Tech
These are the Password Managers You Should Use Instead of Your Browser

Setting up and migrating to Dashlane from another password manager is simple, and you’ll use a secret key to encrypt your passwords, much like BitWarden’s setup process. In practice, Dashlane is very similar to the others on this list. Dashlane offers a 30-day free trial, so you can test it out before committing.
After signing up, download the app for Android and iOS, and grab the browser extensions for Firefox, Chrome, and Edge.
Best for Bundled Services
You might know Nord better for its VPN service, but the company also offers a password manager, NordPass, and a pretty nice online storage system, NordLocker. A part of the appeal of NordPass comes in bundling it with the company’s other services for some compelling deals. As a password manager, NordPass offers everything you need. It uses a zero-knowledge setup in which all data is encrypted on your device before it’s uploaded to the company’s servers. Unlike most services here, NordPass uses XChaCha20 for encryption. It would require a deep dive into cryptography to get into the differences, but the short story is that it’s just as secure and maybe slightly faster than the AES-256 encryption used by other services.
There’s a personal information storage feature to keep your address, phone number, and other personal data safe and secure, but easy to access. NordPass also offers an emergency access feature, which allows you to grant another NordPass user emergency access to your vault. It works just like the same feature in 1Password, allowing trusted friends or family to access your account if you cannot.
Other nice features include support for two-factor authentication to sign in to your account, as well as security tools to evaluate the strength of your passwords and alert you if any of your data is compromised. Note that NordPass Premium is theoretically $3 a month, but there are always sales that bring that much lower.
The downside, and my one gripe about all Nord services, is that there is no monthly plan. As noted above, the best deal comes in combining NordPass, NordVPN, and NordLocker for a bundled deal. A free version of NordPass is available, but it’s restricted to only a single device.
After signing up, download the app for Android and iOS, and grab the browser extensions for Firefox, Chrome, and Edge.
Best DIY Options (Self-Hosted)
Want to retain more control over your data in the cloud? Sync your password vault yourself. The services below do not store any of your data on their servers. This means attackers have nothing to target. Instead of storing your passwords, these services use a local vault to store your data, and then you can sync that vault using a file-syncing service like Dropbox, NextCloud, or Edward Snowden’s recommended service, SpiderOak. There are two services to keep track of in this scenario, making it a little more complex. But if you’re already using a file-syncing file service, this can be a good option.
You can also properly host your own vault with network-attached storage or a local server.
Enpass does not store any data on its servers. Syncing is handled through third-party services. Enpass doesn’t do the syncing, but it does offer apps on every platform. That means once you have syncing set up, it works just like any other service. And you don’t have to worry about Enpass being hacked, because your data isn’t on its servers. Enpass supports syncing through Dropbox, Google Drive, OneDrive, iCloud, Box, Nextcloud, or any service using WebDAV. Alas, SpiderOak is not currently supported. You can also synchronize your data over a local WLAN or Wi-Fi network.
All of the features you expect in a password manager are here, including auto-generating passwords, breach-monitoring, biometric login (for devices that support it), auto-filling passwords, and options to store other types of data, like credit cards and identification data. There’s also a password audit feature to highlight any weak or duplicate passwords in your vault. One extra I particularly like is the ability to tag passwords for easier searching. Enpass also makes setting up the syncing through the service of your choice very easy. Enpass added support for passkeys, too.
Tech
New non-volatile memory platform built with covalent organic frameworks

Researchers at Institute of Science Tokyo have created a new material platform for non-volatile memories using covalent organic frameworks (COFs), which are crystalline solids with high thermal stability. The researchers successfully installed electric-field-responsive dipolar rotors into COFs.
Due to the unique structure of the COFs, the dipolar rotors can flip in response to an electric field without being hampered by a steric hindrance from the surroundings, and their orientation can be held at ambient temperature for a long time, which are necessary conditions for non-volatile memories. The study is published in the Journal of the American Chemical Society.
Humans have made great efforts to record information by inventing recording media such as clay, paper, compact disks, and semiconductor memories. As the physical entity that holds information—such as indentations, characters, pits, or transistors—becomes smaller and its areal density becomes higher, the information is stored with higher density. In rewritable memories, the class called “non-volatile memories” are suitable for storing data for a long time, such as for days and years.
Recently, molecular technology has evolved. One class of molecular technology consists of molecules that exhibit mechanical motions. They are called “molecular machines” or “nanomachines.” If a mechanical entity rotates or flips around a chemical bond, which serves as an axis, the material class is particularly called “molecular rotors.”
Use of molecular rotors to store information may cause a breakthrough. This is because the size of molecules is a few orders of magnitude smaller than the sizes of pits in a compact disk and transistors in semiconductor memories, and organic molecules are inherently highly designable. Although applications using molecular machines have been explored extensively, the attempts to develop non-volatile memories have been scarce, mainly because the simultaneous satisfaction of the following three requisites has been so challenging.
