Follow Slashdot stories on Twitter

 



Forgot your password?
typodupeerror
×
Apple IT

Apple To Launch 'Passwords' App, Intensifying Competition With 1Password, LastPass 79

Apple will introduce a new app called Passwords next week, aiming to simplify website and software logins for users, according to Bloomberg. The app -- offered as part of iOS 18, iPadOS 18, and macOS 15 -- will be unveiled at Apple's Worldwide Developers Conference on June 10. Powered by iCloud Keychain, Passwords will generate and manage passwords, allowing imports from rival services, and support Vision Pro headset and Windows computers.
This discussion has been archived. No new comments can be posted.

Apple To Launch 'Passwords' App, Intensifying Competition With 1Password, LastPass

Comments Filter:
  • by Baron_Yam ( 643147 ) on Friday June 07, 2024 @09:04AM (#64530219)

    If all your passwords are accessible from your computer, then following the rule 'a chain is only as strong as its weakest link', every account you store in that password manager is no safer than your local workstation logon.

    Multi-factor authentication is far better than a million long and complex passwords stored in a password manager protected by one simple password.

    Do not use a password manager. Do not join every Internet site you visit using the same password. Do use MFA.

    • Re:Security (Score:5, Insightful)

      by DarkOx ( 621550 ) on Friday June 07, 2024 @09:16AM (#64530245) Journal

      The chances someone attacks and compromises my PC - extremely remote.. Its not even on when I am away from it!

      The odds someone password sprays some popular web application - all day every day

      the odds someone decides to target 'me' and uses resources like "have I been pwnd" to see what breaches my e-mail address have been exposed in and backs into what online services I might use and does a targeted password guessing attack - certainly non-zero..

      Frankly strong complex passwords that are unique per site - are a really solid and effectively control. Doubly so when coupled with even very weak MFA like OTP via SMS. MFA bypasses do happen; phones get ripped from your hands while in use by thugs on the street and kept unlocked until they can ripp you off other ways using that access.

      The MOST secure thing you can probably do is use a password manager with a LOCAL datastore on your PC, that you keep 'somewhat' secure in your home, and further protected with a strong master password used for key derivation for use with good encryption. Yes this means can't login to stuff when you can't access your home PC.

      • by Baron_Yam ( 643147 ) on Friday June 07, 2024 @09:27AM (#64530281)

        The MFA-bypass I see most often is a 365 access token getting intercepted when someone is using free WiFi. Microsoft is working on changing their communications to prevent this method of compromise, but I don't know when that will be deployed or if it will be done for all versions of Office currently in use.

      • by rabun_bike ( 905430 ) on Friday June 07, 2024 @10:50AM (#64530557)
        I adhere to the "no cloud" policy with regards to storage of my passwords. As a security and software engineer with a specialization in cryptography I could not find a modern password program that (a) had no built in ability to connect to cloud systems (b) was a self contained native executable (c) runs on Linux, Mac, and Windows natively (d) and most importantly encrypted passwords / secrets protected by a hardware security token not tied to the target machine such as a TPM module. So I spent 2 years during COVID building a password manager for myself and my wife that does what I want. It took a lot of time to reverse engineer many of the Yubikey PIV smartcard calls so I don't have to rely on any 3rd party code to communicate with the Yubikey. The program encrypts every password to personalized Yubikeys via the PIV standard using RSA 2048 keys encrypting a AES-GCM key protecting the secret, it has zero network capabilities, it can run off a USB stick with a self-contained executable, every password is uniquely encrypted and cannot be decrypted without touching a registered Yubikey and/or using the Yubikey PIN for each password and not just when you first open the password "vault." And of it runs on all my different desktop environments. What I don't know is does anyone care? Would anyone want something like this except for me? It would be interesting to know as thus far many of my colleagues find it interesting but don't seem to get the level of security I have gone to LOL..
      • by FictionPimp ( 712802 ) on Friday June 07, 2024 @01:41PM (#64531111) Homepage

        I use apple's hide my email feature combined with a password manager for access today.

        Every site has a unique email address and unique password and MFA if supported. It's seamless and easy to use. Sure you could compromise the device and gain access to my password manager, but then you need a MFA bypass. Plus the password manager is locked so you need that password. I'm comfortable with that. Even if you use the OSX built in password manager you have to prompt your fingerprint to auto-fill. It's good enough and perfect is the enemy of good.

      • by strikethree ( 811449 ) on Monday June 10, 2024 @08:37AM (#64537375) Journal

        The chances someone attacks and compromises my PC - extremely remote.. Its not even on when I am away from it!

        I could swear you said this ironically... and then I read the rest of your words. WTF dude? Seriously? Your PC is being attacked every time you do anything on the Internet. Yes, "you" are not important enough to attack, but your computer is and in fact, is being tested constantly. Better keep up on your patches if you are going to have such naive views about your safety.

