all-in-one privacy solution":["Proton Unlimited — комплексное решение для защиты данных"],"Black Friday":["Черная пятница"],"No ads. Privacy by default.":["Без рекламы. Гарантия конфиденциальности"],"People before profits":["Люди важнее прибыли"],"Security through transparency":["Безопасность, основанная на прозрачности"],"The best Proton Mail ${ BLACK_FRIDAY } deals":["${ BLACK_FRIDAY }: лучшие предложения Proton Mail"],"The world’s only community- supported email service":["Единственный в мире сервис электронной почты с поддержкой сообщества"]},"specialoffer:limited":{"${ hours } hour":["${ hours } час","${ hours } часа","${ hours } часов","${ hours } часа"],"${ hoursLeft }, ${ minutesLeft } and ${ secondsLeft } left":["Осталось ${ hoursLeft }, ${ minutesLeft } и ${ secondsLeft }"],"${ minutes } minute":["${ minutes } минута","${ minutes } минуты","${ minutes } минут","${ minutes } минуты"],"${ seconds } second":["${ seconds } секунда","${ seconds } секунды","${ seconds } секунд","${ seconds } секунды"],"Limited time offer":["Ограниченное по времени предложение"]},"specialoffer:listitem":{"Create multiple addresses":["Создавайте несколько адресов"],"Hide-my-email aliases":["Создавайте алиасы hide-my-email"],"Quickly unsubscribe from newsletters":["С легкостью отменяйте подписку на рассылки"],"Use your own domain name":["Используйте собственное доменное имя"]},"specialoffer:logos":{"As featured in":["О нас в СМИ"]},"specialoffer:metadescription":{"Get an encrypted email that protects your privacy":["Электронная почта, защищающая вашу конфиденциальность"]},"specialoffer:metatitle":{"Proton Mail Black Friday Sale - Up to 40% off":["Черная пятница в Proton Mail: скидки до 40 %"]},"specialoffer:newmetadescription":{"Get up to 40% off Proton Mail subscriptions this Black Friday. Find great deals on our secure end-to-end encrypted email plans.":["Получите Proton Mail со скидкой до 40 %. Не пропустите выгодные предложения на планы безопасной электронной почты, зашифрованной сквозным шифрованием, в честь «черной пятницы»."]},"specialoffer:newmetatitle":{"Proton Mail Black Friday sale | Up to 40% off secure email":["«Черная пятница» в Proton Mail | Скидки до 40 %"]},"specialoffer:note":{"* Billed at ${ TOTAL_SUM } for the first year":["* ${ TOTAL_SUM } за первый год."],"*Billed at ${ TOTAL_SUM } for the first 2 years":["* ${ TOTAL_SUM } за первые два года."],"30-day money-back guarantee":["Гарантия возврата средств в течение 30 дней"],"Billed at ${ TOTAL_SUM } for the first 2 years":["${ TOTAL_SUM } за первые 2 года"],"Billed at ${ TOTAL_SUM } for the first year":["${ TOTAL_SUM } за первый год"],"You save ${ SAVE_SUM }":["Вы экономите ${ SAVE_SUM }."]},"specialoffer:off":{"${ PERCENT_OFF } off":["–${ PERCENT_OFF }"]},"specialoffer:testimonial":{"I love my ProtonMail":["Обожаю ProtonMail!"],"My favorite email service":["Мой любимый сервис электронной почты"],"Thanks Proton for keeping us all safe in the complicated internet universe.":["Спасибо Proton за защиту в запутанном интернет-пространстве."],"You get what you pay for. In the case of big tech, if you pay nothing, you get used. I quit using Gmail and switched to @ProtonMail":["Полностью оправданное вложение денег. Бигтех-компании используют тебя, если ты им не платишь. Поэтому я перешла с Gmail на @ProtonMail."]},"specialoffer:time":{"Days":["дн."],"Hours":["ч."],"Min":["мин."]},"specialoffer:title":{"And much more":["И многое другое"],"Safe from trackers":["Защита от трекеров"],"Stay organized":["Будьте организованными"],"Black Friday email deals":["Безопасная почта для покупок в «черную пятницу»"],"Don’t just take our word for it":["Отзывы наших клиентов"],"Make your inbox yours":["Сделайте свой почтовый ящик вашим"],"Our story":["Наша история"],"Transfer your data from Google in one click":["Перенесите данные из Gmail в одно нажатие"]},"specialoffer:tooltip":{"Access blocked content and browse privately. Includes ${ TOTAL_VPN_SERVERS }+ servers in ${ TOTAL_VPN_COUNTRIES }+ countries, connect