6 Matching Annotations
  1. Apr 2025
    1. Finally, a Master Password Hash is generated using PBKDF-SHA256 with a payload of the Master Key and with a salt of the master password. The Master Password Hash is sent to the Bitwarden server upon account creation and login, and used to authenticate the user account.

      Bitwarden claim:

      Never transmitted over the internet to Bitwarden servers.

      This claim is misleading because it implies that master passwords in any form are never transmitted over the Internet to a server, despite the fact that Master Password Hash is basically just master passwords in another form.

      Unless Bitwarden implements zero-knowledge password proof, which isn't mentioned in their white paper.

  2. Mar 2021
  3. Apr 2020
  4. Apr 2019
    1. Oops, I think that one might even be exploitable… I think I’m going to stop here. This needs a structured effort, not spending ten minutes every now and then. As I said, the codebase isn’t bad. But there are obvious issues that shouldn’t have been there. As always, spotting the issues is the easy part – proving that they are exploitable is far harder. I’m not going to spend time on that right now, so let’s just file these under “minor quality issues” rather than “security problems.”