How does LastPass securely identify a trusted computer?
When you check the option to mark a device as "trusted", we create a random, unique identifier for that device. We then encrypt that ID using Windows "crypt protect data" functions, which encrypt the ID based on the user's credentials. This ensures that another user would not be able to decrypt it. We then store the encrypted ID on the hard drive, and store a hash of the ID on our server in a database. This is passed back after the user tried to login - the hash is compared with the hash of the ID after it has been decrypted (after the user enters their email address + master password). If they match, LastPass then skips the prompt for a multifactor authentication and logs in the user.
For mobile devices, LastPass uses a randomly generated id that is stored in secure phone storage.
So, which of the lengthy list of two part authentication methods do people recommend?I have little experience but would like something that won’t hit me up for every login, only if something changes (unfamiliar device, remote IP).I don’t have cell service at home, so having to use the phone to authenticate every time is going to be an issue. Unless that authentication also works over wifi under iOS?AEHOn Jun 16, 2015, at 8:12 AM, Geoffrey Duke <[log in to unmask]> wrote:Analysis from Ars Technica:Hack of cloud-based LastPass exposes hashed master passwordsUsers: Change your master password and enable 2-factor authentication immediately.... Ars resident password expert Jeremi Gosney said the real-world risks the breach posed to end users was minimal. He based his assessment on the LastPass response to the breach and the system that was in place when it happened.Full article: http://arstechnica.com/security/2015/06/hack-of-cloud-based-lastpass-exposes-encrypted-master-passwords/--Geoff-----Original Message-----From: Technology Discussion at UVM [mailto:[log in to unmask]] OnBehalf Of Jacob BeauregardSent: Monday, June 15, 2015 7:07 PMSubject: LastPass was breached"We want to notify our community that on Friday, our team discovered andblocked suspicious activity on our network. In our investigation, wehave found no evidence that encrypted user vault data was taken, northat LastPass user accounts were accessed. The investigation has shown,however, that LastPass account email addresses, password reminders,server per user salts, and authentication hashes were compromised."Andrew HendricksonCAS IT AdministratorUVM, College of Arts & Sciences802-656-7971To submit a request for service please use: