[APP][1.5+] Cloud Free Password Manager for Dropbox - Android Apps and Games

[APP][5.0+] Cloud Password Manager with Dropbox data synchronization
This password manager is designed to provide secure and comfortable storage of your accounts. All fields are visible on your screen and can be found easily by a quick text filter! To enable automatic data backups please sign into Dropbox on app startup. Database restore feature will be available only if a mismatch between local and backed up databases is detected.
A master password is a password invented by yourself for the protection of your data. It can be any sequence of letters, digits or numbers at your choice. Please, do not forget your master password to avoid the loss of your data due to inability to decrypt the database.
All you need to remember is the master password of your choice, which must be entered at startup. Your master password is used to encrypt the password database and to restrict unauthorized access to your personal data. It is not stored anywhere and is only used for encryption and decryption purposes. If the database was previously encrypted with one master password it will not be successfully decrypted with another one. Please, do not forget your master password!
Cloud Password Manager on Google Play: https://play.google.com/store/apps/details?id=house_intellect.keyring_free

The Master-Key is a password invented by yourself for the protection of your data. It can be any sequence of letters, digits or numbers at your choice. Please, do not forget your master key to avoid the loss of your data due to inability to decrypt the database.

Related

[APP][1.5+] KeyRing Free Password Manager

[APP][5.0+] Cloud Password Manager with Dropbox data synchronization
This password manager is designed to provide secure and comfortable storage of your accounts. All fields are visible on your screen and can be found easily by a quick text filter! To enable automatic data backups please sign into Dropbox on app startup. Database restore feature will be available only if a mismatch between local and backed up databases is detected.
A master password is a password invented by yourself for the protection of your data. It can be any sequence of letters, digits or numbers at your choice. Please, do not forget your master password to avoid the loss of your data due to inability to decrypt the database.
All you need to remember is the master password of your choice, which must be entered at startup. Your master password is used to encrypt the password database and to restrict unauthorized access to your personal data. It is not stored anywhere and is only used for encryption and decryption purposes. If the database was previously encrypted with one master password it will not be successfully decrypted with another one. Please, do not forget your master password!
Cloud Password Manager on Google Play: https://play.google.com/store/apps/details?id=house_intellect.keyring_free
Nice app but can u take away when first entering the app, the pop up that says enter the master key even though there wasn't one In the first place
Fyi to get pass this, just enter a blank pass
Sent from my SGH-T989 with Cyanogenmod 7.
master key popup
The master key is used for security reasons. Please, enter any key, just do not forget it. Otherwize it would be impossible to recover data.
The Master-Key is a password invented by yourself for the protection of your data. It can be any sequence of letters, digits or numbers at your choice. Please, do not forget your master key to avoid the loss of your data due to inability to decrypt the database.

