LOOOONG time 1Password user so this question goes back a ways, but I'm asking this question based on the speed in which password cracking machines can guess my master password if my 1Password data fell into the wrong hands. My understanding is that the cloudkeychain format is a "slower" hash compared to the agilekeychain format. It's been a while, but IIRC everything was moving towards the cloudkeychain format but there was a limitation when using Dropbox as the sync method.
So, basically I have the following questions:
1. What keychain format am I using? (How do I check)? (if my 1password file has extension of agilekeychain, I'm assuming that's what it's using?)
2. What should I be using from a security perspective in respect to password crackers (i.e. hashcat) knowing that the agilekeychain format is a "faster" hash than cloudkeychain format? agilekeychain master passwords can be guess approx 320 times faster. On current GPU systems, this means that a hash cat machine can guess 3.2 million passwords per second against agilekeychain and only approx 10.5 thousand against cloudkeychain format.
3. Has that limitation when using Dropbox been resolved?
Some data -
Speed at which agile keychains can be guessed vs cloud keychains:
1Password Link discussing cloudkeychain format vs agilekeychain and hash cat:
1Password Version: Not Provided
Extension Version: Not Provided
OS Version: Not Provided
Sync Type: Not Provided