Store passwords with unprecedented security.
Zero(formerly ID Guard Offline) Blog
Are open-source password managers more secure? (1)
Open source helps lower down software development costs dramatically and improve transparency.
It is critical to the software ecosystem. However, if users blindly believe in open source = security, the open-source marketing,
without understanding the PROs and CONs, it is only a false sense of security.
Design an app logo, minimum $500 reward!
To better show the 0 password and other various strong features, we now decided to rebrand our app. New name, Zero password manager. New logo? Waiting for you!
If you have any great ideas, time to show them up! At least $ 500 is waiting for you!
Stand against war, Stand with Ukrainians
ID Guard Offline PRO yearly subscription drops to the lowest price. And our team has donated $5000 to ICRC to help Ukrainians. Hope the Ukrainian people go back to peaceful life soon.
Trackers in password managers can threaten your passwords
Third-party trackers integrated into password managers can access master password, vault, and decrypted password. The Internet access permission required by trackers makes the attack surface even larger. Security vulnerabilities, bad guys in the company, or hackers can steal passwords.
How to verify extension design?
... what about password managers storing all our passwords? ID Guard Offline extension claims that it uses end-to-end encryption and can prevent employees, not to mention hackers, to access our passwords. Is that true?
We all know that encrypted ≠ secured. Military encryption is more of a advertising slogan to fool laymen layperson. It is the security design that keeps passwords safe.
Impact of iOS Vulnerabilities Disclosed by Google Recently
Yesterday, I saw lots of reports on "Google finds vulnerabilities affecting all iPhones...". Some users may worry about the impact on ID Guard Offline. *"Can those vulnerabilities be used to steal passwords stored in our app?"* So we did this quick analysis.
Advanced Phishing Detection
- identify FAKE apps.
- identify insecure websites served via HTTP.
- reveal hidden password field filling request.
The Evolution of Password Manager
| Generation | Unlock factors |
|---|---|
| first |
|
| second |
|
| third |
|
| fourth |
|