This week, LastPass, and its parent company GoTo, both published blog posts about their recent data breach: http://tcrn.ch/3ucMvBx

But if you search for GoTo's blog post in Google, you won't find it, because GoTo hid its breach notice from search engines using "noindex" code.

TechCrunch is part of the Yahoo family of brands

@zackwhittaker

That needs to be archived somewhere before they decide to change it πŸ˜•

@simonzerafa @zackwhittaker Internet Archive/Wayback Machine are way ahead of you. LOL!

@simonzerafa @zackwhittaker At least I got a wget on the basic things of the page:

http://0x0.st/okSG.html

Our Response to a Recent Security Incident- GoTo

GoTo.com Blog
@simonzerafa @zackwhittaker Tried again. Still got pathetic results.

@simonzerafa @zackwhittaker Archive.is got my back too (It did take long tho).

https://archive.is/NXIL5

archive.ph

@zackwhittaker That's just pathetic. As if this story would blow up in like any tech news source and therefore find it's way into search engines anyways. πŸ€·β€β™‚οΈ
@winni @zackwhittaker It’s also weird. The more detailed description on the LastPass blog is indexable. So it’s really unclear what their idea was taking this article out of the search engines.
@zackwhittaker I recommend #Bitwarden. Free. Open source. Zero breaches.
@baruch @zackwhittaker I’ve read on here that a lot of people say that β€œzero breaches” just means zero publicized breaches. What would you say to that with respect to bitwarden?
@alexthepres @baruch @zackwhittaker

That is true but at the same time, the great thing about #Bitwarden and the clean-room implementation of the #Bitwarden #API, #Vaultwarden are both open sourced and allows you to self-host. You don't have to trust #Bitwarden & #Microsoft #Azure for securing your data.

With the self-hosted solution, you can take control of your data and still be able to get all the convenience the platform provides including all the apps (mobile/desktop) and browser extensions.
@baruch @zackwhittaker or 1password …. not free - worth every penny 😊
@zackwhittaker I am more on the side of β€œLastpass did good, because they were transparent”. Well, that changes things a little.
@iougiri @zackwhittaker LastPass has been very transparent. Their business partner has not been. Maybe they should reevaluate the partnership. But other than that, this really isn't on LastPass at all, is it?
@aikensource @zackwhittaker Yes, I think it is more on GoTo, but aren’t they still the owners of LastPass, not just business partners?
@iougiri @zackwhittaker dang it... I did not realize that logmein rebranded as goto. UGH.
GoTo announced a year ago that they plan/ned to spin off LastPass again to it's own company but it's unclear for me if that actually occurred or not.
@aikensource @zackwhittaker Yes, it’s not entirely clear if anything happened in the last year regarding the spin-off. But GoTo still sees the need to do a press release regarding the breach. If they had had sold them, the only thing we would have heard from them right now would be a sigh of relief. Or opening of champagne bottles.
@iougiri @zackwhittaker clearly they're operating under different management, that's for sure. This does make me feel squirmy though.
@varpness @aikensource @zackwhittaker When LogMeIn was aquired by private equity firms a couple of years ago I switched to 1Password, but I think you cannot go wrong with BitWarden either, which I have since set up for family members.
.@zackwhittaker it's infuriating to know that LastPass unequivocally stated in September that no customer data was taken in the August breach, but admitted in the news for the latest incident that, yes, stuff WAS indeed taken in August.
@zackwhittaker That's ugly. Here in Spain one of the largest electric companies used the same technique a few days ago to hide the landing pages for the plans that have the electricity prices set by the Government. Yeah, those plans offer the best value for consumers and the worst margins for electricity providers.
@zackwhittaker wow that's totally chill and not wierd at all
@zackwhittaker hey what a great tactic for a security company to use, right? fantastic. so excellent. lets all keep putting our passwords in the cloud! it'll be fiiiiiiine
@Viss @zackwhittaker Definitely looks bad on their part.
But it's also worth reminding folks that LastPass (and any other site worth their beans) use double encryption. Once the passwords are entered, they are encrypted in the database. Internal developers, or hackers cannot see them, even with full database access.
@zackwhittaker
Alt text:
Screen shot of html code with the following segment highlighted:
<link href="https://www.goto.com/blog/our-response-to-a-recent-security-incident" rel="canonical" />
<meta name="robots" content="noindex, nofollow'">
Our Response to a Recent Security Incident- GoTo

GoTo.com Blog
@zackwhittaker Image description: HTML code from a <head> section. Highlighted is a <link> element pointing to the blog post in question with rel="canonical" and a <meta> element, name="robots" content="noindex, nofollow".
@zackwhittaker What does this mean on a practical level? They seem to be saying that encrypted password vaults weren't leaked. Should we still consider changing passwords?
@zackwhittaker This is cynicism at it's highest art.
@zackwhittaker they also have "interesting" URLs for the webfonts right below that :D
@zackwhittaker any idea what is this *CDN* placeholder pattern for prefetch links?
@zackwhittaker why’s Canonical mentioned? Ubuntu?
@keplerniko Perhaps the adjective β€œcanonical” rather than Canonical Ltd
@kirkman yep I think you're right, was not familiar with that bit of HTML code
@keplerniko @zackwhittaker πš›πšŽπš•=β€˜πšŒπšŠπš—πš˜πš—πš’πšŒπšŠπš•β€™ is a way to indicate that the page that’s being linked to is the only one that should be shown if a search engine finds multiple pages with the exact same data for whatever reason.
@zackwhittaker is this what Dijkstra meant by "goto considered harmful" ?
@zackwhittaker I have an account there which I'm not using, why wasn't I contacted about this?
@zackwhittaker what is the point of writing a blog post if nobody can find? Perhaps it was sent in an email notification. Seems a bit silly to me.
@zackwhittaker that's despicable. I'm glad I don't use them.
@zackwhittaker Kinda hard to control the messaging around an incident when you deliberately take yourself out of the conversation. πŸ€¦β€β™‚οΈ
@zackwhittaker That seems quite a bit dishonest. I'll just keep #selfhosting my own bitwarden instance and keep away from LastPass.
@zackwhittaker I switched from LastPass to a self hosted Bitwarden, but never deleted my LastPass account, due to having an active subscription. This pushed me to delete my account permanently.

@zackwhittaker Hanlon's razor says this is probably just a mistake by some random developer or manager.

You can't really expect to hide something like this after sending out millions of emails.

https://en.m.wikipedia.org/wiki/Hanlon%27s_razor

Hanlon's razor - Wikipedia

@zackwhittaker I guess the elephant in the room (not sorry) is asking:

Lastpass:
1) Do you honestly believe that attempting to hide and conceal your ineptitude at security, serves the greater public good, or your bottom line, the most?

2) Do you honestly believe it is ethical to try and conceal your ineptitude from the public? Who gains from this stance, you or the public?

My belief is the answer to both those questions, from the available evidence at hand, is that you don't care one iota for the customer, but only about yourself.

The public urgently awaits your response, because what we can see right now, smells like a bucket of prawns left in the hot sun for a week. And it's not pretty.

@zackwhittaker @SwiftOnSecurity I am still waiting on a β€œGoTo considered harmful” joke :P
@zackwhittaker a little dodgy, but not so much, i think. It is still search engine index for LastPass page, right? 😬
@zackwhittaker lol here is one app where we don’t want to see data breach happening.