>
	<title>Consumer Rights Wiki - User contributions [en]</title>
	<link rel="self" type="application/atom+xml" href="https://consumerrights.wiki/api.php?action=feedcontributions&amp;feedformat=atom&amp;user=2001%3AA61%3A12AD%3AC101%3A5ED3%3AB86A%3AC267%3A3FB4"/>
	<link rel="alternate" type="text/html" href="https://consumerrights.wiki/w/Special:Contributions/2001:A61:12AD:C101:5ED3:B86A:C267:3FB4"/>
	<updated>2026-04-29T11:00:54Z</updated>
	<subtitle>User contributions</subtitle>
	<generator>MediaWiki 1.44.0</generator>
	<entry>
		<id>https://consumerrights.wiki/index.php?title=1Password&amp;diff=32717</id>
		<title>1Password</title>
		<link rel="alternate" type="text/html" href="https://consumerrights.wiki/index.php?title=1Password&amp;diff=32717"/>
		<updated>2026-01-05T10:39:49Z</updated>

		<summary type="html">&lt;p&gt;2001:A61:12AD:C101:5ED3:B86A:C267:3FB4: Explain Okta incident&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;br /&gt;
{{ProductCargo&lt;br /&gt;
|Company=Agilebits&lt;br /&gt;
|ProductLine=1Password&lt;br /&gt;
|InProduction=Yes&lt;br /&gt;
|ArticleType=Product&lt;br /&gt;
|Category=Software,Password Managers&lt;br /&gt;
|Website=https://1password.com/&lt;br /&gt;
|Description=1Password is a secure password manager that stores and encrypts passwords, login details, and other sensitive information in a digital vault&lt;br /&gt;
|Logo=1Password-logo.png|ReleaseYear=2006}}1Password is a multi-platform subscription-based password manager developed by AgileBits Inc. It is often used due to the combination of a master password with a second secret key generated on-device (i.e., not in the cloud). Unlocking a user&#039;s vault therefore requires &#039;&#039;&#039;both&#039;&#039;&#039; pieces of information to decrypt and access. It also supports conventional two factor authentication using either software tokens or hardware-based tokens (e.g., Yubikey, Google Titan), which can be added to further secure a vault. 1Password is closed-source and is not self-hostable.&lt;br /&gt;
&lt;br /&gt;
1Password, in addition to passwords, is capable of storing myriad site credentials including one-time codes, emails / user names, and additional notes.&amp;lt;ref&amp;gt;{{Cite web |title=Password Manager for Individuals &amp;amp; Families |url=https://1password.com/product/password-manager |url-status=live |archive-url=https://web.archive.org/web/20251030021958/https://1password.com/product/password-manager |archive-date=2025-10-30 |access-date=2025-10-21 |website=1Password}}&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Consumer impact summary==&lt;br /&gt;
&lt;br /&gt;
===Freedom===&lt;br /&gt;
&amp;lt;blockquote&amp;gt;&amp;quot;You can export your 1Pasword information at any time. If you discontinue payment, your account will enter a frozen (read-only) state that still allows you to retrieve and export your information. Your export will be limited to the information you saved in 1Password. We can’t guarantee that vault permissions, group structures, and other details about relationships between people and information are included.&amp;quot;&amp;lt;ref name=&amp;quot;privacy&amp;quot;&amp;gt;{{Cite web |date=2025-02-27 |title=About 1Password and your privacy |url=https://support.1password.com/1password-privacy/ |url-status=live |archive-url=https://web.archive.org/web/20250905085406/https://support.1password.com/1password-privacy/ |archive-date=2025-09-05 |access-date=2025-09-05 |work=1Password Support}}&amp;lt;/ref&amp;gt;&amp;lt;/blockquote&amp;gt;Users can import existing passwords from other managers and export passwords and other content in formats suitable for importing into other managers. 1Password is not a walled-garden. Allowing the subscription to expire places an account in a read-only state, where the user can still download their passwords and other saved content.&lt;br /&gt;
