I have note books filled with passwords … So many passwords lol … But the master password ends up in the book … This looks a lot better … Thanks for sharing ❤
@@ljptech Pairing without Verification: Often, devices can pair automatically without requiring a PIN code, making it easy for unauthorized devices to connect. Eavesdropping: Bluetooth signals can be intercepted, allowing attackers to eavesdrop on conversations or access sensitive data. Man-in-the-Middle Attacks: Hackers can position themselves between two devices, intercepting and potentially altering data. Bluejacking and Bluesnarfing: These attacks involve sending unsolicited messages or accessing data from other devices. Default PIN Codes: Many devices come with easily guessable default PIN codes, making them vulnerable to attacks.
52.99 USD plus shipping in the Philippines for example, will be around 5k PHP when converted. Compare it to the portable, cross platform KeepassXC in an affordable USB pendrive which the software is free open source and unlimited database for passwords. And you can copy the database to any other pendrives. Unfortunately it doesn't have 2 factor.
You lost me when the Bluetooth is mentioned.
Great review. Any idea if this can import data from Lastpass? Thanks
Not familar with Lastpass, sorry
Does this work on iPhones
You should not use lastpass I was using it till I started using Samsung pass because my account information got leaked and the account was breached
I have note books filled with passwords … So many passwords lol … But the master password ends up in the book … This looks a lot better … Thanks for sharing ❤
Thank you! We need this!
I hope they make one for MacBook 💖
@jodiene0404 I thought there was? If not, I am not surprised by Apple's incompatibility
@@ljptechI will check into it 💙
Bluetooth isn't safe at all so...
how so?
@@ljptech Pairing without Verification: Often, devices can pair automatically without requiring a PIN code, making it easy for unauthorized devices to connect.
Eavesdropping: Bluetooth signals can be intercepted, allowing attackers to eavesdrop on conversations or access sensitive data.
Man-in-the-Middle Attacks: Hackers can position themselves between two devices, intercepting and potentially altering data.
Bluejacking and Bluesnarfing: These attacks involve sending unsolicited messages or accessing data from other devices.
Default PIN Codes: Many devices come with easily guessable default PIN codes, making them vulnerable to attacks.
Very expensive.
not really
52.99 USD plus shipping in the Philippines for example, will be around 5k PHP when converted. Compare it to the portable, cross platform KeepassXC in an affordable USB pendrive which the software is free open source and unlimited database for passwords.
And you can copy the database to any other pendrives.
Unfortunately it doesn't have 2 factor.
@ljptech I'll settle for KeepassXC on a USB pendrive.