This is a great breakdown of LastPass’s blogpost about their security breach and everything left unsaid.

Even if you don’t blame them for being breached given how much of a high value target they are, you should blame them for downplaying the severity and not taking enough action to protect their customers.

https://palant.info/2022/12/26/whats-in-a-pr-statement-lastpass-breach-explained/

What’s in a PR statement: LastPass breach explained

The LastPass statement on their latest breach is full of omissions, half-truths and outright lies. I’m providing the necessary context for some of their claims.

Almost Secure
@carnage4life It's my understanding that they are never receiving your master password, even when logging in at the website. My understanding is that it is hashed client side and only hashes are compared. However, I have not verified that.
@WiredWiz @carnage4life this is correct. Your passwords are safe.

@WiredWiz @erin This is inaccurate, your passwords are NOT safe. That the hackers do not have your master password is an accurate statement.

Whether or not your hashed passwords are safe depends on multiple factors including the strength of your master password.

@carnage4life @erin I'm not saying Lastpass isn't deserving of the criticism, I just think the statement about hackers potentially intercepting the master password is exaggerated if my understanding of the current design is correct.
@WiredWiz @carnage4life @erin The rule is: when you don't know what's been compromised, you MUST assume everything is compromised, regardless of what the vendor or platform is telling you. Change every password and switch to a new password manager.
@mphinpgh @carnage4life @erin Well I feel pretty good about my credentials being safe, given my password, iterations and after inspecting my vault data. That said, I'll still be switching to another provider because Lastpass has shown that user security is not their highest priority.