SplashID v7 upgrade security issue

Besides the issues SplashData has with their SplashID v7 android upgrade losing many customers data, there is also a very worrying security issue which splashdata ignores = and actively censors, my messages regarding this on their FB page have been deleted and I am blocked from commenting our writing there)
Here is the issue:
The new SplashID version 7 had a cloud sync feature (30 day free trial, then for a fee). When first starting the upgraded version (which may have been installed automatically on Android if one allows auto upgrades!), one first has to again enter one's email address/username, and then the password (which is the one used to encrypt one's database containing all one's private, sensitive data!). Then the upgrade asks whether one wants to try the cloud sync feature.
Even if one declines and opts to stay with the existing Wi-Fi sync feature only(which does not need a cloud account), the upgrade goes ahead and automatically creates such a cloud account on splashdata's servers.*and it uses the same password* for this. (In fact as further part of the upgrade procedure one needs to log into those cloud servers using that password after receiving an activation link in email.
So, splashdata leaks the master password which one uses to secure one's most private data (credit card pins, login password etc) into their cloud, without telling that this will be fine, not asking permission.
There is no info whether the password is stored securely (doubt it), whether it is in ask cases transmitted securely (doubt that too) and anyhow, once this has happened one had lost control over that most important password. It's burnt.in the wild, out of one's own control
Note that changing the password on one's own copy of SplashID us a good idea after that, but any old copy of one's encrypted database that might still live on any old disk backup, cloud service (dropbox etc) or SD card somewhere, us now vulnerable.
And because splashdata in their 'wisdom' associated one's email address (and thus identity) with that password, it's easier for hackers to fund it.better companies than splashdata have lost password in the past.
It is even a very bad idea to user the same password for s cloud service as one uses for securing one's private data. Forcing this into users without permission or warning is almost criminal.
Sent from my GT-N7000 using Tapatalk 2
sejtam said:
Besides the issues SplashData has with their SplashID v7 android upgrade losing many customers data, there is also a very worrying security issue which splashdata ignores = and actively censors, my messages regarding this on their FB page have been deleted and I am blocked from commenting our writing there)
Here is the issue:
The new SplashID version 7 had a cloud sync feature (30 day free trial, then for a fee). When first starting the upgraded version (which may have been installed automatically on Android if one allows auto upgrades!), one first has to again enter one's email address/username, and then the password (which is the one used to encrypt one's database containing all one's private, sensitive data!). Then the upgrade asks whether one wants to try the cloud sync feature.
Even if one declines and opts to stay with the existing Wi-Fi sync feature only(which does not need a cloud account), the upgrade goes ahead and automatically creates such a cloud account on splashdata's servers.*and it uses the same password* for this. (In fact as further part of the upgrade procedure one needs to log into those cloud servers using that password after receiving an activation link in email.
So, splashdata leaks the master password which one uses to secure one's most private data (credit card pins, login password etc) into their cloud, without telling that this will be fine, not asking permission.
There is no info whether the password is stored securely (doubt it), whether it is in ask cases transmitted securely (doubt that too) and anyhow, once this has happened one had lost control over that most important password. It's burnt.in the wild, out of one's own control
Note that changing the password on one's own copy of SplashID us a good idea after that, but any old copy of one's encrypted database that might still live on any old disk backup, cloud service (dropbox etc) or SD card somewhere, us now vulnerable.
And because splashdata in their 'wisdom' associated one's email address (and thus identity) with that password, it's easier for hackers to fund it.better companies than splashdata have lost password in the past.
It is even a very bad idea to user the same password for s cloud service as one uses for securing one's private data. Forcing this into users without permission or warning is almost criminal.
Sent from my GT-N7000 using Tapatalk 2
Click to expand...
Click to collapse
Ouch, that sounds a bad idea. If the user doesn't want a remote account made, they should respect that. Can you give me any more details about this, I would like to contact them and request some proper response to this. While they might not be leaking the plaintext password, anything that can be "opened" with your password is a significant enough leak, as it would allow an attacker to verify they have the right password.
pulser_g2 said:
Ouch, that sounds a bad idea. If the user doesn't want a remote account made, they should respect that. Can you give me any more details about this, I would like to contact them and request some proper response to this. While they might not be leaking the plaintext password, anything that can be "opened" with your password is a significant enough leak, as it would allow an attacker to verify they have the right password.
Click to expand...
Click to collapse
Not much more that I already said. I am a long-time user of their SplashID (Mac) Desktop and Android app to store all my credit card, bank acount and yes, many systems passwords in.
The database they use is encrypted with a 'master password' which one has to enter on ones' Android (or iPhone, etc) or Desktop everytime to
unlock and decrypt (in memory), so that one access the data.
The same password is used on both the mobile and desktop of course.
A few days ago, an upgrade to SplashID v7 was made available on the Google Play store. I don't allow 'automatic' updates (though I am sure a lot of folks do!), but this time I also did not really check what the upgrade offered, and clicked 'UPDGRADE ALL' when it was offered along with a nunber of other upgrades. So it got installed.
When i subsequently opened SplashID again, it told me about all the shiny new features (cloud sync etc) and as normal asked me for my password (it also asked for my email address. I though that this was for them to check my purchase/license ans what features woudl be enabled)..
I thought that it would then show me my data. But wrong. Instead it offered me a selection whether I want to use the new 'cloud sync' feature (30 day free trial, later for $$), or stay with the normal 'wifi sync'.
I opeted for the latter (because I don't trust having my data sent to the cloud).
Anyway, the next thing I get is a message: (paraphrasing) "we have created your cloud account, you will get an email and will have to verify your email). Sure enough, I get an email:
Thank you for signing up for SplashID Safe Personal Edition!
To activate your account, please verify your email address by clicking the link below: Verify Email
Then check your email for our SplashID Safe Welcome message.{/QUOTE]
The link goes to: https://www.splashid.com/personal/webclient/login.php
I had to again ther enter my email address, and *the same password* that I entered before (which I thought would be for my private data-store).
Yes, that same password was used to create my account on their cloud server, even though I opted for the Wifi Sync *only* and never
asked for a cloud-sync.
Nor did the app tell me that the same password would be used to secure that aco****.
The issues with this are self-evident:
a) my most secure password, the one used to secure my data on my mobile and on my desktop is now 'leaked' to their cloud account
b) I have *no* idea how secuerly that password was transferred (in clear, encrypted, just a hash), nor how securely it is stored
c) it clearly is linked to my cloud-account on their website, so
- someone somehow learning that password could 'verify' it by accessing that account
- if someone hacked their system and accessed their database, that link would be apparent to them
d) I have nost *all control* over securing that password myself. It is 'burnt', 'in the wild'
e) Any pass backups of my secure SplashID database that may live on SD cards of mine, on backup disks, which may have
been copied to the cloud (dropbox, others) are now vulnerable. It is no use for me to change this password here now, as
old copies that may still exist somewhere are still encrypted with this password (and I cannot change them back).
Yes, I am trying to limit exposure for that password data file as much as possible, but eg Titatium Backup may have at some point in teh past backed it up and copied a backup to the cloud (yes, that is also encrypted, but once that featire failed).
More that that, of course users who are not as security conscious may have opeted for 'could sync'.
While I have not tried this feature myself, it sounds to me like thsi does copy the teh data to SplashID's cloud and
there secures it too only with that one single password.
So many users wh may not have thought all this out may have opted for the 'CloudSync' trial, and not only have their
password 'leaked'/'burnt' now, but also have all their data in the cloud, again secured only with a password that is no longer in their sole possession.
In fact, any secure, trustworthy system would have
a) been *very* upfront about what they are going to do with the password and the cloud account
b) used a separate password to secure the cloud account
c) only stored my encrypted copy of the database in their cloud, without *them* having the password for it
d) done any syncing on the client (ie, transfer the complerte encrypted password to the mobile or desktop where the comparisonupdates would happen) and then copied back again a secured file, that was encrypted on the mobile).
Click to expand...
Click to collapse
More discussion on SplashID's own site: http://forum.splashdata.com/showthr...ically-send-in-background-to-splash-id-server

