Your passwords are sacred, right? Well, think again. Password managers have long promised that your digital vaults are locked away, invisible even to them. But here's the shocking truth: that promise might not hold up. And this is the part most people miss: even the most trusted names in the game could leave your data vulnerable. But here's where it gets controversial: new research reveals that these so-called 'zero-knowledge' systems aren't as foolproof as they claim. Let's dive into why this matters and what it means for your security.
For over a decade, password managers have evolved from niche tools for tech enthusiasts to essential utilities for millions. With an estimated 94 million U.S. adults relying on them, these tools don't just store passwords—they safeguard financial accounts, cryptocurrency credentials, and more. The top players in the market—Bitwarden, Dashlane, and LastPass—all boast 'zero-knowledge' encryption, a term that sounds like an ironclad guarantee: no one, not even the companies themselves, can access your data. But is this promise too good to be true?
The Promise and the Reality
Bitwarden, Dashlane, and LastPass all make bold claims. Bitwarden says, 'Not even our team can read your data.' Dashlane assures users that without their master password, 'malicious actors can’t steal the information, even if our servers are compromised.' LastPass echoes this, stating that only you can access your vault. These assurances are particularly crucial after high-profile breaches like those at LastPass, which highlighted the risks of state-level hackers targeting high-value individuals.
But here's where it gets controversial: researchers from ETH Zurich and USI Lugano have uncovered vulnerabilities that challenge these claims. By reverse-engineering and analyzing these password managers, they found ways for attackers with server control to steal data—and in some cases, entire vaults. These attacks exploit weaknesses in account recovery features, group sharing, and legacy support, undermining the very foundation of 'zero-knowledge' encryption.
How the Attacks Work
One of the most severe attacks targets Bitwarden's key escrow mechanism during group enrollment. When a new member joins a group, the client encrypts a symmetric key with the group's public key and sends it to the server. The researchers discovered that this process lacks integrity checks, allowing an adversary to replace the group's public key with their own. Since the adversary knows the corresponding private key, they can decrypt the ciphertext and recover the user's account, gaining full access to their vault.
Another attack exploits Bitwarden's account recovery feature. When a user rotates their vault keys, the client syncs with the server to obtain a new public key. If the server provides a malicious public key, the adversary can decrypt the recovery ciphertext and obtain the user's symmetric key. This vulnerability persists even in newer versions of the software.
LastPass isn’t immune either. In its Teams and Teams 5 versions, a superadmin can reset a member’s master key. During this process, the client encrypts the new key with the superadmin’s RSA keypair and sends it to the server. Since LastPass doesn’t authenticate these keys, an adversary can replace the superadmin’s public key with their own, decrypting the ciphertext and gaining access to the vault.
Dashlane faces similar risks. When users share vault items, the client generates a new RSA keypair, which isn’t authenticated. An adversary can supply their own keypair, encrypt the ciphertext, and then decrypt it to recover the shared symmetric key, allowing them to read and modify shared items.
The Bigger Picture
These vulnerabilities aren’t just technical footnotes—they’re systemic issues. The researchers argue that while a full server compromise is a high bar, it’s not unrealistic, especially given the history of breaches at companies like LastPass. Moreover, the tendency for a false sense of security among developers can lead to oversight in client-server interactions.
Marketing Gimmick or Legitimate Security?
The term 'zero-knowledge' has become a marketing buzzword, often conflated with zero-knowledge proofs, a unrelated cryptographic concept. Matteo Scarlata, the lead researcher, calls it 'marketing hype,' noting that the term means different things to different companies. Unlike 'end-to-end encryption,' 'zero-knowledge encryption' is an elusive goal, making it impossible to verify if a company is truly delivering on its promise.
What Now?
In response to the research, Bitwarden, LastPass, and Dashlane have acknowledged the vulnerabilities and are working on fixes. They emphasize the high bar of the threat model and their commitment to security through audits and red-team exercises. However, the question remains: can users trust these assurances?
A Thought-Provoking Question
If 'zero-knowledge' encryption isn’t as secure as promised, should users reconsider their reliance on password managers? Or is the convenience worth the risk? Share your thoughts in the comments—let’s spark a debate on where security meets practicality.