Files
Lee Hanken 7c8efd2228 Initial commit: HPR Knowledge Base MCP Server
- MCP server with stdio transport for local use
- Search episodes, transcripts, hosts, and series
- 4,511 episodes with metadata and transcripts
- Data loader with in-memory JSON storage

🤖 Generated with [Claude Code](https://claude.com/claude-code)

Co-Authored-By: Claude <noreply@anthropic.com>
2025-10-26 10:54:13 +00:00

203 lines
12 KiB
Plaintext

Episode: 4069
Title: HPR4069: Passwords and Bitwarden news.
Source: https://hub.hackerpublicradio.org/ccdn.php?filename=/eps/hpr4069/hpr4069.mp3
Transcribed: 2025-10-25 19:15:00
---
This is Hacker Public Radio episode 4,069 for Thursday the 7th of March 2024.
Today's show is entitled, Passwords and Bitwarden News.
It is part of the series' privacy and security.
It is hosted by some guy on the internet and is about 12 minutes long.
It carries a clean flag.
The summary is, Scotty talks about passwords and Bitwarden.
Hello everyone, Scotty here.
This is not the all-no news, but I wanted to cover a couple of news stories really quickly
because I'm bored and I'm out here at the public library.
So first up, let's take a look at Bitwarden.
Right now they've got a new auto-fill option that they're building into where browse it.
The web browser extension and the auto-fill option works inside the fields now.
So when you click on the field to enter your credentials and you have your Bitwarden password
manager logged in through the web extension, your web browser extension.
As you click on the credential fields, it will then show you the credentials you have
for that site right inside the field.
I guess that's a more secure way of doing an auto-fill.
As some of you would remember, we covered a story not too long ago.
One of the all-no news episodes of Bitwarden was targeted in that article, but this was
an issue with all password managers and using auto-fill.
So I guess Bitwarden has really focused on this and done some extensive testing.
They said that I got to scratch my ear here, these headphones are itchy.
Sorry.
They've done extensive third-party penetration testing for this feature, which is great.
They put out some new documentation.
And overall, it just looks nice.
I mean, if you use a lot of browser extensions and you use Bitwarden, take a look at it.
If you like it, do a show, talk about it, or don't because it's dealing with credentials,
but at least this is a heads up on new features for one of our beloved open-source password
managers, so kudos to Bitwarden for that.
When I run a subject of password managers, let's talk about past keys just for a little
while, and I also want to bring up a show that was done not too long ago on password policies.
A lot of the momentum behind past keys kind of went away, like I remember when it was
heavy in the news cycle, it was talked about a lot.
It's not a new technology, but Google made a lot of headlines, and everyone was excited
for a little while at least.
My question to you guys, the audience, how many of you are actually making use of past
keys?
And what do you think about it?
What's been your experience?
Is it difficult to adopt, or are there lots of sites, or maybe your workplace, like
is your workplace making use of it?
Is there anywhere in particular you'd like to see it adopted if it does work pretty well?
You know, give us your feedback on it.
I hadn't touched it.
I've been just sticking with what I know so far.
I haven't had a whole lot of time to tinker around, but maybe I will.
Who knows?
Alright, while I got a little bit of time left, I want to talk to you guys about a show.
It was HPR 40, 70, excuse me, HPR 40, 47, change your passwords once in a while.
It was hosted by Delta Ray.
First of all, I want to say thank you for the show Delta Ray, great show.
I love anything security, and I like hearing what other people do with their security, you
know, how they, how they practice it.
And I just want to talk a little bit about my own practices with passwords and password
rotations.
I remember a while back, it was a big thing that they were convincing everyone to rotate
your passwords, and a lot of companies were actually making it mandatory.
So on certain sites, you would go on to there would be a prompt if you had not rotated
your password in a while, they would force you to do it, right?
You try to log in and authenticate, and you could not until you reset your password.
Well, they sent stop doing that because people were well complaining and mistakes were made.
They were just basically reusing the same password and basically what do you call that, that
term that they do with passwords like salting it or salting, salting, hashing it or whatever.
That kind of thing just to reuse the password personally, and in my own internal policy,
how I manage my passwords, I have levels for my passwords.
There's a level for, let's say, the lighter things like social media and maybe some random
form like Reddit, whether it's not any payment information or personal information that
ties back to me like a home address or anything like that.
And then there's another level where there may be some sensitive information, but no payment
information, that kind of thing.
And then there's a level that is more secure where you can include things like banks
and things of that nature, right?
So let's just call that high level all the way down to low level.
They actually have different names, but I'm not going to give you those names.
So the low level stuff, I don't think I ever changed those passwords unless I actually
hear, like I have a Facebook account and that one is actually a medium level security
for me just because I have a lot of family that, you know, they recognize that is an account
that I use and they may want to talk to me on there, even though I log on like once
a year.
But the thing I would hate to have happen is for that account to become compromised.
And then my family members are then made vulnerable due to a compromised account.
So that one's a medium security.
And when Facebook had that big, what was that about two years?
Well, maybe more than two years ago, a few years ago, they had a leak.
I went ahead and rotated the credentials for that account.
