This is my first post to the forums and I'm interested in getting others thoughts on this recently released work by ETH Zurich on the security of online password managers:
https://ethz.ch/en/news-and-events/...less-secure-than-promised.html#comment-system
I've seen a couple of additional articles about this in Arstechnica as well as HackerNews:
https://thehackernews.com/2026/02/study-uncovers-25-password-recovery.html
https://arstechnica.com/security/20...ts-isnt-always-true/?comments-page=1#comments
The paper itself is available here: https://eprint.iacr.org/2026/058
It's interesting - I haven't read the full paper yet (that's this weekend's task), but I have started to look through BitWarden's response. Bottom line - the case they use is where a malicious attacker has control of the backend server. To me, this is one of those sort of cases of "if an attacker has control of your server, it's no longer *your* server" - but with a bit of a twist. The responses I've been seeing in my LinkedIn news feeds from other security industry players centers mostly on "that's why I don't use online password managers" and Arstechnica's comments usually just say something along the lines of "I use KeePass only and Syncthing to sync it up if I need it elsewhere."
Obviously it all comes down to two things: your use cases and the level of risk you're willing to accept. I personally use BitWarden but combine it with MFA on every possible website that provides it. It's all about layered security. But I find it so odd that a lot of security industry folks I know seem to look down at these things and deride them on an instinctual basis rather than what should be a more rational approach.
Am I missing something?
https://ethz.ch/en/news-and-events/...less-secure-than-promised.html#comment-system
I've seen a couple of additional articles about this in Arstechnica as well as HackerNews:
https://thehackernews.com/2026/02/study-uncovers-25-password-recovery.html
https://arstechnica.com/security/20...ts-isnt-always-true/?comments-page=1#comments
The paper itself is available here: https://eprint.iacr.org/2026/058
It's interesting - I haven't read the full paper yet (that's this weekend's task), but I have started to look through BitWarden's response. Bottom line - the case they use is where a malicious attacker has control of the backend server. To me, this is one of those sort of cases of "if an attacker has control of your server, it's no longer *your* server" - but with a bit of a twist. The responses I've been seeing in my LinkedIn news feeds from other security industry players centers mostly on "that's why I don't use online password managers" and Arstechnica's comments usually just say something along the lines of "I use KeePass only and Syncthing to sync it up if I need it elsewhere."
Obviously it all comes down to two things: your use cases and the level of risk you're willing to accept. I personally use BitWarden but combine it with MFA on every possible website that provides it. It's all about layered security. But I find it so odd that a lot of security industry folks I know seem to look down at these things and deride them on an instinctual basis rather than what should be a more rational approach.
Am I missing something?
