SamuraiSafe is a password manager for iOS and macOS. It has a simple, clean interface, is highly secure, and is free. Your data is only stored where you allow it. You can generate and audit passwords, sync to multiple devices, and create password groups. Any textual information may be stored. Each password entry may contain an arbitrary length secure note.
You can read about why SamuraiSafe was created and who developed it.
Recursively search source code and text files for a pattern, then open matched files in your favourite editing/viewing app.
Supports flexible search options, including regular expressions. Files searched can be selected from standard or custom text file types.
Search folders can be selected from On My iPad, iCloud Drive or external file providers (e.g SMB share). Saved search folders are retained by the app where possible.
Note some third party file providers don’t currently provide external folder access (eg Google Drive and Dropbox).
Password Security News
The psuedo random number generator (PRNG) being used to generate passwords for the Kaspersky Password Manager was very weak, and wasn’t not suitable for crytographic use. It was being seeded by the current time (in seconds), which meant that every instance of the Kaspersky Password Manager in the world would generate the exact same password at a given second. it was therefore very easy to bruteforce. It has subsequently been updated.
This article points out that if your iOS passcode is discovered, your passwords stored in the iOS KeyChain will be exposed. This is correct. The solution is to store your passwords somewhere else. Like SamuraiSafe.
SamuraiSafe resisted adopting password autofill of web pages within the web browser, as the implementations were often vulnerable to compromise. SamuraiSafe now adopts Apple’s AutoFill Credential Provider Extension interface which is built into iOS/iPadOS. It aims to avoid such vulnerabilities.
An analysis of five popular commercial password managers discussing previously disclosed vulnerabilities and exploits for newly discovered vulnerabilities. Many of the previously reported vulnerabilities have been found to persist.
An attack on server API used by a popular password manager. The exploit tricks the password manager server to disclose your encryption key. It arises from an interaction between a trusted extension user interface with web applications.
By analysing password managers in running states on Windows 10, ISE found a fatal flaw in an otherwise good password manager. This type of exploit requires malicous access to the OS, so potentially applies to macOS (or a jailbreaked/compromised iOS).
Diceware is an effective way of generating strong passwords by rolling dice. Ars notes the creator now recommends using six words where five were previously recommended. The SamuraiSafe passphrase feature is modelled on Diceware but uses a larger word list (~21,000 vs 7,776 for Diceware).
Should You Use a Password Manager? discusses the pros and cons of using a password manager. Am I An Idiot for Still Using a Password Manager? questions the risks of managers that store your data server side.