    • by account_deleted ( 4530225 ) on Friday June 07, 2024 @09:20AM (#64530257)
      Comment removed based on user account deletion
      • by UnknowingFool ( 672806 ) on Friday June 07, 2024 @09:32AM (#64530297)

        I recall reading somewhere that MFA is the easiest most effective security to implement, preventing something like 90% of common attacks. Take this all with a grain of salt, as I am not bothering with finding citations :)

        Effective but I do not know about "easy" though. For a consumer getting an authentication app is not difficult nor the setup for each site. For the backend systems, I do not know. Now the difficulty is worth the increased security.

        • by account_deleted ( 4530225 ) on Friday June 07, 2024 @10:47AM (#64530543)
          Comment removed based on user account deletion
          • by Anonymous Coward on Friday June 07, 2024 @11:00AM (#64530591)

            Yep super easy to setup there and in many other places too. I even have MFA for SSH on my *nix boxes, which are purely personal use, it was pretty trivial to setup. Seeing all of these financial institutions still using SMS or email for MFA is just purely asinine. They could implement MFA, supporting an authenticator app for their login system in a couple hours of dev, testing and deployment.

    • Re:Security (Score:4, Insightful)

      by UnknowingFool ( 672806 ) on Friday June 07, 2024 @09:22AM (#64530265)

      Do not use a password manager. Do not join every Internet site you visit using the same password. Do use MFA.

      You do realize you set up conflicting conditions? How do you remember all the passwords you have created again? Oh right use MFA that not every site has. That is like advocating every one not drive their own car; use the subway in your town that does not exist.

    • by peril ( 11405 ) on Friday June 07, 2024 @09:34AM (#64530313)

      Uh - I think you mean - use MFA where you can - the password manager is not directly accessible without (typically) a MFA login itself, and then it protects individual credentials so there are no credentials shared with any online account.

      The problem that password managers help / solve is password portability between platforms, so that for instances - you have access to the same vault on windows, mac, linux, android, ios.

      Not to argue the point of MFA - that's 100% accurate, but rotating your password, having unique passwords, and having mfa protection of the vault are the big benefits of 1Password / Bitwarden ; Can't really consider LastPass in this category because of how awful their breach responses have been.

    • by ctilsie242 ( 4841247 ) on Friday June 07, 2024 @10:51AM (#64530565)

      If I were able to concoct a new password for every site which is unique... which can be hard, (as I can't just use a HMAC with a sitename because some sites have different password rules, so one master PW being used to hash the host name isn't going to cut it,) maybe not using a PW manager is good. However, it is about addressing the weakest links. Credential stuffing and brute force PW guessing is a major attack vector. Many sites don't have lockouts, and if they do, the attackers just use another IP range. So, protecting against that requires long, random passwords. This is what a PW manager goes well with. foo.com gets a randomly generated password completely different from bar.com, and no amount of guessing can link the two, assuming a decent modern CSPRNG.

      Now for the PW manager. Because all eggs are in one basket, the password manager has to be well designed. For example, not just passwords have to be encrypted, but URLs, usernames, memos... anything that goes into a database entry. If URLs are not encrypted, sites that use URLs to authenticate can be compromised with ease, or sites that use URLs for auth tokens are vulnerable, not to mention the concern that the PW manager, assuming a cloud based backend is harvesting the URLs to sell. Architecture-wise, having a passphrase and a secondary AES key seems to be solid, like how 1Password does things, and how Codebook has a sync key. This stops any attempts at brute-forcing cold. Downside of cloud password managers is that you have to depend on their cloud backend.

      If one is just needing a PW manager for oneself, nothing wrong with KeePass. Copy a keyfile to all the endpoints, store the .kdbx database on a cloud provider (GDrive, Dropbox, whatever), set a decent passphrase, and go with that. An attacker who gets into the cloud provider can't brute force the database.

      If one needs to share passwords, then something with a good reputation. 1Password, BitWarden, and for the enterprise, Keeper.

      I have two practices. First, I use one PW manager for passwords. This is used with the browser as an extension/add-on. I use a second PW manager for 2FA codes, and this is used on my smartphone. This way, if the desktop is compromised, 2FA codes are out of reach, and vice versa.

      Another thing I do is, on a clean machine with an encrypted partition, is back up all the password manager data, export it as text, be it JSON, CSV, or whatnot. This way, if something happens, I can restore, or just migrate to another PW manager. The backups being in plain text need to be protected, so I have these stored on a LUKS volume on an encrypted USB flash drive [istorage-uk.com]. This way, if someone finds the USB drive and guesses codes, it will erase itself. However, if the hardware encryption is weak, LUKS is known and good, effectively providing "two-factor" authentication for encryption.

      The big thing is finding a known good PW manager.

      Bonus points if it can do PassKeys, so you can move a PassKey between machines.

    • by Bill, Shooter of Bul ( 629286 ) on Friday June 07, 2024 @10:51AM (#64530567) Journal
      Uhm. No. Every account is only as safe as:

      The complexity of the password used.
      The presence of a second factor for the login
      The security of the site the password is used.
      The security of your browser/ application used to access their system.
      The complexity of the password on the password manager.
      The presence and security of the second factor of the password manager
      The security design and implementation of the password manager.
    • by beelsebob ( 529313 ) on Friday June 07, 2024 @10:56AM (#64530579)

      The choice is to use a password manager, which in the case of Appleâ(TM)s verifies something I have, and (something I am or something I know); or to use a shit password that I can remember for each web page. It verifies this every time I try to access a password, not only at login.

      Alternatively I can use a shit password that I can remember for each web page.

      In both cases I can combine this with the web pageâ(TM)s 2 factor auth.

      It would be utter idiocy to *not* use a password manager to generate very good passwords, and/or pass keys.

    • by ceoyoyo ( 59147 ) on Friday June 07, 2024 @12:17PM (#64530855)

      The weak link is usually the unhashed password database of that website you're using. That remains true whether you stick your password in a password manager or a sticky note on your monitor. The password manager means you can give each one of those websites a different password.

  • by ZERO1ZERO ( 948669 ) on Friday June 07, 2024 @09:23AM (#64530267)
    I use keychain all the time. But its annoying when im on a windows pc and i dont have access to my passwords Can some solution be made here
  • by joh ( 27088 ) on Friday June 07, 2024 @09:33AM (#64530303)

    All the functionality is already there, they're just breaking it out into an app of its own.

    • by bill_mcgonigle ( 4333 ) * on Friday June 07, 2024 @10:23AM (#64530481) Homepage Journal

      Sounds like with Safari losing its artificial monopoly they want to have an option for users to not wander away with Chrome or Bitwarden, etc.

      It's weird that with 2FA and passkeys and FIDO on the rise that in 2024 they name it Passwords.

      That seems like a 2007 name.

      • by UnknowingFool ( 672806 ) on Friday June 07, 2024 @10:46AM (#64530539)
        What do you mean? Apple's password system Keychain [wikipedia.org], has existed as part of the OS since 1999. Safari leverages it. The main UI however has been using the Settings UI. This app appears to be a new interface for the subsystem.
      • by beelsebob ( 529313 ) on Friday June 07, 2024 @11:02AM (#64530603)

        This has nothing to do with Safari. Keychain has been a thing since before Safari existed, and has allowed 3rd party apps to prompt the user for passwords since way back then. I think itâ(TM)s even existed since before OS X!

        • by Anonymous Cward ( 10374574 ) on Friday June 07, 2024 @03:37PM (#64531399)
          The only difference is a minor UI change so that it can appear as an independent app instead of within Safari on macOS, or Settings in iOS/iPadOS. This is not an innovation, it is a small common sense step to make accessing TOTP tokens easier when apps and websites like PayPal bugger up their UI design in a manner which stops the usual biometrics-driven autofill prompt from working. If Apple do things right this time, it will also let folks export their passwords in bulk on iOS for once.
    • by cob666 ( 656740 ) on Friday June 07, 2024 @11:31AM (#64530701)

      All the functionality is already there, they're just breaking it out into an app of its own.

      Based on what I've read, yes, Apple will be using iCloud Keychain to store passwords. There is already a really nice app that also uses iCloud but not their Keychain called Minimalist:
      Minimalist Password Manger [minimalistpassword.com]

      Minimalist seems a bit more flexible that what Keychain currently offers so let's see how Apple actually bolts a front end onto their Keychain. Curious to see if this is another example of Apple providing the bare minimum requirements and expecting users to just adapt their usage to another crippled UI. If it's better than Minimalist, I might switch over but I've already paid for Minimalist so there's no huge incentive to migrate right off the bat.

    • by ceoyoyo ( 59147 ) on Friday June 07, 2024 @12:22PM (#64530871)

      They're addressing a pretty obvious oversight. Macs have a Keychain app so you can actually see your passwords, add notes, generate passwords, all the usual stuff. On iOS it's currently just a list of everything they shoved in Settings pretty clearly as an afterthought.

  • by aaarrrgggh ( 9205 ) on Friday June 07, 2024 @09:33AM (#64530307)

    With the iCloud lockout attacks that have been happening lately this seems like a bad idea. But then we are stuck with the reality that something is needed-- I manually entered a 21-character password for a critical account over 20 times a day to try to be more secure... but then you add risk for other types of attacks.

    The weakness of Apple's system is that with the phone and passcode a thief is golden. How do you really make it secure AND usable?!

  • It is just Mac/IOS app wrappers around the password storage that iCloud already has.

    As such, it's Apple-only.