&lt;br /&gt;
===Privacy===&lt;br /&gt;
From &amp;quot;Your Rights&amp;quot; section of the privacy policy:&amp;lt;blockquote&amp;gt;&amp;quot;&#039;&#039;&#039;You have the right to your information.&#039;&#039;&#039; We&#039;ll never lock you out of your 1Password account, but we&#039;re unable to decrypt it for you.&amp;quot;&amp;lt;ref name=&amp;quot;privacy&amp;quot; /&amp;gt; &amp;lt;/blockquote&amp;gt;This implies anything inside it is hidden from the company, which is great as it is a password manager.&amp;lt;blockquote&amp;gt;&amp;quot;&#039;&#039;&#039;You have the right to know what we know.&#039;&#039;&#039; You have the right to know what we know about you and see how we handle that information. If you make such a request, you&#039;ll receive a screenshot of what we can see about you in our systems. To protect customer privacy, these requests will be carefully authenticated beyond demonstrating control of the registered email address.&amp;quot;&amp;lt;ref name=&amp;quot;privacy&amp;quot; /&amp;gt;&amp;lt;/blockquote&amp;gt;Possibly, such a request will need to contain identifying information you have to provide in order to use the service such as email, name, address, and payment information.&lt;br /&gt;
&lt;br /&gt;
===User security===&lt;br /&gt;
Users should be aware that using password manager browser extensions increases their vulnerability to clickjacking&amp;lt;ref name=&amp;quot;:0&amp;quot;&amp;gt;{{Cite web |last=Toulas |first=Bill |date=2025-08-20 |title=Major password managers can leak logins in clickjacking attacks |url=https://www.bleepingcomputer.com/news/security/major-password-managers-can-leak-logins-in-clickjacking-attacks/ |url-status=live |archive-url=https://web.archive.org/web/20250929091759/https://www.bleepingcomputer.com/news/security/major-password-managers-can-leak-logins-in-clickjacking-attacks/ |archive-date=2025-09-29 |access-date=2025-09-05 |work=Bleeping Computer}}&amp;lt;/ref&amp;gt; where the autofill feature of password managers is abused to trick the password manager into leaking user credentials and other sensitive details.&amp;lt;ref name=&amp;quot;:1&amp;quot;&amp;gt;{{Cite web |last=Naprys |first=Ernestas |date=2025-08-21 |title=Major flaw affecting password managers: they autofill credentials for attackers |url=https://cybernews.com/security/password-managers-autofill-credentials-for-attackers/ |url-status=live |archive-url=https://web.archive.org/web/20251019001532/https://cybernews.com/security/password-managers-autofill-credentials-for-attackers/ |archive-date=2025-10-19 |access-date=2025-09-05 |work=Cybernews}}&amp;lt;/ref&amp;gt; It is considered best practice to copy in these elements on trusted pages manually. &amp;lt;ref name=&amp;quot;:0&amp;quot; /&amp;gt;&amp;lt;ref name=&amp;quot;:1&amp;quot; /&amp;gt;&amp;lt;ref&amp;gt;{{Cite web |last=Tóth |first=Marek |date=2025-09-11 |title=DOM-based Extension Clickjacking: Your Password Manager Data at Risk |url=https://marektoth.com/blog/dom-based-extension-clickjacking/ |url-status=live |archive-url=https://web.archive.org/web/20251020074626/https://marektoth.com/blog/dom-based-extension-clickjacking/ |archive-date=2025-10-20 |access-date=2025-10-21 |website=marektóth}}&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===Business model===&lt;br /&gt;
Subscription based, has a strong emphasis on enterprise credential management,&amp;lt;ref&amp;gt;{{Cite web |title=1Password Device Trust |url=https://1password.com/product/device-trust |url-status=live |archive-url=https://web.archive.org/web/20251030021959/https://1password.com/product/device-trust |archive-date=2025-10-30 |access-date=2025-10-21 |website=1Password}}&amp;lt;/ref&amp;gt;&amp;lt;ref&amp;gt;{{Cite web |title=XAM: Extended Access Management |url=https://1password.com/extended-access-management |url-status=live |archive-url=https://web.archive.org/web/20251020062352/https://1password.com/extended-access-management |archive-date=2025-10-20 |access-date=2025-10-21 |website=1Password}}&amp;lt;/ref&amp;gt;  especially for secret management for software development (e.g., SSH keys, authentication tokens, API keys, etc.).{{CitationNeeded}} &amp;lt;!-- A skim through the product pages, I couldn&#039;t find this particular mention. It&#039;s probably somewhere, though and that the problem is I don&#039;t understand the technology to know where to look --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===Market control===&lt;br /&gt;
&amp;lt;!-- This still kinda sucks, but I did technically delete what I felt was placeholder text -Raster --&amp;gt; &lt;br /&gt;
1Password claims on its website front page that it is industry leading, although it does not cite any public market researches or 3rd party audits. However, a bug bounty program exists on HackerOne.&amp;lt;ref&amp;gt;{{Cite web |date=2024-12-09 |title=1Password - CTF {{!}} Bug Bounty Program Policy |url=https://hackerone.com/1password_ctf?type=team |url-status=live |archive-url=https://web.archive.org/web/20251004161711/https://hackerone.com/1password_ctf?type=team |archive-date=2025-10-04 |access-date=2025-10-21 |website=HackerOne}}&amp;lt;/ref&amp;gt; Market studies and reviews (as of October 2025) show that it has significant competitive control.&amp;lt;ref&amp;gt;{{Cite web |title=Password Management Market Size &amp;amp; Share Analysis - Growth Trends &amp;amp; Forecasts (2025 - 2030) |url=https://www.mordorintelligence.com/industry-reports/password-management-market |url-status=live |archive-url=https://web.archive.org/web/20250907113812/https://www.mordorintelligence.com/industry-reports/password-management-market |archive-date=2025-09-07 |access-date=2025-10-21 |website=Mordor Intelligence}}&amp;lt;/ref&amp;gt;&amp;lt;ref&amp;gt;{{Cite web |last=Bouman |first=Amber |last2=Spadafora |first2=Anthony |date=2025-09-11 |title=The best password managers in 2025 |url=https://www.tomsguide.com/us/best-password-managers,review-3785.html |url-status=live |archive-url=https://web.archive.org/web/20251012224159/https://www.tomsguide.com/us/best-password-managers,review-3785.html |archive-date=2025-10-12 |access-date=2025-10-21 |website=Tom&#039;s Guide}}&amp;lt;/ref&amp;gt;&amp;lt;ref&amp;gt;{{Cite web |last=Key |first=Kim |last2=Henry |first2=Alan |date=2025-10-14 |title=The Best Password Managers for 2025 |url=https://www.pcmag.com/picks/the-best-password-managers |url-status=live |archive-url=https://web.archive.org/web/20251017061423/https://www.pcmag.com/picks/the-best-password-managers |archive-date=2025-10-17 |access-date=2025-10-21 |website=PCMag}}&amp;lt;/ref&amp;gt; &amp;lt;!-- These are by no means amazing sources, I just skimmed through with Ctrl + F to see what they said about 1Password. Generally it&#039;s like 5 star reviews with &amp;quot;it&#039;s okay&amp;quot; as the actual review -raster --&amp;gt; &lt;br /&gt;
&lt;br /&gt;
==Incidents==&lt;br /&gt;
This is a list of all consumer protection incidents related to this product. Any incidents not mentioned here can be found in the [[:Category:{{PAGENAME}}|{{PAGENAME}} category]].&lt;br /&gt;
&lt;br /&gt;
===1Password Okta instance breach, discovered (&#039;&#039;29 Sept 2023&#039;&#039;)===&lt;br /&gt;
