File location for stored passwords in opera 20
-
sgunhouse Moderator Volunteer last edited by
Did you actually upgrade the same computer, or is this a new computer? Passwords are encrypted to the Windows user account, if you reformat or change to a new computer they can't be decrypted. Meaning, they were probably transferred fine but can't be read. If you want to look, it's called "Login Data" for the database and "Login Data-journal" for the journal, but as I say it probably was transferred just fine ...
-
mmcl26554 last edited by
It's a new computer win7>win8.1. And yes the file was transferred and is the same size as the old one. But of course Opera on win8.1 sees no passwords. So I'm out of luck? That not a biggie as I have all important passwords in Keepass. How about auto form fill in did that transfer and is usable? I haven't run across a form to fill in yet.
Michael -
mmcl26554 last edited by
Form fill in is working just fine, one of the things I like about the new Opera. But passwords certainly didn't make it. Sgunhouse, you say it is because of encryption but I don't quite understand why that makes a difference. Doesn't Opera have the key or is it a different key for each installation. They why copying the entire Opera Software, Next files bring the key over. Could you explain in greater depth why this doesn't work, I'm just curious and would like to understand it better.
Michael -
blackbird71 last edited by
Opera uses a Windows-provided 'encryption service' key unique to the user account and the specific file. So it stays "locked" to that system and user account - nothing else can open such an encrypted file if a different user account on that system or a different computer is involved. Unless you're a 3-letter agency with tons of computational horsepower...
But staying on the same system and user account, you can copy and move the file around any number of places and it will still decrypt successfully from within the original user account. Obtaining the decryption key requires the exact same Windows installation and the exact same user account instance... each is a necessary component of the keying system. And it's a critical reason to safely and frequently back up the system if such encryption is significantly involved in a user's important files... there is no other recovery mechanism for such encrypted files if the drive fails. One has to fully restore the OS installation and the user account to get at the files.
-
mmcl26554 last edited by
Thanks blackbird71, I thought it was something like that. Do you think this would keep most hackers and the NSA out? HaHaHa!
Michael -
mmcl26554 last edited by
Hmmm, if that hacker knows how to break in to the file, they could do something useful and share with us how to recover them? But that's not likely. I'm not referring to you sgunhouse 71, just hackers in general, they could turn their malicious skills into something useful!
Michael -
sgunhouse Moderator Volunteer last edited by
Some do - and don't always get rewarded for it. Some point out security flaws in major websites (or major software) and the company blows them off. So they demonstrate it, and end up facing federal hacking charges. Just for trying to do the right thing - try to get the company to fix the problem before some actual malicious hacker uses it against them.
-
mmcl26554 last edited by
I absolutely agree with you! That is a sad state of affairs, but in todays society where there are so many Sue happy and companies view admission of anything wrong as horrible. But that seems to go for many many people, not admitting they have done anything wrong and take responsibility. But I believe most people can forgive a sinner but not a liar. It would be better for all of us if when things go wrong people would just admit the error and then work to fix it.
Michael