1Password: Difference between revisions
Mynameismud (talk | contribs) Added basic content to flesh out the page somewhat |
Mynameismud (talk | contribs) mNo edit summary |
||
(One intermediate revision by the same user not shown) | |||
Line 14: | Line 14: | ||
==Consumer impact summary== | ==Consumer impact summary== | ||
=== User Freedom === | ===User Freedom=== | ||
Users can import existing passwords from other managers and export passwords and other content in formats suitable for importing into other managers. 1Password is not a walled-garden. Allowing the subscription to expire places an account in a read-only state, allowing the user to download their passwords and other saved content. | Users can import existing passwords from other managers and export passwords and other content in formats suitable for importing into other managers. 1Password is not a walled-garden. Allowing the subscription to expire places an account in a read-only state, allowing the user to download their passwords and other saved content. | ||
"You can export your 1Pasword information at any time. If you discontinue payment, your account will enter a frozen (read-only) state that still allows you to retrieve and export your information. Your export will be limited to the information you saved in 1Password. We can’t guarantee that vault permissions, group structures, and other details about relationships between people and information are included."[https://support.1password.com/1password-privacy/] | "You can export your 1Pasword information at any time. If you discontinue payment, your account will enter a frozen (read-only) state that still allows you to retrieve and export your information. Your export will be limited to the information you saved in 1Password. We can’t guarantee that vault permissions, group structures, and other details about relationships between people and information are included."[https://support.1password.com/1password-privacy/] | ||
=== User Privacy === | ===User Privacy=== | ||
Extracted directly from the privacy policy, | Extracted directly from the privacy policy, | ||
Line 26: | Line 26: | ||
"You have the right to know what we know. You have the right to know what we know about you and see how we handle that information. If you make such a request, you’ll receive a screenshot of what we can see about you in our systems. To protect customer privacy, these requests will be carefully authenticated beyond demonstrating control of the registered email address." (expect to be any identifying information you have to provide in order to use the service such as email, name, address, payment information) | "You have the right to know what we know. You have the right to know what we know about you and see how we handle that information. If you make such a request, you’ll receive a screenshot of what we can see about you in our systems. To protect customer privacy, these requests will be carefully authenticated beyond demonstrating control of the registered email address." (expect to be any identifying information you have to provide in order to use the service such as email, name, address, payment information) | ||
=== User Security === | ===User Security=== | ||
Users should be aware that using password manager browser extensions increases their vulnerability to clickjacking[https://www.bleepingcomputer.com/news/security/major-password-managers-can-leak-logins-in-clickjacking-attacks/] [https://cybernews.com/security/password-managers-autofill-credentials-for-attackers/] where the autofill feature of password managers is abused to trick the password manager into leaking user credentials and other sensitive details. It is always best practice to copy in these elements on trusted pages manually. | Users should be aware that using password manager browser extensions increases their vulnerability to clickjacking[https://www.bleepingcomputer.com/news/security/major-password-managers-can-leak-logins-in-clickjacking-attacks/] [https://cybernews.com/security/password-managers-autofill-credentials-for-attackers/] where the autofill feature of password managers is abused to trick the password manager into leaking user credentials and other sensitive details. It is always best practice to copy in these elements on trusted pages manually. | ||
=== Business Model === | ===Business Model=== | ||
Subscription based, has a strong emphasis on enterprise credential management, especially for secret management for software development (e.g., SSH keys, authentication tokens, API keys, etc.). | Subscription based, has a strong emphasis on enterprise credential management, especially for secret management for software development (e.g., SSH keys, authentication tokens, API keys, etc.). | ||
=== Market Control === | ===Market Control=== | ||
Password managers | Password managers are pretty much a dime a dozen these days, highly competitive. | ||
==Incidents== | ==Incidents== | ||
This is a list of all consumer protection incidents related to this product. Any incidents not mentioned here can be found in the [[:Category:{{PAGENAME}}|{{PAGENAME}} category]]. | This is a list of all consumer protection incidents related to this product. Any incidents not mentioned here can be found in the [[:Category:{{PAGENAME}}|{{PAGENAME}} category]]. | ||
===1Password Okta instance | ===1Password Okta instance breach, discovered 29 Sept 2023=== | ||
{{Main|link to the main article}} | {{Main|link to the main article}} | ||