搜尋 Mozilla 技術支援網站

防止技術支援詐騙。我們絕對不會要求您撥打電話或發送簡訊,或是提供個人資訊。請用「回報濫用」功能回報可疑的行為。

Learn More

Lockwise passwords encryption

more options

Mozilla is extremely vague with how passwords are protected, simply stating on their product page that passwords are encrypted while in transit and stored using encryption. Does Mozilla keep the encryption keys and can later access these passwords?? Why so vague?

Mozilla is extremely vague with how passwords are protected, simply stating on their product page that passwords are encrypted while in transit and stored using encryption. Does Mozilla keep the encryption keys and can later access these passwords?? Why so vague?

被選擇的解決方法

Firefox encrypts your data (saved logins and other data) before sending it to the Sync servers. Mozilla does not have a way to decrypt your Sync data.

How Firefox Sync keeps your data safe even if TLS fails

從原來的回覆中察看解決方案 👍 0

所有回覆 (4)

more options

nick.b said

Does Mozilla keep the encryption keys and can later access these passwords??

No, they can't.

more options

選擇的解決方法

Firefox encrypts your data (saved logins and other data) before sending it to the Sync servers. Mozilla does not have a way to decrypt your Sync data.

How Firefox Sync keeps your data safe even if TLS fails

more options

jscher2000 said

Firefox encrypts your data (saved logins and other data) before sending it to the Sync servers. Mozilla does not have a way to decrypt your Sync data. How Firefox Sync keeps your data safe even if TLS fails

Thanks for that, Unfortunately PBKDF2 with 1000 iterations is extremely weak! To make matters worse, Mozilla is aware of this (meaning they choose weak encryption). [|See here]

more options

nick.b said

jscher2000 said

Firefox encrypts your data (saved logins and other data) before sending it to the Sync servers. Mozilla does not have a way to decrypt your Sync data. How Firefox Sync keeps your data safe even if TLS fails

Thanks for that, Unfortunately PBKDF2 with 1000 iterations is extremely weak! To make matters worse, Mozilla is aware of this (meaning they choose weak encryption). [|See here]

So if I understand that bug, if someone is able to intercept your login to the Firefox Account server (i.e., man in the middle), they could obtain your password by brute force. And the reason it wasn't already strengthened against brute force attack may be concerns about unacceptable performance. I'm not sure what is considered the threshold for acceptable performance.