    Other password storers can start worrying when Apple releases Android/Windows apps to access those passwords.

    That should not happen for a LONG time - Apple has a bad track record on cross-platform service apps (iTunes for Windows, anyone?), and I would be afraid of using something like that on really critical stuff like my passwords. I say this as an Apple user since 1993 (Quadra 605).

  • by Zak3056 ( 69287 ) on Friday June 07, 2024 @09:54AM (#64530397) Journal

    Paywall free link here. [archive.is]

  • by devlp0 ( 897273 ) on Friday June 07, 2024 @10:19AM (#64530475) Journal
    I'm very happy with Bitwarden thanks, and it's free!
  • Sounds promising. (Score:2, Interesting)

    by SvnLyrBrto ( 62138 ) on Friday June 07, 2024 @10:30AM (#64530501)

    I've been looking for a replacement for 1Password ever since they decided to stop being an honest company selling an honest product at an honest price and embraced the Zynga model of nickel-and-diming people to death with recurring payments. And then they doubled down on turning into a shit company making a shit product by aping Evernote and abandoning a very good native app in favor of a half-assed web app in an Electron wrapper. But, as awful and contemptible as both moves were; the alternatives have always been far too craptastic and/or stripped of features to fit my needs and preferences.

    It will probably take a few iterations, as with most things Apple these days. But it's hard for real software to *not* catch up and surpass Electron junk. So maybe in a few years 1Password will join the likes of Evernote and Fantastical in the rubbish bin of once-great-but-now-trash software history. And if Apple includes a "migrate from 1Password" functionality, it will be golden.

  • by Savage-Rabbit ( 308260 ) on Friday June 07, 2024 @10:48AM (#64530549)

    So Apple is replacing 'KeyChain Access.app' which is a front end to a system that already does all of this with a new one called 'Passwords.app' that will be the new front end to a system that already does all of this?? Big f****ng deal.

  • by gnasher719 ( 869701 ) on Friday June 07, 2024 @11:34AM (#64530711)
    Why would a password manager need AI? Because of all the bloody idiots who don't accept auto-generated passwords by default. They have stupid restrictions. "6 to 12 characters" or "8 to 15 characters" - Safari passwords have 20. "One uppercase, one lowercase, one digit, one special character" - Safari likes 18 letters, separated by two hyphens. That's about 128 bits entropy. But no, it must be 12 characters and one must be special.

    So a bit of AI would analyse the screen, read the rules of the website, and produce the most secure password with these rules.
  • by jaygull ( 10381371 ) on Friday June 07, 2024 @12:07PM (#64530819)
    will it work on windows? If not, I don't want to switch from 1password.
  • by eepok ( 545733 ) on Friday June 07, 2024 @12:38PM (#64530939) Homepage

    Security professionals and hobbyists will always put security above all. They'll run their own home servers, put them behind hardware firewalls and use a VPN to access that server to pull out a password they need. It's fun for them.

    Everyone else in the world prioritizes security like as written below and every business attempting to improve the digital security of the general public would do well to share their priorities or they'll simply be niche utilities for professionals and hobbyists:

    1. CONVENIENT - The service must be available on iOS, Android, Windows, and MacOS. It must be able to automatically learn, update, and enter logins/passwords automatically.
    2. SHAREABLE - Be it in business or families, many digital accounts are shared. It must be able to share logins/passwords within trusted set of accounts easily and securely.
    3. INTUITIVE - You shouldn't need training to use the basic login/password storage and entry feature.
    4. RELIABLE - When it comes to security, people don't care about the "newest". They want the most known product. They want stability. They need to know that the product isn't going to disappear in 2 years if the company don't reach unicorn status with investors.
    5. SECURE In Preparation and Reaction - Yes, this is the 5th most important thing because if it's too hard to live with, people will just not use it.

    And "secure" doesn't mean "impervious to all attacks forever" because whoever holds the largest market share will attract the most (and most sophisticated) hack attempts. Bitwarden's lack of known hacks is not impressive because it has 1% of marketshare as compared to LastPass's 25%, so it only make sense that LastPass is under constant attack and that eventually someone succeeds.

    Apple has MASSIVE potential here. They're trusted by people and businesses for financial transactions (Apple Wallet), they're definitely a stable company, and they make very intuitive UI. Where they have severe systemic issues is interoperability outside of their Apple software environment. They often refuse to facilitate it. If they are willing to make an Android app and plugins for all the major browsers, they might be able to unseat LastPass in short order.

  • by Lycestra ( 16353 ) on Sunday June 09, 2024 @06:51PM (#64536349)

    I mean, obviously itâ(TM)s in that realm of software takeover. Bundling means people might use it for convenience over quality. If they kill off plugins, Iâ(TM)m another step closer to Linux and keeping my current solution.

Pascal is not a high-level language. -- Steven Feiner

Working...