Hacker News new | past | comments | ask | show | jobs | submit login

sorry, quick correction. It was dashlane. https://blog.dashlane.com/virginia-tech-passwords-study/



Are you sure that the passwords that were the object of the study came from the password manager itself? The paper that is referenced says this in the introduction:

> In this paper, we seek to fill in the gaps by gathering and analyzing a large collection of leaked password datasets across multiple years and various online services


> Virginia Tech researchers led by Dr. Wang have collected a number of publicly available password datasets from the Internet in January 2017. The datasets were obtained from various online forums and data archives.

It looks like they just used already leaked passwords.


Absolutely, I can confirm we don't have access to anyone's password, except those that have leaked already.




Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: