Bitcoin Forum
April 24, 2024, 09:52:34 AM *
News: Latest Bitcoin Core release: 27.0 [Torrent]
 
   Home   Help Search Login Register More  
Pages: [1] 2 3 »  All
  Print  
Author Topic: Storing my seed in Lastpass  (Read 3676 times)
NUFCrichard (OP)
Legendary
*
Offline Offline

Activity: 1218
Merit: 1003


View Profile
May 27, 2016, 12:12:14 PM
 #1

How do the Electrum pros here feel about storing the seed in Lastpass?

I haven't done it at the moment, but I do feel like storing bits of paper with seed codes on isn't a great long term strategy.
There are several different types of Bitcoin clients. The most secure are full nodes like Bitcoin Core, which will follow the rules of the network no matter what miners do. Even if every miner decided to create 1000 bitcoins per block, full nodes would stick to the rules and reject those blocks.
Advertised sites are not endorsed by the Bitcoin Forum. They may be unsafe, untrustworthy, or illegal in your jurisdiction.
1713952354
Hero Member
*
Offline Offline

Posts: 1713952354

View Profile Personal Message (Offline)

Ignore
1713952354
Reply with quote  #2

1713952354
Report to moderator
1713952354
Hero Member
*
Offline Offline

Posts: 1713952354

View Profile Personal Message (Offline)

Ignore
1713952354
Reply with quote  #2

1713952354
Report to moderator
1713952354
Hero Member
*
Offline Offline

Posts: 1713952354

View Profile Personal Message (Offline)

Ignore
1713952354
Reply with quote  #2

1713952354
Report to moderator
defined
Hero Member
*****
Offline Offline

Activity: 574
Merit: 500


View Profile
May 27, 2016, 12:15:18 PM
 #2

LastPass Password Manager is made to do this.
Do not forget to make backups and use a strong password.
NUFCrichard (OP)
Legendary
*
Offline Offline

Activity: 1218
Merit: 1003


View Profile
May 28, 2016, 08:23:10 AM
 #3

ok thanks, I don't like to keep all my eggs in one basket, so even though I trust lastpass, I wasn't sure about having my seed(s) on there.
I guess I will keep my hard copy stored away and investigate further if storing my seed in lastpass is 100% safe.
OmegaStarScream
Staff
Legendary
*
Offline Offline

Activity: 3458
Merit: 6099



View Profile
May 28, 2016, 11:40:56 AM
 #4

LastPass is an online password manager ,It's definitely not recommended to store your seed or anything related to your private keys there.
I'd suggest storing them on KeePass instead since it's an offline password manager and you have a portable database file .kdx which you can use it anywhere as long as you have your Master key.

PS : LastPass got hacked last year - https://www.coinprices.io/posts/a-guide-to-basic-password-security-the-danger-of-last-pass

█▀▀▀











█▄▄▄
▀▀▀▀▀▀▀▀▀▀▀
e
▄▄▄▄▄▄▄▄▄▄▄
█████████████
████████████▄███
██▐███████▄█████▀
█████████▄████▀
███▐████▄███▀
████▐██████▀
█████▀█████
███████████▄
████████████▄
██▄█████▀█████▄
▄█████████▀█████▀
███████████▀██▀
████▀█████████
▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀
c.h.
▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄
▀▀▀█











▄▄▄█
▄██████▄▄▄
█████████████▄▄
███████████████
███████████████
███████████████
███████████████
███░░█████████
███▌▐█████████
█████████████
███████████▀
██████████▀
████████▀
▀██▀▀
NUFCrichard (OP)
Legendary
*
Offline Offline

Activity: 1218
Merit: 1003


View Profile
May 30, 2016, 12:00:30 PM
 #5

LastPass is an online password manager ,It's definitely not recommended to store your seed or anything related to your private keys there.
I'd suggest storing them on KeePass instead since it's an offline password manager and you have a portable database file .kdx which you can use it anywhere as long as you have your Master key.

PS : LastPass got hacked last year - https://www.coinprices.io/posts/a-guide-to-basic-password-security-the-danger-of-last-pass
I had read that article, but it also seemed to be somewhat rubbished as advertising for KeePass.