up to 10 devices, access worldwide streaming services, malware and ad-blocker, and more.":["Сохраняйте конфиденциальность в интернете и получайте доступ к заблокированному контенту. Включает ${ TOTAL_VPN_SERVERS } серверов более чем в ${ TOTAL_VPN_COUNTRIES } странах с возможностью подключения на 10 устройствах, доступ к стриминговым платформам со всего мира, блокировщик рекламы, функцию защиты от вредоносных программ и другие преимущества."],"Easily share your calendar with your family, friends or colleagues, and view external calendars.":["Предоставляйте доступ к календарю родственникам, друзьям и коллегам, а также просматривайте календари других сервисов"],"Includes support for 1 custom email domain, 10 email addresses, 10 hide-my-email aliases, calendar sharing, and more.":["Включает поддержку 1 пользовательского домена, 10 адресов электронной почты, 10 алиасов hide-my-email, совместный доступ к календарю и другие преимущества."],"Includes support for 3 custom email domains, 15 email addresses, unlimited hide-my-email aliases, calendar sharing, and more.":["Включает поддержку трех пользовательских доменов, 15 адресов электронной почты, неограниченного числа алиасов hide-my-email, совместный доступ к календарю и другие преимущества."],"Manage up to 25 calendars, mobile apps, secured with end-to-end encryption, 1-click calendar import from Google, and more.":["До 25 календарей, мобильные приложения, сквозное шифрование, удобный перенос данных из Google Календаря и другие преимущества"]},"Status banner":{"Learn more":["Подробнее"],"Please note that at the moment we are experiencing issues with the ${ issues[0] } service.":["Сейчас при использовании сервиса ${ issues[0] } могут возникать проблемы."],"We are experiencing issues with one or more services at the moment.":["При использовании одного или нескольких сервисов могут возникать проблемы."]},"Status Banner":{"At the moment we are experiencing issues with the Proton VPN service":["При использовании сервиса Proton VPN могут возникать проблемы"],"Learn more":["Подробнее"]},"steps":{"Step":["Шаг"]},"suggestions":{"Suggestions":["Предложения"]},"Support":{"Sub category":["Подкатегория","Подкатегории","Подкатегорий","Подкатегорий"]},"Support article":{"${ readingTime } min":["${ readingTime } мин.","${ readingTime } мин.","${ readingTime } мин.","${ readingTime } мин."],"Category":["Категория","Категории","Категорий","Категорий"],"Didn’t find what you were looking for?":["Не нашли желаемый контент?"],"General contact":["Общие контакты"],"Get help":["Получить помощь"],"Legal contact":["Контакты юридического отдела"],"Media contact":["Контакты для прессы"],"Partnerships contact":["Контакты по вопросам партнерства"],"Reading":["Чтение"]},"Support Form Platform option":{"VPN for Android TV":["VPN для Android TV"],"VPN for Apple TV":["VPN для Apple TV"],"VPN for Chromebook":["VPN для Chromebook"]},"Support troubleshooting":{"App version":["Версия приложения"],"Browser":["Браузер"],"Check if this helps":["Возможно, нужный ответ найдется здесь"],"Choose a product":["Выберите продукт"],"Did this solve your issue?":["Удалось ли нам решить вашу проблему?"],"Faster assistance is just a few clicks away":["Пара нажатий, и вы получите быструю помощь"],"How can we help?":["Чем мы можем помочь?"],"No, contact support":["Нет, связаться со службой поддержки"],"Please fill out one field after another":["Заполните поля по порядку"],"Please make your selections":["Отметьте подходящие варианты"],"Proton account":["Аккаунт Proton"],"Proton for Business":["Proton for Business"],"Thank you for your feedback":["Спасибо за отзыв!"],"What can we help with?":["Какая помощь требуется?"],"Yes":["Да"]},"support_modal_search_query":{"Search query":["Поисковый запрос"]},"support_search_button":{"Search":["Найти"]},"support_search_i_am_looking_for":{"I'm looking for":["Я ищу"]},"SupportForm":{"For a faster resolution, please report the issue from the Bridge app: Help > Report a problem.":["Чтобы быстро устранить проблему в