![]() ![]() ![]() If your computer is compromised in this way, then there is very little a program can do to protect its data. Please Note: memory attacks are generally not possible unless an attacker has (physical) access to your machine or a malicious application is running. The following is a succinct breakdown of our security across the three platforms. This is a very complex topic with a lot of nuance. Each of these operating systems have different methods of handling memory that must be taken into account. We have worked very hard to be consistent across Windows, Linux, and MacOS platforms in terms of user experience and security. However, unlike KeePass, KeePassXC is a cross-platform application written in C++ using the Qt framework. Aside from non-sensitive header data (such as initialization information for the encryption algorithms), your entire database (usernames, passwords, notes, etc) is encrypted using industry standard methods. Similar to KeePass, we protect all data “at rest” (that is, when it is saved in the password database file *.kdbx). Although KeePassXC was not mentioned, we have thoroughly reviewed the report and address some questions it raises below. Some of you may have seen the recent vulnerability report from ISE that details various memory attacks against 1Password and KeePass, among others. ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |