Sticky Password Manager & Safe (Android / Google Play)

175x175bb (18)

This application is available for Android. This app is the oldest and is designed to be a powerful password manager developed by Lamantine Software. The latest build was released on April 27, 2017. Our latest check was performed on Oct 7th, 2016.

Findings Summary

Our examination revealed total 15 items, where were 7 DAR items and 8 DIT items found. Among DAR items were found 0 worst items, 7 bad items, 0 good items, and 0 best items. Among DIT items were found 0 worst items, 0 bad items, 7 good items, and 1 best item.

Below you find 3 infographics summarizing what we described above. Each image provides information about both DAR and DIT items.

 

 

 

This slideshow requires JavaScript.


Everything presented below is related to well-known CWEs, such as Sensitive data leakage [CWE-200], Unsafe sensitive data storage [CWE-312], Unsafe sensitive data transmission [CWE-319]. You can read more about it here.

Now let’s go deeper and examine each data item’s protection level.

 

Application Description

Let’s cite the description of this application below:

Sticky Password is a powerful yet simple free password manager and secure digital vault for your phones and tablets as well as other desktop and mobile devices. Manage passwords easily and securely and access them on the fly when and where you need them. Sticky Password enables you to login into any website automatically.
Password protection is about trust and the cloud based solutions especially. That is why Sticky Password has been built by security industry leading team that brought and maintains security in check for some of the largest and most popular Antivirus solutions. Sticky Password manager for Android brings some revolutionary ideas, along with unquestionable security for all your sensitive data – which you can synchronize simply and securely through our cloud servers or via local Wi-Fi to any device of your choosing.
Notes on using Sticky Password for Android

  • So as to enjoy full synchronization features, creating of a valid StickyAccount during the first run wizard is required
  • The use of the App is free, and the cloud backup and synchro features included in Sticky Password Premium are 19,99USD per 1-user/1-year

General

  • Your data is always encrypted and only your Master Password known to you exclusively can unlock it!
  • There is never any access to your data by our team – all passwords are being encrypted locally on your device
  • AES-256 highest possible military grade encryption
  • Biometric authentication – fingerprint scanning: identity verification of the account holder can be made with just one swipe of a finger on Android phones and tablets that are equipped with fingerprint scanners.
  • Ability to speed up the unlocking also by adding a PIN protection instead of entering of the Master Password during one sessio
  • Full control over what device to synchronize to via web Sticky Account
  • Set preferences when and how you want to synchronize your database (online or offline)

Manage Web Accounts

  • All your passwords and logins in one password safe available to you only
  • Mozilla Firefox, Dolphin and UCWeb browsers are supported to directly log into your websites using the auto-fill function

Bookmarks
Have the same bookmark anywhere, no matter your favorite browser, no matter the device!
Identities
Store your personal information such as addresses, names, phone numbers, IDs, credit card numbers, PINs and many more in the same, AES-256 encrypted database and use Sticky Password as a safe digital wallet.
Secure Memos
Sticky Password is so much more than a password vault and form filler. The amount of data that you decide to protect is nearly limitless. Any note or personal information can be stored, encrypted, safely synchronized to other devices using Secure Memos.
Supported languages

  • English
  • German
  • French
  • Czech
  • Russian
  • Japanese
  • Ukrainian

Important links

 

Protection levels.

Locally stored data (Data-at-Rest, DAR).

Locally stored data groups include Credentials Information, Application Information, Device Information, Analytics ‘n’ Ads Information.
The average DAR value is 3.50 points (7.00 points of system protection and 0.00 points of own protection). It equals to a typical value (3.5 points, where’s 7 points of system protection and 0 points of own protection).

Items with average value 3.50 points (7 points of system protection, 0 points of own protection) means data protection levels have following definitions. Frankly talking, extra data found that shouldn’t be accessed where system protection level means – root/jailbreak is required but not possible without wiping device data, and own protection level means – stored as is.

