Hello,
After the recent breaches to some cloud password managers, I was wondering how strong security against brute-forcing master password is applied in Buttercup and noticed that it wasn't bad until you've weakened it in favor of better performance few years ago (https://github.com/buttercup/buttercup-core/blob/master/source/env/core/constants.ts)
I'd like to request changing the value back to some safer values or making it user configurable.
According to the latest OWASP recommendations it should be set to 600k iterations, compromise number 200-300k should bring enough protection even to weak passwords. OWASP reference: https://cheatsheetseries.owasp.org/cheatsheets/Password_Storage_Cheat_Sheet.html#pbkdf2
Until the change is effective user shall be encouraged to use longer and more complex passwords or use Diceware approach to the master password.
Thank you
PS: As the current number of iterations is low, I wanted to at least change the master password to something stronger but there
is missing the master password change option in the UI :) buttercup/buttercup-desktop#1046