

- #QUICKEN FOR MAC 2017 WHERE MY QDF FILE IS LOCATED HOW TO#
- #QUICKEN FOR MAC 2017 WHERE MY QDF FILE IS LOCATED PASSWORD#
To date, we have seen no incidents where Quicken customer data has been compromised.
#QUICKEN FOR MAC 2017 WHERE MY QDF FILE IS LOCATED PASSWORD#
Here is Intuit's initial response to my post: As the report noted, Quicken already has very strong password protection.

#QUICKEN FOR MAC 2017 WHERE MY QDF FILE IS LOCATED HOW TO#
And from 2 to 6 weeks (hard to say more exactly) understanding all the details of Quicken encryption (what particular data is encrypted, how the key is modified after encrypting every next block, where are the checksums and auxilary flags in data headers and how to set them etc) - it was really troublesome. We have also spend (in total) about two weeks in preparing the data, merging the results (intermediate data collected on workstations) and some other work. It took only about three weeks on 10 to 15 computers, and we could make it even faster - some of the computers were uptime only at non-working hours (at nights), and only a few were realy fast (dual-core). Here's what Elcomsoft's CEO Vladimir Katalov had to say about cracking the 512-bit encryption scheme: Well, nowadays, 512-key is crackable in a very reasonable time. My colleague Gregg Keizer has posted a news story with more details. [ UPDATE: Since posting this yesterday, I have heard briefly from both Elcomsoft and Intuit. If and when they do, I'll post their response here. What does Intuit have to say? Nothing yet - they haven't gotten back to me. Unfortunately, the existence of such a backdoor and escrow key creates a vulnerability that might leave millions of Quicken users worldwide with compromised bank account data, credit card numbers, and income information.Įlcomsoft says it has reported this vulnerability to US CERT. Perhaps Intuit included the Quicken backdoor to make it possible for the United States Internal Revenue Service (IRS), FBI, CIA, or other law-enforcement and forensics organizations to use an "escrow key" to gain entry into password-protected Quicken files. "Elcomsoft, a respected leader in the crypto community, needed to use its advanced decryption technology to uncover Intuit's undocumented and well-hidden backdoor, and to successfully perform a factorization of their 512-bit RSA key." "It is very unlikely that a casual hacker could have broken into Quicken's password protection regimen," said Vladimir Katalov, Elcomsoft's CEO. Before Elcomsoft's discovery of Intuit's backdoor, Intuit was the only organization that could unlock their customers' files. To deliver this service, Intuit uses a 512-bit RSA key known only to Intuit. According to Elcomsoft: This backdoor allows Intuit to offer their own affordable service whereby Intuit will unlock a customer's file.