– Credentials Sync Data (‘Credentials Information’ Group) – Information about your credentials including credentials plus additional info about linked services. This data item related to mentioned group meant to be any types of credentials including basic (IDs only), passwords, tokens, etc.,

– Application Configs (‘Application Information’ Group) – Different configuration files created by your app, perhaps app permissions. This data item related to mentioned group meant to be any info related to the app, app settings, including installed apps or installers,

– Credentials (Tokens) (‘Credentials Information’ Group) – Different tokens used to get access to your account, except for passwords but including app or 3rd party tokens, secret keys, etc. (usually give full access to your account). This data item related to mentioned group meant to be any types of credentials including basic (IDs only), passwords, tokens, etc.,

– Credentials (IDs) (‘Credentials Information’ Group) – Only account IDs like app or 3rd party user IDs including emails, phone number, usernames, etc. (depends on apps). This data item related to mentioned group meant to be any types of credentials including basic (IDs only), passwords, tokens, etc.,

– Device Data (‘Device Information’ Group) – Device ID, Device Name, Device OS Name and Version, and jailbroken/root status. This data item related to mentioned group meant to be details about your device,

– Environment (‘Device Information’ Group) – Different info about the environment of the device including apps lists, device info, OS name and versions, updates, a list of users, network details, etc. This data item related to mentioned group meant to be details about your device,

– Device Data (‘Analytics ‘n’ Ads Information’ Group) – Device ID, Device Name, Device OS Name and Version, and jailbroken/root status. This data item related to mentioned group meant to be any info related to analytics services like Flurry, Google Analytics, etc. or advertisements

Keep in mind if you’re using some Android devices such Samsung, LG or another device with an unlocked or non-locked loader that allow rooting your device without user action, the system level equals 6 points instead of 7. It means your data can be stolen without involving your actions.

Transferred data (Data-in-Transit, DIT).

Transferred data groups include Credentials Information, Application BaaS Information, Device Information, Account Information.
The average DIT value is 5.25 points (6.00 points of system protection and 4.50 points of own protection). It is higher than a typical value (4 points, where’s 4 points of system protection and 4 points of own protection).

Items’ GROUP #1 with average value 5.00 points (6 points of system protection, 4 points of own protection) means data protection levels have following definitions. Frankly talking, data is not available all the time or partially accessed where system protection level means – MITM prevented or fake certificate importing prevented, but plaintext non-protected traffic is intercepted, and own protection level means – bypassed by fake/stolen root certificates.

– Credentials (IDs) (‘Credentials Information’ Group) – Only account IDs like app or 3rd party user IDs including emails, phone number, usernames, etc. (depends on apps). This data item related to mentioned group meant to be any types of credentials including basic (IDs only), passwords, tokens, etc.,

– Credentials (Passwords) (‘Credentials Information’ Group) – Well-known passwords or PINs you’re using to get access to your account (usually it is worse than tokens because it gives full access to your account). This data item related to mentioned group meant to be any types of credentials including basic (IDs only), passwords, tokens, etc.,

– Credentials (Tokens) (‘Credentials Information’ Group) – Different tokens used to get access to your account, except for passwords but including app or 3rd party tokens, secret keys, etc. (usually give full access to your account). This data item related to mentioned group meant to be any types of credentials including basic (IDs only), passwords, tokens, etc.,

– Device Data (‘Credentials Information’ Group) – Device ID, Device Name, Device OS Name and Version, and jailbroken/root status. This data item related to mentioned group meant to be any types of credentials including basic (IDs only), passwords, tokens, etc.,

– Encryption Key (‘Application BaaS Information’ Group) – Encryption key found in app data folders, traffic or code of app used to protect your data. This data item related to mentioned group meant to be any info related to baas (backend) app storage, such as files, credentials, configs, and so on,

– Device Data (‘Device Information’ Group) – Device ID, Device Name, Device OS Name and Version, and jailbroken/root status. This data item related to mentioned group meant to be details about your device,

– License Details (‘Account Information’ Group) – Any license details including keys, values, etc. This data item related to mentioned group meant to be any info related to profiles, basic credential IDs like email or username or phone number plus some more info depends on applications

Items’ GROUP #2 with average value 7.00 points (6 points of system protection, 8 points of own protection) means data protection levels have following definitions. Frankly talking, compliance but there are publicly known techniques to access the data including forensics one where system protection level means – MITM prevented or fake certificate importing prevented, but plaintext non-protected traffic is intercepted, and own protection level means – own vpn or own crypto but compliance.

– Credentials Sync Data (‘Credentials Information’ Group) – Information about your credentials including credentials plus additional info about linked services. This data item related to mentioned group meant to be any types of credentials including basic (IDs only), passwords, tokens, etc.

Keep in mind if you’re using out-of-date Android < 7.0, the system level equals 4 points instead of 6. It means your data can be stolen with a crafted preinstalled certificate on the device or if someone makes you install a certificate. Also, if you’re using out-of-date Android < 5.0, the system level equals 2 points instead of 4. It means your data can be stolen without involving your actions.

Privacy Policy

Full application privacy policy is available here.

You may find privacy policy details proceeding the link above to compare developer’s vision on data protection with our results.