KeePass had had it's problems too: https://thehackernews.com/2015/11/password-manager-hacked.html

I already have LastPass and love it, I just wasn't sure about using it for seeds
OmegaStarScream
Staff
Legendary
*
Offline Offline

Activity: 3458
Merit: 6099



View Profile
May 30, 2016, 12:15:24 PM
 #6

LastPass is an online password manager ,It's definitely not recommended to store your seed or anything related to your private keys there.
I'd suggest storing them on KeePass instead since it's an offline password manager and you have a portable database file .kdx which you can use it anywhere as long as you have your Master key.

PS : LastPass got hacked last year - https://www.coinprices.io/posts/a-guide-to-basic-password-security-the-danger-of-last-pass
I had read that article, but it also seemed to be somewhat rubbished as advertising for KeePass.

KeePass had had it's problems too: https://thehackernews.com/2015/11/password-manager-hacked.html

I already have LastPass and love it, I just wasn't sure about using it for seeds

I'm only giving you an advice here man so it's up to you but I have to mention few things :

that hack was in 2015 and there were other versions of it and they keep updating it so it's secure now. Someone won't simply target you with a KeePass stealer in the first place unless he knows you are using it . Unlike LastPass where he won't target you personally but will target the whole database and get a lot of users passwords and then It's just a matter of time till the information's gets used or sold in the Darknet .
As a bitcoin , I suppose you understand that using online wallets (Coinbase/Blockchain.info) is unsecure , yes ? If it's the case then it's the same case for LastPass .

█▀▀▀











█▄▄▄
▀▀▀▀▀▀▀▀▀▀▀
e
▄▄▄▄▄▄▄▄▄▄▄
█████████████
████████████▄███
██▐███████▄█████▀
█████████▄████▀
███▐████▄███▀
████▐██████▀
█████▀█████
███████████▄
████████████▄
██▄█████▀█████▄
▄█████████▀█████▀
███████████▀██▀
████▀█████████
▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀
c.h.
▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄
▀▀▀█











▄▄▄█
▄██████▄▄▄
█████████████▄▄
███████████████
███████████████
███████████████
███████████████
███░░█████████
███▌▐█████████
█████████████
███████████▀
██████████▀
████████▀
▀██▀▀
BitcoinSupremo
Copper Member
Hero Member
*****
Offline Offline

Activity: 1428
Merit: 529


View Profile
May 31, 2016, 08:32:28 PM
 #7

I saved my Seed in a Libreoffice 5 document in Linux, and put a strong password to that document, in addition to that, compressed it and put also a strong password to the rar file. Put that file in different USB plus in my laptop and desktop. Today I needed that file and restored my electrum wallet in my laptop without any problem at all. This is the best way to store your seed in my opinion.
BitcoinNewsMagazine
Legendary
*
Offline Offline

Activity: 1806
Merit: 1164



View Profile WWW
June 01, 2016, 01:09:58 AM
 #8

If you are serious about security of your bitcoin your seed should never be displayed or typed on an online computer. Use a hardware wallet instead and write your seed on paper, store securely. If you use a hardware wallet that permits encryption of the seed with a passphrase you keep in your head you have an additional layer of protection. Using a PIN and simple passphrase on a Trezor provides very good security. Since the seed is worthless without the passphrase you can leave the seed with friends. Just do not forget your passphrase!

NUFCrichard (OP)
Legendary
*
Offline Offline

Activity: 1218
Merit: 1003


View Profile
June 01, 2016, 07:09:54 AM
 #9

If you are serious about security of your bitcoin your seed should never be displayed or typed on an online computer. Use a hardware wallet instead and write your seed on paper, store securely. If you use a hardware wallet that permits encryption of the seed with a passphrase you keep in your head you have an additional layer of protection. Using a PIN and simple passphrase on a Trezor provides very good security. Since the seed is worthless without the passphrase you can leave the seed with friends. Just do not forget your passphrase!

I am serious about security, but as this thread is showing, it really isn't as easy as it seems!  I don't want to have to remember anything, if I leave my Bitcoin untouched for a while, I will forget any decent password/phrase.
I quite like BitcoinSupremos idea, but then where do you store the 2 strong passwords?  I guess the chances of someone getting into lastpass, taking each of those passwords, and having access to my saved .rar file, is pretty remote.