приложении Bridge, выберите «Справка» > «Сообщить о проблеме»."],"Information":["Информация"]},"SupportForm:option":{"Account Security":["Безопасность аккаунта"],"Contacts":["Контакты"],"Custom email domain":["Пользовательский домен адреса электронной почты"],"Email delivery and Spam":["Доставка электронных писем и спам"],"Encryption":["Шифрование"],"Login and password":["Имя пользователя и пароль"],"Merge aliases and accounts":["Объединение псевдонимов и аккаунтов"],"Migrate to Proton":["Переход на Proton"],"Notifications":["Уведомления"],"Other":["Другое"],"Plans and billing":["Тарифы и оплата"],"Proton for Business":["Proton for Business"],"Sign up":["Регистрация"],"Storage":["Хранилище"],"Users, addresses, and identities":["Пользователи, адреса и личные данные"]},"SupportForm:optionIntro":{"Select a topic":["Выберите тему"]},"Testimonial":{"Awards":["Награды"],"Customers":["Клиенты"],"Featured":["Что о нас говорят"],"Go to testimonial source":["Перейти к источнику отзыва"],"Open source of award":["Узнать, кто выдал награду"],"Open source of quote":["Узнать, откуда цитата"],"Reviews":["Отзывы"],"Videos":["видео."],"Watch on TikTok":["Смотреть в TikTok"],"Watch on YouTube":["Смотреть на YouTube"]},"TestimonialCategory":{"Awards":["Награды"],"Customers":["Клиенты"],"Featured":["Что о нас говорят"],"Media":["СМИ"],"Reviews":["Отзывы"],"Videos":["видео."]},"Text":{"If you need help, check out our ${ supportLink }.":["Если вам нужна помощь, перейдите в ${ supportLink }."],"The page you’re looking for might have been removed, or it could be an\nold link.":["Возможно, страница удалена\nили у вас устаревшая ссылка."],"Your question may already have an answer in our knowledge base:":["Возможно, ответ на ваш вопрос уже есть в нашей базе знаний:"]},"Title":{"On this page":["На этой странице"],"Related articles":["Статьи по теме"],"Share ${ thisPage }":["Поделиться ${ thisPage }"],"Switch to Proton Pass - Contact us":["Переход на Proton Pass — свяжитесь с нами"],"Thank you!":["Спасибо!"],"this page":["этой страницей"]},"tooltip_vpn":{"Access blocked content and browse privately. Includes ${ TOTAL_VPN_SERVERS }+ servers in ${ TOTAL_VPN_COUNTRIES }+ countries, highest VPN speed, ${ TOTAL_VPN_CONNECTIONS } VPN connections, worldwide streaming services, malware and ad-blocker, and more.":["Получайте доступ к заблокированному контенту, просматривайте страницы анонимно и пользуйтесь стриминговыми сервисами со всего мира. Мы предлагаем ${ TOTAL_VPN_SERVERS } серверов более чем в ${ TOTAL_VPN_COUNTRIES } странах, высочайшую скорость VPN, ${ TOTAL_VPN_CONNECTIONS } VPN-подключений, защиту от вредоносных программ, блокировщик рекламы и многое другое."]},"vpn_servers":{"Get Proton VPN Plus":["Получить Proton VPN Plus"]},"wallet_signup_2024:Action":{"Get Proton Wallet":["Получить Proton Wallet"]},"wallet_signup_2024:Homepage hero product link title":{"Wallet":["Wallet"]},"wallet_signup_2024:Homepage product navigation bar":{"Wallet":["Wallet"]},"wallet_signup_2024:menu item":{"Bitcoin guide":["Руководство по Bitcoin"],"Proton Wallet news":["Proton Wallet: новости"],"Proton Wallet support":["Proton Wallet: поддержка"]},"wallet_signup_2024:Pricing":{"Includes everything in Proton Unlimited and":["Включены все функции Proton Unlimited и"],"Limited availability":["Доступ ограничен"],"The easiest way to securely own, send, and receive Bitcoin":["Самый простой способ безопасно хранить, получать и отправлять Bitcoin"]},"wallet_signup_2024:ProductRange":{"Discover Proton Wallet":["Знакомство с Proton Wallet"],"Store and transact Bitcoin privately with an encrypted self-custody wallet.":["Храните и переводите Bitcoin с помощью некастодиального кошелька с шифрованием."]},"wallet_signup_2024:wallet bitcoin":{"Learn about Bitcoin, the Internet's value network.":["Рассказываем о сети создания ценности в Интернете — Bitcoin."]},"wallet_signup_2024:wallet overview":{"Ensure you're always in control of your Bitcoin.":["Обеспечьте полный контроль над своими средствами в Bitcoin."]},"wallet_signup_2024:wallet security":{"The encrypted, open-source wallet that puts you in control.":["Кошелёк с шифрованием и открытым исходным кодом, который контролируете только вы."]}}},"base":"blog","cdn":{"enabledForAssets":true,"enabledForImages":true,"url":"https://pmecdn.protonweb.com/"},"unleashApi":"https://account.proton.me/api"};
window.frameworkContext = frameworkContext;
const context = frameworkContext.base === '' ? '' : `${frameworkContext.base}/`;
window.__toAssetUrl = (filename) => {
if (frameworkContext.cdn !== undefined && frameworkContext.cdn.enabledForAssets === true) {
return `${frameworkContext.cdn.url}${context}${filename}`;
} else {
return `/${context}${filename}`;
}
};
})();
If you’re shopping for a password manager, one prominent product is LastPass. The company has had a turbulent history, however, which may lead you to wonder, is LastPass safe?
Based on its poor track record of security problems, the short answer is that no, LastPass is not safe, and you should probably avoid it. If you already have it installed, the safest option is to delete LastPass and to export and then delete any data the company holds so it’s no longer at risk.
We don’t often advise so strongly against other online services, and while no system is 100% secure, the persistent security issues at LastPass should raise alarm bells for anyone considering storing their most sensitive data there. Let’s look at why we’ve made this recommendation.
There is an abundance of evidence and research that shows LastPass is not safe to use. The company has dropped the ball on several occasions, leading to some of the biggest breaches in web history.
Many of these issues appear to stem from the company’s inability to learn from its mistakes, neglecting to implement much-needed security measures that are usually standard in any password manager, including ours, Proton Pass.
A timeline of LastPass security incidents
LastPass was founded in 2008 and has had some kind of security scandal in most years since 2011. Though not each of these incidents was a full-blown data breach, a picture quickly emerges of a company that does not appear to take security particularly seriously, making disaster inevitable. Let’s go over all major incidents LastPass has experienced in its short existence.
2011: A small, limited breach
The first breach LastPass experienced was a small, limited breach in May 2011 in which the account details of LastPass users — maybe as few as a couple of hundred — may have been exposed(новое окно). This was likely due to many of these customers using easily deciphered passwords for their LastPass account. Which made them vulnerable to brute-force attacks in which criminals use software to “guess” passwords.
In a now-deleted blog post — a pattern of behavior we’ll see more of in this timeline — LastPass recommended that stronger passwords were used to secure accounts, as well as making sure that any access attempt was verified through an IP address. In the time since 2011, methods to protect against brute-force attacks have improved, but for then it was a reasonable response.
2015: Brute force attack of unknown duration
In June 2015, four years after the last hack, LastPass again was attacked(новое окно) and in much the same way. Criminals tried to brute-force access and managed to get through to the accounts of people who had used weak passwords. LastPass again responded fairly comprehensively, alerting law enforcement and resetting everybody’s master password, forcing users to login via email.
However, LastPass also began a pattern of not revealing any details of the attack, most importantly how many people were affected and how long the attack lasted before it was discovered. The success of a brute force attack can be measured by the time attackers have to carry it out; the sooner you react, the less successful it is. The fact that LastPass didn’t release these details gave the impression it may have lasted longer than would be considered safe.
