RoboForm

Last updated

RoboForm
Developer(s) Siber Systems
Initial release1999;24 years ago (1999)
Operating system macOS, Windows, iOS, Android
Available in30 languages
Type Password manager
License Freemium / Proprietary software
Website www.roboform.com

RoboForm is a password manager, which is a class of software that allows users to have secure, unique passwords for every website accessed. It is amongst the older password managers [1] [2] on the market, developed by US company Siber Systems, [3] distributed as a freemium product with a subscription plan, [4] available on macOS, Windows, iOS and Android [4] and as a plugin for web browsers. [5] [6]

Contents

Overview

Siber Systems is a company founded in 1995 by Vadim Maslov [7] [8] with headquarters in Fairfax, Virginia. [9] The company was founded to capitalize on research into text parsing, compilation and transformation to produce useful, commercially-viable technologies. [9] They released RoboForm as their first consumer product in 1999. [10] [11] [2]

RoboForm was initially a form-filling utility and was further developed into a full-fledged password manager, [12] then delivered with password generator, password capturer, password importer, multi-factor authentication and secure password sharing. [6]

The first business version of RoboForm was released in 2009. In 2010 it was introduced premium cross-platform subscription service for individuals and in 2015, Siber Systems launched RoboForm as a software as a service solution (SaaS). The freemium model was available starting in 2017. [5]

See also

Related Research Articles

<span class="mw-page-title-main">Password</span> Used for user authentication to prove identity or access approval

A password, sometimes called a passcode, is secret data, typically a string of characters, usually used to confirm a user's identity. Traditionally, passwords were expected to be memorized, but the large number of password-protected services that a typical individual accesses can make memorization of unique passwords for each service impractical. Using the terminology of the NIST Digital Identity Guidelines, the secret is held by a party called the claimant while the party verifying the identity of the claimant is called the verifier. When the claimant successfully demonstrates knowledge of the password to the verifier through an established authentication protocol, the verifier is able to infer the claimant's identity.

A key in cryptography is a piece of information, usually a string of numbers or letters that are stored in a file, which, when processed through a cryptographic algorithm, can encode or decode cryptographic data. Based on the used method, the key can be different sizes and varieties, but in all cases, the strength of the encryption relies on the security of the key being maintained. A key's security strength is dependent on its algorithm, the size of the key, the generation of the key, and the process of key exchange.

In cryptography, a salt is random data fed as an additional input to a one-way function that hashes data, a password or passphrase. Salting helps defend against attacks that use precomputed tables, by vastly growing the size of table needed for a successful attack. It also helps protect passwords that occur multiple times in a database, as a new salt is used for each password instance. Additionally, salting does not place any burden on users.

In cryptography, a password-authenticated key agreement method is an interactive method for two or more parties to establish cryptographic keys based on one or more party's knowledge of a password.

In software development, time-of-check to time-of-use is a class of software bugs caused by a race condition involving the checking of the state of a part of a system and the use of the results of that check.

<span class="mw-page-title-main">Network on a chip</span> Electronic communication subsystem on an integrated circuit

A network on a chip or network-on-chip is a network-based communications subsystem on an integrated circuit ("microchip"), most typically between modules in a system on a chip (SoC). The modules on the IC are typically semiconductor IP cores schematizing various functions of the computer system, and are designed to be modular in the sense of network science. The network on chip is a router-based packet switching network between SoC modules.

A password manager is a computer program that allows users to store and manage their passwords for local applications or online services such as web applications, online shops or social media.

<span class="mw-page-title-main">KWallet</span> Password manager

KDE Wallet Manager (KWallet) is free and open-source password management software written in C++ for UNIX-style operating systems. KDE Wallet Manager runs on a Linux-based OS and Its main feature is storing encrypted passwords in KDE Wallets. The main feature of KDE wallet manager (KWallet) is to collect user's credentials such as passwords or IDs and encrypt them through Blowfish symmetric block cipher algorithm or GNU Privacy Guard encryption.

Dashlane is a subscription-based password manager and digital wallet application available on macOS, Windows, iOS and Android. Dashlane uses a freemium pricing model with a subscription plan option.

Keeper Security, Inc. (Keeper) is a provider of zero-knowledge security and encryption software covering password management, secrets management, connection management, privileged access management, dark web monitoring, digital file storage, and encrypted messaging, among other offerings. 

<span class="mw-page-title-main">Librem</span> Computer line by Purism featuring free software

Librem is a line of computers manufactured by Purism, SPC featuring free (libre) software. The laptop line is designed to protect privacy and freedom by providing no non-free (proprietary) software in the operating system or kernel, avoiding the Intel Active Management Technology, and gradually freeing and securing firmware. Librem laptops feature hardware kill switches for the microphone, webcam, Bluetooth and Wi-Fi.

<span class="mw-page-title-main">Bitwarden</span> Open-source password manager

Bitwarden is a freemium open-source password management service that stores sensitive information such as website credentials in an encrypted vault. The platform offers a variety of client applications including a web interface, desktop applications, browser extensions, mobile apps, and a command-line interface. Bitwarden offers a free US or European cloud-hosted service as well as the ability to self-host.

