How do 1password prevent leakage from device

k7cl
k7cl
Community Member
edited July 2023 in Business and Teams

I have read the whitepaper of 1password and I think the most possible and easiest way to steal a creadention is from a client device.
I also see a chapter in the whitepaper called Malicious processes on your devices. But I still have some question about this.

According to the paper we know the secret key will local stored and the credential db will be cached locally too. The password will be the only things to protect the db.
But the paper also said Depending on client and client platform the Secret Key may be stored on the device using some of the protections offered by the operating system and may be lightly obfuscated.

For the Secret Key,
1, Could you tell me the store mothoud use on windows and android and chrome extension?
2, Will the TPM on windows and Keystore on android help this?
3, Do we have some hardware based solution to prevent software and memory attack now?

For the password, windows and android both offered unlock by biometric authentication now,
1, What is the cryptography design for 1password can be unlock by password or bio-auth?
2, Is password also stored in local when enable bio-auth?
3, Will we support fido or piv protocol for unlock 1password in future? I think hardware security module is an enhanced way to protect local key.


1Password Version: Not Provided
Extension Version: Not Provided
OS Version: Not Provided
Browser: Not Provided

Comments

  • Hi there @k7cl

    I can see you've also sent us an email, so I'll close this thread here and let the team reply to your email directly to avoid duplicate answers. :)

This discussion has been closed.