[App][4.4+][Beta] PocketSate - Password manager with no permissions

A simple password (and other secret stuff) manager app, with full material UI.
The app requires no permissions
Features
All the data is encrypted using a master password with AES-256 algorithm
Three types of login method supported (pattern, pin & password)
Data is synced using Google Drive
Supported creating multiple categories for organizing entries
Integrated one-time password (OTP) generator
For beta testing join https://plus.google.com/communities/113518654350315614230
Attached screenshots
App released
The app is not publicly released.
With an additional feature to store the Safe locally or any available SAF providers
https://play.google.com/store/apps/details?id=com.painless.safe&hl=en

[APP][4.0+] Easy Password Manager

Easy Password Manager lets you store passwords securely. It uses strong AES 256 bit encryption for maximum security. As its name it’s easy to use.
Download from Google Play Store
Some of its features are:
Unlimited Password Storage
Unlimited Notes Storage
Password Generator
Backup & Restore Passwords
Quickly search passwords
Forgot Password
Please feel free to request new features via feedback page in settings.
Useful information about the app:
We do not store your password in cloud. Passwords are stored locally on your mobile phone. Hence you are the only one having access to it. Please take backup regularly from settings.
We use SD card permission to export and import passwords.
We use identity and internet permission to send feedback, password recovery and display ads
redone007 said:
Easy Password Manager lets you store passwords securely. It uses strong AES 256 bit encryption for maximum security. As its name it’s easy to use.
Download from Google Play Store
Some of its features are:
Unlimited Password Storage
Unlimited Notes Storage
Password Generator
Backup & Restore Passwords
Quickly search passwords
Forgot Password
Please feel free to request new features via feedback page in settings.
Useful information about the app:
We do not store your password in cloud. Passwords are stored locally on your mobile phone. Hence you are the only one having access to it. Please take backup regularly from settings.
We use SD card permission to export and import passwords.
We use identity and internet permission to send feedback, password recovery and display ads
Click to expand...
Click to collapse
Thanks will give it a test
david72262 said:
Thanks will give it a test
Click to expand...
Click to collapse
Hope you will like it.

Password Manager ( Only For Android)

Search it on Google Play Store : com.aust.rakib.passwordmanager
Password Manager is a secure password keeper and password generator that allows you to keep your passwords safe and secure in an encrypted database.So you have a secure storage of your data and you only have to remember your master-pin.
Password Manager typically require its user to create and remember one master pin to unlock and access to any information stored in its database.Password Manager never has the master pin to your encrypted data, so your information remains safe. Your password is encrypted with Advanced Encryption Standard (AES-256) encryption.You can access your data with different android devices via your own account.
FEATURES
☆ Store your password for all types of site with strong AES-256 encryption.
☆ Protect your passwords from hacking and data theft.
☆ Access via one single master-pin that only you know.
☆ Password Generator for creating strong secure passwords
Supported Languages
☆ English

Categories

Resources