<span class="mw-page-title-main">Mark Tehranipoor</span>

Mark M. Tehranipoor is an Iranian American academic researcher specializing in hardware security and trust, electronics supply chain security, IoT security, and reliable and testable VLSI design. He is the Intel Charles E. Young Preeminence Endowed Professor in Cybersecurity at the University of Florida and serves as the Director of the Florida Institute for Cybersecurity Research. Since June 2022, he has served as the chair of the Department of Electrical and Computer Engineering at the University of Florida. He is a fellow of IEEE, ACM, and NAI as well as a Golden Core member of the IEEE. He is a co-founder of the International Symposium on Hardware Oriented Security and Trust (HOST). Tehranipoor also serves as a co-director of the Air Force Office of Scientific Research CYAN and MEST Centers of Excellence.

<span class="mw-page-title-main">Budi Gunawan</span> Chief of Indonesian intelligence since 2016

Police-General (Ret.)Budi Gunawan is an Indonesian police officer who is the Chief of the Indonesian State Intelligence Agency (BIN) since September 9, 2016, and is also the General Chairman of the Indonesian E-Sports Executive Board. He previously served as Deputy Chief of Indonesian National Police accompanying National Police Chief Badrodin Haiti and Tito Karnavian. He is the second member of the police after Sutanto to lead the State Intelligence Agency.

The Unified Font Object (UFO) is an XML-based source file format for digital fonts. It was created by Tal Leming, Just van Rossum and Erik van Blokland. Contributors to the format also include Ben Kiel and Frederik Berlaen. According to its creators, the UFO is a "future proof" open format that is designed to be "application independent", "human readable and human editable".

<span class="mw-page-title-main">TR-CERT</span>

TR-CERT is an organization within the Information and Communication Technologies Authority (ICTA) which is the national regulatory authority of the Turkish electronic communication sector. It is responsible for the analysis and risk mitigation of large-scale cyber threats and vulnerabilities, communicating information regarding malicious cyber activities or possible vulnerabilities to computer security incident response teams (CSIRT) and the public.

NordPass is a proprietary password manager launched in 2019. It is meant to help its users to organise their passwords and secure notes, keeping them in a single place — an encrypted password vault. This service comes in both free and premium versions, though the free version lacks much of the paid functionality like multi-device login.

CalyxOS is an operating system for smartphones based on Android with mostly free and open-source software. It is produced by the Calyx Institute as part of its mission to "defend online privacy, security and accessibility."

<span class="mw-page-title-main">National Cyber and Crypto Agency</span> Intelligence agency

National Cyber and Crypto Agency, is Indonesia's primary signal intelligence agency, as well as cyber intelligence, cyber threat intelligence, cyber defense, and cyber security agency.

References

  1. Riley, Sean (28 February 2022). "RoboForm password manager review". Tom's Guide . Retrieved 20 December 2022.
  2. 1 2 Broida, Rick (13 July 2011). "Still Awesome After All These Years: Eight Excellent Free Downloads". PCWorld . Archived from the original on 21 December 2022. Retrieved 21 December 2022.
  3. Kurland, Scott (2009). The Windough sweepstakes system. [Lexington, KY]: [CreateSpace]. p. 59. ISBN   978-1-4486-2953-4. OCLC   773291840.{{cite book}}: CS1 maint: date and year (link)
  4. 1 2 Rusen, Ciprian Adrian (2022). Windows 11 all-in-one. Hoboken, NJ. pp. 748–749. ISBN   978-1-119-85869-0. OCLC   1290211028.{{cite book}}: CS1 maint: date and year (link) CS1 maint: location missing publisher (link)
  5. 1 2 Kissell, Joe (2021). Take control of your passwords (3rd ed.). San Diego, CA. ISBN   978-1-947282-18-6. OCLC   1028639864.{{cite book}}: CS1 maint: date and year (link) CS1 maint: location missing publisher (link)
  6. 1 2 Rubenking, Neil; Key, Kim (9 February 2022). "RoboForm Everywhere Review". PC Mag . Archived from the original on 21 December 2022. Retrieved 21 December 2022.
  7. "Siber Systems Inc". The Open Database of the Corporate World. Archived from the original on 21 December 2022. Retrieved 21 December 2022.
  8. Garver, Rob (9 August 2005). "From Russia with Capital". NJBIZ. Archived from the original on 21 December 2022. Retrieved 21 December 2022.
  9. 1 2 "Should I Remove programs by Siber Systems". Should I Remove It? . Retrieved 20 December 2022.
  10. Gray, Joshua; Franqueira, Virginia N. L.; Yu, Yijun (2016). "Forensically-Sound Analysis of Security Risks of Using Local Password Managers" (PDF). 2016 IEEE 24th International Requirements Engineering Conference Workshops (REW) (PDF). Beijing, China: IEEE. pp. 114–121. doi:10.1109/REW.2016.034. ISBN   978-1-5090-3694-3. S2CID   15971740.
  11. Security protocols : 11th international workshop, Cambridge, UK, April 2-4, 2003 : revised selected papers. Bruce Christianson. Berlin: Springer. 2005. ISBN   978-3-540-31836-1. OCLC   262681819.{{cite book}}: CS1 maint: others (link)
  12. Denise Bertacchi (10 May 2022). "RoboForm Review: Form Master Turned Security Pro". Tom's Hardware . Archived from the original on 21 December 2022. Retrieved 21 December 2022.