On September 28, 2023, the Okta Help Center suffered a security incident. During the breach, the attackers were able to extract sensitive data from the customer support system.&amp;lt;ref&amp;gt;{{Cite web |last=Bradbury |first=David |date=2023-11-29 |title=October Customer Support Security Incident - Update and Recommended Actions |url=https://sec.okta.com/articles/october-security-incident-recommended-actions/ |url-status=live |archive-url=https://web.archive.org/web/20240720042135/sec.okta.com/articles/october-security-incident-recommended-actions/ |archive-date=2024-07-20 |access-date=2026-01-05 |website=Okta Security}}&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
1Password, which uses an Okta instance, published a blog post disclosing an internal investigation of the breach.&amp;lt;ref&amp;gt;{{Cite web |last=Canahuati |first=Pedro |date=2023-10-23 |title=Okta Support System incident and 1Password |url=https://blog.1password.com/okta-incident/ |url-status=live |archive-url=https://web.archive.org/web/20250905070945/https://blog.1password.com/okta-incident/ |archive-date=2025-09-05 |access-date=2025-09-05 |work=1Password Blog}}&amp;lt;/ref&amp;gt; According to their disclosure, the attackers&#039; actions triggered an email to a member of the IT team who acted swiftly to contain the breach. The company reported that no user data was exfiltrated or decrypted.&amp;lt;ref&amp;gt;https://blog.1password.com/files/okta-incident/okta-incident-report.pdf&amp;lt;/ref&amp;gt; &amp;lt;!-- An archived copy is available at https://consumerrights.wiki/images/1/12/Okta-incident-report.pdf by clicking the below picture, but I&#039;m not sure it&#039;s the most intuitive way to access it for whoever CRW will be presented to as evidence as it requires clicking twice. Maybe I&#039;m overthinking this... -raster  --&amp;gt;&lt;br /&gt;
&amp;lt;gallery&amp;gt;&lt;br /&gt;
File:Okta-incident-report.pdf|PDF document report of the breach (click twice to open)&lt;br /&gt;
&amp;lt;/gallery&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==See also==&lt;br /&gt;
==References==&lt;br /&gt;
{{reflist}}&lt;br /&gt;
&lt;br /&gt;
[[Category:{{PAGENAME}}]]&lt;/div&gt;</summary>
		<author><name>2001:A61:12AD:C101:5ED3:B86A:C267:3FB4</name></author>
	</entry>
	<entry>
		<id>https://consumerrights.wiki/index.php?title=Microsoft_Office_2019_for_Mac&amp;diff=32716</id>
		<title>Microsoft Office 2019 for Mac</title>
		<link rel="alternate" type="text/html" href="https://consumerrights.wiki/index.php?title=Microsoft_Office_2019_for_Mac&amp;diff=32716"/>
		<updated>2026-01-05T09:58:40Z</updated>

		<summary type="html">&lt;p&gt;2001:A61:12AD:C101:5ED3:B86A:C267:3FB4: Fix broken Company and ProductLine fields&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Stub}}&lt;br /&gt;
{{ProductCargo&lt;br /&gt;
|ArticleType=Product&lt;br /&gt;
|Category=Software&lt;br /&gt;
|Company=Microsoft&lt;br /&gt;
|Description=&lt;br /&gt;
|InProduction=No&lt;br /&gt;
|Logo=Microsoft Office logo (2019-present).svg&lt;br /&gt;
|ProductLine=Microsoft Office&lt;br /&gt;
|ReleaseYear=24 September 2018&lt;br /&gt;
|Website=https://www.microsoft.com/en-us/microsoft-365/microsoft-office&lt;br /&gt;
}}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Microsoft Office 2019&#039;&#039;&#039; update 16.78.3 (23102801) was the last functional version of Office 2019 (perpetual) for Apple macOS computers, released on 31 October 2023. If automatic updates are enabled as recommended by Microsoft, Office applications will continue to update but no longer function properly. Instead of opening documents, the user is presented with a screen display informing them that Office 2019 is no longer supported and directing them to purchase [[Microsoft Office 365]] subscription or a Microsoft Office 2021 license.&amp;lt;ref&amp;gt;{{Cite web |author=Christophe |title=End of support for office 2019 for Mac now doesn&#039;t allow me to create or edit documents anymore unless i upgrade to Microsoft 365 or buy the new office 2021 pack. |url=https://learn.microsoft.com/en-us/answers/questions/5238983/end-of-support-for-office-2019-for-mac-now-doesnt?forum=msoffice-all&amp;amp;referrer=answers |website=[[Microsoft]] |date=17 Nov 2023 |access-date=8 Dec 2025 |url-status=live |archive-url=https://web.archive.org/web/20251208232831/https://learn.microsoft.com/en-us/answers/questions/5238983/end-of-support-for-office-2019-for-mac-now-doesnt?forum=msoffice-all&amp;amp;referrer=answers |archive-date=8 Dec 2025}}&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