I have read some trezor threads about them crashing/malfunctioning, I think I would go for a paper wallet before a trezor.
BitcoinNewsMagazine
Legendary
*
Offline Offline

Activity: 1806
Merit: 1164



View Profile WWW
June 01, 2016, 02:47:02 PM
 #10

If you are serious about security of your bitcoin your seed should never be displayed or typed on an online computer. Use a hardware wallet instead and write your seed on paper, store securely. If you use a hardware wallet that permits encryption of the seed with a passphrase you keep in your head you have an additional layer of protection. Using a PIN and simple passphrase on a Trezor provides very good security. Since the seed is worthless without the passphrase you can leave the seed with friends. Just do not forget your passphrase!

I am serious about security, but as this thread is showing, it really isn't as easy as it seems!  I don't want to have to remember anything, if I leave my Bitcoin untouched for a while, I will forget any decent password/phrase.
I quite like BitcoinSupremos idea, but then where do you store the 2 strong passwords?  I guess the chances of someone getting into lastpass, taking each of those passwords, and having access to my saved .rar file, is pretty remote.

I have read some trezor threads about them crashing/malfunctioning, I think I would go for a paper wallet before a trezor.


When you use Trezor the seed in effect is your bitcoin; the plastic device is a tool. You can crush your Trezor and be back up again in less than half an hour by recovering the seed to a new Trezor. Many folks who use Trezor keep a spare around in case of loss. I have never had a problem with Trezor crashing or malfunctioning. Once in a while the myTrezor.com site is down is all. If that happens you just use your Trezor with local Electrum.

Freakin
Full Member
***
Offline Offline

Activity: 154
Merit: 100


View Profile
May 19, 2017, 04:13:27 AM
 #11

Bumping an old thread to add my $.02

Storing your seeds online is no good. 

I personally use lastpass for all my passwords.  The data are encrypted client side and never transmitted or stored unencrypted on Lastpass's servers.  They were hacked a year or two ago but the databases storing the encrypted passwords were not compromised.  I believe they only got user information.  Lastpass caught the hack themselves (either in progress or shortly afterward) by detecting an abnormal traffic pattern between some of their servers. 

So while I trust my encrypted passwords to lastpass, I don't trust the clients that decrypt those passwords (including my own computer) with my seed.  There are vulnerabilities in Lastpass clients that essentially trick the lastpass extension into filling hidden form fields on a website with all your passwords and posting them to their server behind the scenes.  This may be fixed already, but it doesn't mean another zero-day exploit won't be revealed in the client that can do the same.

Don't trust your seed to an online computer if you care about the BTC that the private keys can access.
jonald_fyookball
Legendary
*
Offline Offline

Activity: 1302
Merit: 1004


Core dev leaves me neg feedback #abuse #political


View Profile
May 19, 2017, 04:47:16 AM
 #12


First of all, if its a medium to large amount, keep it in cold storage.

but even small amount, I'm not sure I recommend lastpass... my understanding was data Is kept locally but not the best idea if your computer dies..just email yourself the seed or write it down (again for small amounts)


kolloh
Legendary
*
Offline Offline

Activity: 1736
Merit: 1023


View Profile
May 19, 2017, 02:28:59 PM
 #13


First of all, if its a medium to large amount, keep it in cold storage.

but even small amount, I'm not sure I recommend lastpass... my understanding was data Is kept locally but not the best idea if your computer dies..just email yourself the seed or write it down (again for small amounts)



If you value security, don't ever email yourself a seed. Email is extremely insecure and is in plaintext (unless encrypted with PGP or something). Storing in LastPass would be much more secure than email. That being said, it is probably a bit safer to store the seed offline in a secure place.
viking02
Hero Member
*****
Offline Offline

Activity: 770
Merit: 500


🌟 COMSA ICO: 10/02/17 🌟


View Profile
June 06, 2017, 06:16:46 AM
 #14

Isn't putting your electrum phrase on keepass fine though? 