2016: White hat hacks
The year after the brute force attack there were a number of incidents in which security researchers — white hat hackers who test security with an aim to improve it, not to steal data — managed to get through.
The first was revealed in January. It consisted of a simple phishing attack in which LastPass users could easily be fooled into giving up their credentials. The details of how it worked are explained in Hackread(новое окно), but most interesting is probably LastPass’ reaction. The company deflected criticism by claiming it was a phishing attack and thus outside its purview, ignoring the fact that companies can plan for these contingencies.
The second incident(новое окно) in July 2016 was a similar scenario, in which Google-employed security researcher Tavis Ormandy — a name we’ll run into again shortly — fooled LastPass’ Firefox add-on to give up user details. LastPass’ reaction was to issue a security advisory in a now-deleted blog post (another vain attempt to delete history) to update the extension.
The final, and worst, flaw was in the same month and found by security researcher Mathias Karlsson. The details are here(новое окно), but the short version is that LastPass left a nasty bug in its code that let a savvy hacker extract any passwords used on a site via LastPass’ autofill. Happily, LastPass fixed the issue as soon as Karlsson reported it, and also paid him a bounty for finding it.
2017: More bugs, both minor and major
Tavis Ormandy seems to have made LastPass his pet project at some point, as he kept up a steady pace of revelations throughout 2016 and 2017. Most of these were pretty simple and mainly notable for the sheer number of them. LastPass doesn’t seem to have taken quality control very seriously, or at least assumed that people like Ormandy would do it for them.
However, there was one flaw that was deemed serious enough to make it onto the pages of The Guardian(новое окно) in March 2017. Sadly, we don’t know too much about what exactly happened as apparently giving up details might make LastPass users even less safe than they already were. If you think transparency is a vital part of security — and we do — this should be enough reason never to use LastPass.
2019: Ormandy strikes again
Ormandy kept up his work of embarrassing LastPass, finding many minor bugs. However, in September 2019 he again found something bad enough to be mentioned in the press. Like in 2016, this was a bug in a browser extension, this time those for Opera and Chrome, which let attackers extract login information(новое окно) of any sites users had previously visited.
LastPass patched the bug as soon as Ormandy reported it, but was rather sanguine when telling its users, as it “only” affected the extensions for Chrome and Opera; no mention that Chrome is by far the most widely used browser(новое окно) out there.
2021: LastPass caught harvesting data
In February 2021 security researcher Mike Kuketz came with another shocking revelation(новое окно), namely that LastPass had been using trackers in its password manager. Though the company claimed that it merely did this to see how people were using the product, the fact is such trackers can also be used to gather advertising data.
This is the most likely explanation, too. As Kuketz says, there is no reason to gather information the way LastPass did because there are far more secure and less intrusive ways to do this.
2022: The final nail?
Eventually, though, LastPass’ track record of slap-dash security came back to haunt it. Over the course of several months the company had to admit to several serious breaches, then was caught covering up exactly how bad they had been. We have the full story here, but here is a summary:
In August 2022, the company admitted that a hacker had gained access to the company’s development environment (think of it as a workshop where software is assembled and tinkered with before it’s launched), but had not been able to gain access to customer information. In December, the company admitted that the development environment had been breached again and that this time attackers had stolen customer data.
Then, in March 2023, it turned out that the company had lied in earlier statements and that attackers had stolen a lot more, including sneaking a peek not just at customer data, but even the security architecture of LastPass itself. This pretty much makes LastPass vulnerable forever unless it completely overhauls its architecture.
What to use instead of LastPass
As you can see, the latest LastPass breach doesn’t stand by itself; the company has a long history of not taking security seriously and putting their customers last. Time and again it has failed to put out competent products and then, when caught, downplayed the effect on customers — when not lying outright.
If you’re still a LastPass user, you deserve better. This is why we developed Proton Pass, a password manager that takes security seriously and treats people with respect. We do this through transparency, with all client code being open-source, meaning anybody can check our work. Our code is also independently audited by third-party security experts. Our security is further enhanced by Proton’s bug bounty program that incentivizes security researchers to stress test our code.
As a company founded by scientists, transparency and peer review are core values, and we’re guided by a mission to make the web more private and secure.