This applies to consumer perpetual (Home and Student, Business, etc.) and volume license Office 2019 which were sold as a one-time purchase (rather than the subscription-based Office 365).&lt;br /&gt;
&lt;br /&gt;
Users of this application will be unable to speak with Microsoft about the issue, as the product is [[End of life product|out of support]].&lt;br /&gt;
&lt;br /&gt;
==Consumer impact summary==&lt;br /&gt;
*&#039;&#039;&#039;Broken product:&#039;&#039;&#039; Automatic updating is enabled by default and typically left that way by the average user. Microsoft uses this to brick Office 2019, despite the user having paid for a &#039;&#039;perpetual&#039;&#039; license for the product, to motivate their customer to move to a newer product. This presents the user with two choices: Either pay up for an unwanted &amp;quot;upgrade&amp;quot; or troubleshoot reverting to the last version (if possible).&lt;br /&gt;
&lt;br /&gt;
==Possible fix==&lt;br /&gt;
The steps below sometimes work, however one should have their original license key available in case it is required. Also note, Office 2019 update 16.78.3 is functional on Sequoia 15.2.&lt;br /&gt;
&lt;br /&gt;
# Move all Microsoft Office applications to the trash&amp;lt;ref&amp;gt;{{Cite web |author= |title=Uninstall Office for Mac |url=https://support.microsoft.com/en-us/office/uninstall-office-for-mac-eefa1199-5b58-43af-8a3d-b73dc1a8cae3 |website=[[Microsoft]] |access-date=8 Dec 2025 |url-status=live |archive-url=https://web.archive.org/web/20250729063237/https://support.microsoft.com/en-us/office/uninstall-office-for-mac-eefa1199-5b58-43af-8a3d-b73dc1a8cae3 |archive-date=29 Jul 2025}}&amp;lt;/ref&amp;gt;&lt;br /&gt;
# Locate ~/Library/Containers and move the following to the trash:&lt;br /&gt;
## com.microsoft.errorreporting&lt;br /&gt;
## com.microsoft.Excel&lt;br /&gt;
## com.microsoft.netlib.shipassertprocess&lt;br /&gt;
## com.microsoft.Office365ServiceV2&lt;br /&gt;
## com.microsoft.Outlook&lt;br /&gt;
## com.microsoft.Powerpoint&lt;br /&gt;
## com.microsoft.RMS-XPCService&lt;br /&gt;
## com.microsoft.Word&lt;br /&gt;
## com.microsoft.OneNote&lt;br /&gt;
# Locate ~/Library/Group Containers and move the following to the trash:&lt;br /&gt;
## UBF8T346G9.ms&lt;br /&gt;
## UBF8T346G9.Office&lt;br /&gt;
## UBF8T346G9.OfficeOsfWebHost&lt;br /&gt;
# Empty the trash&lt;br /&gt;
# Visit https://learn.microsoft.com/en-us/officeupdates/update-history-office-for-mac and download Office 2019 update 16.78.3&lt;br /&gt;
# Install the downloaded version of Office&lt;br /&gt;
# Test an office app&lt;br /&gt;
# If Office still redirects to purchasing Office 365, perform all the steps again, and use the License Removal Tool (https://go.microsoft.com/fwlink/?linkid=849815)&lt;br /&gt;
# Once an Office app is verified functional, disable automatic updates&lt;br /&gt;
# The Microsoft updater can also be removed by deleting the update tool located here: ~/Library/Application Support/Microsoft/MAU&lt;br /&gt;
&lt;br /&gt;
==References==&lt;br /&gt;
{{Reflist}}&lt;br /&gt;
&lt;br /&gt;
[[Category:Microsoft Office]]&lt;/div&gt;</summary>
		<author><name>2001:A61:12AD:C101:5ED3:B86A:C267:3FB4</name></author>
	</entry>
</feed>