{"id":63542,"date":"2026-02-17T15:05:19","date_gmt":"2026-02-17T04:05:19","guid":{"rendered":"https:\/\/www.tomgrimshaw.com\/tomsblog\/?p=63542"},"modified":"2026-02-17T15:05:19","modified_gmt":"2026-02-17T04:05:19","slug":"zero-knowledge-encryption-promise-breaks-down-with-malicious-server-attacks","status":"publish","type":"post","link":"https:\/\/www.tomgrimshaw.com\/tomsblog\/?p=63542","title":{"rendered":"&#8220;Zero-knowledge encryption&#8221; promise breaks down with malicious server attacks."},"content":{"rendered":"<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-63543\" src=\"https:\/\/www.tomgrimshaw.com\/tomsblog\/wp-content\/uploads\/2026\/02\/Password_Hook.jpg\" alt=\"Password Hook\" width=\"500\" height=\"375\" srcset=\"https:\/\/www.tomgrimshaw.com\/tomsblog\/wp-content\/uploads\/2026\/02\/Password_Hook.jpg 500w, https:\/\/www.tomgrimshaw.com\/tomsblog\/wp-content\/uploads\/2026\/02\/Password_Hook-300x225.jpg 300w\" sizes=\"auto, (max-width: 500px) 100vw, 500px\" \/><\/p>\n<p>Researchers at the Swiss Federal Institute of Technology (ETH Z\u00fcrich) have discovered serious vulnerabilities in popular, cloud-based password managers that allowed them to view and modify stored passphrases.<\/p>\n<p>Finish reading:\u00a0<a href=\"https:\/\/www.itnews.com.au\/news\/researchers-find-critical-vulnerabilities-in-cloud-based-password-managers-623661\">https:\/\/www.itnews.com.au\/news\/researchers-find-critical-vulnerabilities-in-cloud-based-password-managers-623661<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Researchers at the Swiss Federal Institute of Technology (ETH Z\u00fcrich) have discovered serious vulnerabilities in popular, cloud-based password managers that allowed them to view and modify stored passphrases. Finish reading:\u00a0https:\/\/www.itnews.com.au\/news\/researchers-find-critical-vulnerabilities-in-cloud-based-password-managers-623661<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[4,5],"tags":[],"class_list":["post-63542","post","type-post","status-publish","format-standard","hentry","category-computer-tips-basic","category-general-interest"],"_links":{"self":[{"href":"https:\/\/www.tomgrimshaw.com\/tomsblog\/index.php?rest_route=\/wp\/v2\/posts\/63542","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.tomgrimshaw.com\/tomsblog\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.tomgrimshaw.com\/tomsblog\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.tomgrimshaw.com\/tomsblog\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.tomgrimshaw.com\/tomsblog\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=63542"}],"version-history":[{"count":1,"href":"https:\/\/www.tomgrimshaw.com\/tomsblog\/index.php?rest_route=\/wp\/v2\/posts\/63542\/revisions"}],"predecessor-version":[{"id":63544,"href":"https:\/\/www.tomgrimshaw.com\/tomsblog\/index.php?rest_route=\/wp\/v2\/posts\/63542\/revisions\/63544"}],"wp:attachment":[{"href":"https:\/\/www.tomgrimshaw.com\/tomsblog\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=63542"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.tomgrimshaw.com\/tomsblog\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=63542"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.tomgrimshaw.com\/tomsblog\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=63542"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}