And from most of the low level stuff, I don't rotate hardly ever unless, you know, again,
I hear about a breach, somebody brings it up and, or I read about it, then I'll go ahead
and just rotate those accounts.
Now from my high level accounts, things that tied direct like say, for instance, email,
email is a high level one because email is also used for two factor authentication.
I rotate high level accounts often.
How often depends on how paranoid I'm feeling at the time?
Like I don't actually have a set time, like say, for instance, every six months, every
nine months, anything like that.
What I do is I basically just, you know, if I hear about a big thing happening or I just
feel like something's wrong, right?
Maybe I tried to log in and it just got weird.
Like maybe they did something on the back end because they had a vulnerability or they
may have had a breach of some sort, but they haven't revealed it yet.
So they're working on the back end and it's causing little, little issues on my end when
I try to log in, you know, I'm noticing these weird things.
Like I thought I deleted that information months ago.
And suddenly here it is again, almost like somebody just restored from a backup because
of malware or something, right, ransomware.
So would I get a feeling like something has happened?
My paranoia just tells me this is a high level account.
Don't fool around.
Go ahead, change the credentials.
I got you.
The keys attached to most of those kind of things anyways and, you know, to F A to everything
that'll accept it.
Might as well go ahead and rotate the credentials because, you know, the old credentials
are randomly generated and they're probably floating around out on the site somewhere.
I don't reuse passwords because, you know, obviously that's bad practice.
You don't want to do that.
And that's just one of the things that go through as far as rotating passwords.
Not every single one of them needs to be rotated in my own practice.
But the high level ones, the moment my paranoia just tells me it's time, then there you go.
That's what we do.
Now because I have multiple password managers, I have to actually set the time aside to do
that kind of thing because I have to change them in each of the managers.
And it's becoming weirder with me as well because some of the things, and if you can hear
that noise in the background, that's my power inverter.
I'm sitting in my car recording and I'm charging my phone and laptop and everything while
I'm recording.
So I apologize if you can hear that little buzz from the power inverter in my car.
Okay.
So the power inverter had me a little distracted just now.
I'm adding in a third password manager now just to kind of test it out because I want
something that I can do from the command line.
So I'm looking at pass.
And you know, it's just P.A.S.S. if you use Linux, you've probably seen it.
Very simple.
It uses GPG.
I haven't done a lot with GPG.
I've been playing around with like symmetrical ciphers and things to encrypt packages and
send them around.
And you know, just that kind of stuff, but I haven't done anything as far as email or whatever.
One of the things that I'm running into is when I have to send sensitive information to
other people, people are just, you know, can you just email it?
That's the reply they'll have.
And I'm like, no, I'm not going to just email it.
What are you crazy?
Well, we don't have any other way to receive it.
Like it, like, are you serious?
You have no other way.
And because they're not using encrypted email, even if they were, it's probably encrypted
internally.
So like if I try to send something to them, they're not going to, it's not going to work.
Let's just put it that way.
So in order for me to deliver the package to them safely with my security somewhat upheld,
I have to encrypt the package locally.
So I archive the package usually with a zip because if it's on windows, they don't,
they're, I think windows recently added support for tar.
That's my car.
I had to push the button again so my car doesn't turn off.
I'm also sitting in the car.
I got my little GLI net router over here at the public library.
I'm already getting super distracted.
Anyway, I have to encrypt the package locally is normally a zip archive, I archive the package
encrypted locally, send it to them.
And then over the phone, I tell them what the key is to unlock it.
And I use a decent key, right?
I use a past phrase for the key for the file.
So that way they can hopefully get into it fairly easily, you know, so far that has worked.
I really don't like doing it this way, but this is just what I have at the moment.
I really got to get another public next cloud setup.
It's just that I don't have time to really manage it and go through the logs and everything
to make sure that I'm not being owned.
So I don't feel safe just leaving something like that up.
It's just, I'm on the road a little too much and it's too hard for me to do anything
at the moment.
The third password manager, I want it to be used mostly for these type of files whenever
I need to, you know, encrypt the package and then send that package.
Usually through email and insecure transmission, at least the package itself will be secure
enough.
I still want to manage those credentials and hold on to them for some time.
Those will not be rotated obviously because it's just the file, but I like to at least,
you know, keep track of it.
So that's just a little bit about my own password security at the moment.
Enough about that.
Thank you for the show, Delterate, fantastic show.
I appreciate it.
I know I ran all crap and it's starting to rain.
All right, got to go, got to go catch you guys in the next episode.
You have been listening to Hacker Public Radio.
That Hacker Public Radio does work.
Today's show was contributed by a HBR listener like yourself.
If you ever thought of recording podcasts, click on our contribute link to find out how
easy it really is.
Hosting for HBR has been kindly provided by an honesthost.com, the Internet Archive
and our sings.net.
On the Sadois status, today's show is released under Creative Commons, Attribution, 4.0,
International License.