Also i assume most people have a copy of keepass on dropbox right?  So would that still be fine?  The thing is if you have your electrum phrase on keepass and also on dropbox, then as long as you remember your keepass masterkey password and your dropbox password, then isn't that really all that is needed?  I mean if dropbox gets hacked... has it?  Well they still cannot open your keepass file without your master password right?


Thanks.


                               ,,,,╓╖µpp╖╖,,,,
                         ,╓g▄▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▄µ╖          ,╖
                     ,╓@▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓Ñ╖    ,@▓▌
                  ,á▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▀▀▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓µ╫▓▓▓▌
                ╓@▓▓▓▓▓▓▓▓▓█▓▀╜╙            '╙▀▀▓▓▓▓▓▓▓▓▓▓▓▓▓▓▌
              ╓▓▓▓▓▓▓▓▓█▓▀`                       ╙▀▓▓▓███████▌
             @▓▓▓▓▓▓▓█▀`            ,,,,,         ,g▓███████▀`
           ╓▓▓▓▓▓▓██▀         ,µ▄▓▓▓▓▓▓▓█▓▓▓▄@, ,@▓███████▀
          ]▓▓▓▓███▓`       ╓▄▓█▓▓▓▓▓▓▓▓▓▓▓█████████████▓╜
         ]▓▓▓▓█▓█╝       ╓▓█████▓▓▓▓▓▓▓▓▓████████████▀╜
         ▓▓▓▓███▌       ╙▓███████▓▒       "▀▓██████▀`
        ╫▓▓▓███▌          "▀████████▄        '▓██▀
        ▓█▓███▓▒            `▀████████▄,       `
       ]▓█████▌                ╙████████▓,
       ]▓█████▌                  ╙▓█▓█▓▓▓█▓╖
       ]▓█████▌                    ╙▀█▓▓▓▓▓▓▓╖
        ▓█████▓[            ,,       `▀▓▓▓▓▓▓▓▓▄
        ▓██████[            ╓@        ╙▓▓▓▓▓▓▓▓▓╖
        ╠██████▓          ╓▓▓▓▓m        ╙▓█▓▓▓▓▓█▓@
         ▓█████╜       ,g▓▓▓▓▓▓▓▓▓▄╖╖,,,╓╖▓▓██▓▓▓▓▓▓
         └▓█▓╜       ,@▓▓▓▓▓▓▓▓▓▓▓▓████████████▓▓█▀
          '"       ╓@▓▓▓▓▓▓▓▓▀▓▓▓▓█████████████▀╙        ,
                 ╓▓▓▓▓▓▓▓▓▓╜    ╙▀▀▀▀▓▓▓▀▀▀▀╜          ╓▓▓▓╖
               g▓█▓▓▓▓▓▓▓`                          ,g▓▓▓▓▓▓▓w
            ,g▓██████████▓▄,                    ,╓@▓▓█▓▓▓█▓██╜
            ▓████████████████▓▄▄p╖,,     ,,╓µ▄▄▓██████████▓╜
            ▓█████╜╙▀███████████████████████████████████▀`
            ▓██▓╜     "▀▀███████████████████████████▀╜`
            ▓▀`            ╙▀▀▀███████████████▀▀▀"
. COMSA
ICO: Oct 2 - Nov 6
█████
▄▄▄
███
███
▀▀▀
███
███
███
▀▀▀
███
███
███
█████
█████
▄▄▄▄▄
█████
█████
▀▀▀▀▀
█████
█████
█████
▀▀▀▀▀
█████
█████
█████
█████
kolloh
Legendary
*
Offline Offline

Activity: 1736
Merit: 1023


View Profile
June 06, 2017, 05:53:59 PM
 #15

Isn't putting your electrum phrase on keepass fine though? 


Also i assume most people have a copy of keepass on dropbox right?  So would that still be fine?  The thing is if you have your electrum phrase on keepass and also on dropbox, then as long as you remember your keepass masterkey password and your dropbox password, then isn't that really all that is needed?  I mean if dropbox gets hacked... has it?  Well they still cannot open your keepass file without your master password right?


Thanks.

Yeah, I would think that should be fine as long as you are using a secure enough master password for KeePass that isn't easily brute forceable. Also, you must be sure that you never reuse your KeePass master password for any other websites which could end up leaking it in a compromise down the road.
CardShare
Member
**
Offline Offline

Activity: 98
Merit: 10


View Profile WWW
June 06, 2017, 05:55:25 PM
 #16

USB stick - Truecrypt volume pop it in there encrypt it.  best place to keep them. and there encrypted so double protection. just make a couple of backups for emergency use.

https://Investex.Pro  - Green Mining Operations & Mining Store...
BitcoinNewsMagazine
Legendary
*
Offline Offline

Activity: 1806
Merit: 1164



View Profile WWW
June 06, 2017, 06:39:21 PM
 #17

USB stick - Truecrypt volume pop it in there encrypt it.  best place to keep them. and there encrypted so double protection. just make a couple of backups for emergency use.

Using a TrueCrypt container can give you a false sense of security. First, when you typed your seed or password in a document you later saved in the container, you briefly exposed the seed or password to logging malware. Worse, any time you open a TrueCrypt container your password and work is saved in virtual memory paging files which are not erased on shut down. You need to take steps to tell your machine to delete the paging files or (better) only run TrueCrypt from a computer with whole disk encryption.

CardShare
Member
**
Offline Offline

Activity: 98
Merit: 10


View Profile WWW
June 06, 2017, 06:42:57 PM
 #18

USB stick - Truecrypt volume pop it in there encrypt it.  best place to keep them. and there encrypted so double protection. just make a couple of backups for emergency use.

Using a TrueCrypt container can give you a false sense of security. First, when you typed your seed or password in a document you later saved in the container, you briefly exposed the seed or password to logging malware. Worse, any time you open a TrueCrypt container your password and work is saved in virtual memory paging files which are not erased on shut down. You need to take steps to tell your machine to delete the paging files or (better) only run TrueCrypt from a computer with whole disk encryption.

True. Or just use air-gapped system when decrypting like you say on a machine with FDE add's 2nd layer of protection.


https://Investex.Pro  - Green Mining Operations & Mining Store...
kolloh
Legendary
*
Offline Offline

Activity: 1736
Merit: 1023


View Profile
June 06, 2017, 08:19:26 PM
 #19

USB stick - Truecrypt volume pop it in there encrypt it.  best place to keep them. and there encrypted so double protection. just make a couple of backups for emergency use.

Using a TrueCrypt container can give you a false sense of security. First, when you typed your seed or password in a document you later saved in the container, you briefly exposed the seed or password to logging malware. Worse, any time you open a TrueCrypt container your password and work is saved in virtual memory paging files which are not erased on shut down. You need to take steps to tell your machine to delete the paging files or (better) only run TrueCrypt from a computer with whole disk encryption.

Interesting, I hadn't heard about the password being stored in paging files. Is it possible to actually extract a truecrypt volume password from a paging file even if the container is not currently mounted? Any links to documentation or proof of concepts on this?
BitcoinNewsMagazine
Legendary
*
Offline Offline

Activity: 1806
Merit: 1164



View Profile WWW
June 06, 2017, 09:17:54 PM
 #20

USB stick - Truecrypt volume pop it in there encrypt it.  best place to keep them. and there encrypted so double protection. just make a couple of backups for emergency use.

Using a TrueCrypt container can give you a false sense of security. First, when you typed your seed or password in a document you later saved in the container, you briefly exposed the seed or password to logging malware. Worse, any time you open a TrueCrypt container your password and work is saved in virtual memory paging files which are not erased on shut down. You need to take steps to tell your machine to delete the paging files or (better) only run TrueCrypt from a computer with whole disk encryption.

Interesting, I hadn't heard about the password being stored in paging files. Is it possible to actually extract a truecrypt volume password from a paging file even if the container is not currently mounted? Any links to documentation or proof of concepts on this?

Take a look at the TrueCrypt user manual. Windows leaks a lot.

Pages: [1] 2 3 »  All
  Print  
 
Jump to:  

Powered by MySQL Powered by PHP Powered by SMF 1.1.19 | SMF © 2006-2009, Simple Machines Valid XHTML 1.0! Valid CSS!