Over the past 15 years, password managers have grown from a niche security tool used by the technology savvy into an indispensable security tool for the masses, with an estimated 94 million US adultsāor roughly 36 percent of themāhaving adopted them. They store not only passwords for pension, financial, and email accounts, but also cryptocurrency credentials, payment card numbers, and other sensitive data.
All eight of the top password managers have adopted the term āzero knowledgeā to describe the complex encryption system they use to protect the data vaults that users store on their servers. The definitions vary slightly from vendor to vendor, but they generally boil down to one bold assurance: that there is no way for malicious insiders or hackers who manage to compromise the cloud infrastructure to steal vaults or data stored in them. These promises make sense, given previous breaches of LastPass and the reasonable expectation that state-level hackers have both the motive and capability to obtain password vaults belonging to high-value targets.
A bold assurance debunked
Typical of these claims are those made by Bitwarden, Dashlane, and LastPass, which together are used by roughly 60 million people. Bitwarden, for example, says that ānot even the team at Bitwarden can read your data (even if we wanted to).ā Dashlane, meanwhile, says that without a userās master password, āmalicious actors canāt steal the information, even if Dashlaneās servers are compromised.ā LastPass says that no one can access the ādata stored in your LastPass vault, except you (not even LastPass).ā