- To control the orientation of molecular rotors with an electric field, the rotors have to have a dipole—a spatial displacement of a positive charge and a negative charge necessary to gain a force from the applied electric field.
- The rotors must not flip at ambient temperatures so that their orientations are held for a long period.
- There must be adequate spaces around the rotors so that they can flip without being hampered by the steric hindrance that may be caused by the tight packing of the molecules in the solid phase. Additionally, the substance has to be heat durable up to the temperatures current computational components ordinarily undergo, which is often up to 150°C.
New materials developed by the researchers of Institute of Science Tokyo have achieved these three requisites simultaneously, with very high thermal durability up to near 400°C. By demonstrating these novelties for the first time, the researchers have created a material foundation for molecular-machine-based non-volatile memories that potentially store information at higher density than current technologies.
The researchers selected covalent organic frameworks (COFs) as a platform for the aim. COFs are an emerging class of crystalline solids formed by periodically connecting two kinds of building block molecules by covalent bonds. For one building block, they chose a tetrahedral, four-handed molecule. For the other building block, they newly developed a flat, three-handed molecule in which three dipolar rotors (1,2-difluorophenyl, DFP) and three aryl groups are alternately positioned around the central benzene ring.
Previously, these aryl groups were shown to suppress the flip of the DFP rotors at ambient temperatures in a toluene solution, which satisfied requisites 1 and 2 above, but the high density of the molecular solid sterically hindered the flip of the rotors in the solid phase, which could not satisfy requisite 3.
Interestingly, the COFs they developed exhibited an unprecedented shape dimorphism, in which the COFs grew to a hexagonal prism shape or a membrane shape, depending on the solvent composition used for the growth. Furthermore, from X-ray structural analyses, these new COFs turned out to have an unprecedented sln topology, which has a low density inherently and has not been reported for COFs.
“Due to the substantially low density of about 0.2 g/cm3 caused by the unique sln topology possessed by the COFs, the dipole rotors incorporated into the periodic network constituting the COFs have adequate spaces around them, allowing them to flip without suffering from the steric hindrance from their surroundings.
“This is a breakthrough, because our COFs are a rare solid in which dipolar rotors can flip when they are brought to elevated temperatures above 200°C or undergo sufficiently strong electric fields, but their orientations can be held for a long time at ambient temperatures. These uniquenesses have been realized by our careful selection of the building block molecules to create the COFs for this aim,” says Professor Yoichi Murakami, the leader of this project.
Additionally, Murakami pointed out the significance of the work also exists in the extension of the diversity of COFs by their discoveries of sln topology and shape dimorphism, both of which were unknown for COFs previously.
These COF-based solids may be a new platform for storing information with further higher density after proper scale-up and device demonstration are made subsequently.
More information:
Xiaohan Wang et al, sln-Topological Covalent Organic Frameworks with Shape Dimorphism and Dipolar Rotors, Journal of the American Chemical Society (2025). DOI: 10.1021/jacs.5c10010
Citation:
New non-volatile memory platform built with covalent organic frameworks (2025, September 5)
retrieved 5 September 2025
from https://techxplore.com/news/2025-09-volatile-memory-platform-built-covalent.html
This document is subject to copyright. Apart from any fair dealing for the purpose of private study or research, no
part may be reproduced without the written permission. The content is provided for information purposes only.
Tech
‘People Are So Proud of This’: How River and Lake Water Is Cooling Buildings

“In the old days, it was more like a luxury project,” says Deo de Klerk, team lead for heating and cooling solutions at the Dutch energy firm Eneco. Today, his company’s clients increasingly ask for district cooling as well as district heating systems. Eneco has 33 heating and cooling projects under construction. In Rotterdam, Netherlands, one of the company’s installations helps to cool buildings, including apartment blocks, police offices, a theater and restaurants, using water from the River Meuse.
It’s not hard to see why cooling technologies are getting more popular. A few years ago, Nayral moved out of Paris. She remembers the heat waves. “My routine during the weekend was to go to the parks,” she says. Nayral would sit there well into the evening—reading Les Misérables, no less—waiting for her apartment to cool down. Recently, she has increasingly found herself spending time in shopping malls, where air-conditioning is plentiful, in order to make it through searing hot French summers. This year, unprecedented heat waves hit France and other countries in Europe.
The city of Paris is now desperate to help its denizens find cool refuges during spells of extreme heat. A key component of Parisian climate adaptation plans is the river-supplied cooling network, the pipes for which currently cover a distance of 100 kilometers, though this is due to expand to 245 km by 2042. While around 800 buildings are served by the network today, those in charge aim to supply 3,000 buildings by that future date.
Systems such as Paris’ do not pump river water around properties. Rather, a loop of pipework brings river water into facilities where it soaks up warmth from a separate, closed loop of water that connects to buildings. That heat transfer is possible thanks to devices called heat exchangers. When cooled water in the separate loop later arrives at buildings, more heat exchangers allow it to cool down fluid in pipes that feed air-conditioning devices in individual rooms. Essentially, heat from, say, a packed conference room or tourist-filled art gallery is gradually transferred—pipe by pipe—to a river or lake.
The efficiency of Paris’ system varies throughout the year, but even at the height of summer, when the Seine is warm, the coefficient of performance (COP)—how many kilowatt-hours of cooling energy you get for every kilowatt-hour of electricity consumed by the system—does not dip much below 4. In the winter, when offices, museums, and hospitals still require some air-conditioning, the COP can be as high as 15, much higher than conventional air-conditioning systems. “It is absolutely magnificent,” boasts Nayral.
But those summer temperatures are increasingly a concern. This summer, the Seine briefly exceeded 27 degrees Celsius (81 degrees Fahrenheit), says Nayral. How can that cool anything? The answer is chiller devices, which help to provide additional cooling for the water that circulates around buildings. Instead of blowing out hot air, those devices can expel their heat into the Seine via the river loop. The opportunity to keep doing this is narrowing, though—because Fraîcheur de Paris is not allowed to return water to the Seine at temperatures above 30 degrees Celsius, for environmental reasons. At present, that means the river can accommodate only a few additional degrees of heat on the hottest days. Future, stronger heat waves could evaporate more of that overhead.
Tech
SLA promises, security realities: Navigating the shared responsibility gap | Computer Weekly

The shared responsibility model (SRM) plays a central role in defining how security and operational duties are split between cloud providers and their customers. However, when this model intersects with service level agreements (SLAs), it introduces layers of complexity.
SLAs typically cover metrics like uptime, support response times and service performance, but often overlook critical elements such as data protection, breach response and regulatory compliance. This creates a responsibility gap, where assumptions about who is accountable can lead to serious blind spots. For instance, a customer might assume that the cloud provider’s SLA guarantees data protection, only to realise that their own misconfigurations or weak identity management practices have led to a data breach.
Organisations may mistakenly believe their provider handles more than it does, increasing the risk of non-compliance, security incidents and operational disruptions. Understanding the nuances between SLA commitments and shared security responsibilities is vital to safely leveraging cloud services without undermining resilience or regulatory obligations.
The reality of the SRM and SLAs
The SRM fundamentally shapes the scope and impact of SLAs in cloud environments. Let’s quickly understand the reality of cloud providers’ SRM.
- Cloud providers secure the infrastructure they manage; you ensure what you deploy.
- Customers are responsible for data, configurations, identities and applications.
- Cloud providers often cite the model to deflect blame during breaches.
- Customers must secure the stack themselves, as cloud doesn’t equal safe-by-default -visibility, policy and controls are still on you.
While an SLA guarantees the cloud provider’s commitment to “the security of the cloud”, ensuring the underlying infrastructure’s uptime, resilience and core security, it explicitly does not cover the customer’s responsibilities for “security in the cloud.” This means that even if a provider’s SLA promises 99.99% uptime for their infrastructure, a customer’s misconfigurations, weak identity management or unpatched applications (all part of their responsibility) can still lead to data breaches or service outages, effectively nullifying the perceived security and uptime benefits of the provider’s SLA. Therefore, the SRM directly impacts the adequate security and availability experienced by the enterprise, making diligent customer-side security practices crucial for realising the full value of any cloud SLA.
Several controls should be a part of a comprehensive approach to gaining access to innovative cloud technology while safeguarding your enterprise:
- Due diligence, gap analysis and risk quantification: Conduct an exhaustive review of the cloud provider’s security posture beyond just the SLA. Request and scrutinise security whitepapers, independent audit reports (eg FedRAMP, SOC 2 Type 2, ISO 27001) and penetration test summaries. Perform a detailed risk assessment that quantifies the potential impact of any SLA shortfalls on your business operations, data privacy and regulatory obligations. Understand precisely where the provider’s “security of the cloud” ends and your “security in the cloud” responsibilities begin, especially concerning data encryption, access controls and incident response.
- Strategic contract negotiation and custom clauses: Engage in direct negotiation with the cloud provider to tailor the SLA to your infrastructure requirements. For significant contracts, cloud providers should be willing to include custom clauses addressing critical security commitments, data handling procedures, incident notification timelines and audit rights that exceed their standard offerings. Ensure the contract includes indemnification clauses for data breaches or service disruptions directly attributable to the provider’s security failures, and clearly define data portability and destruction protocols for an effective exit strategy.
- Implement robust layered security (defence-in-depth): Recognise that the shared responsibility model necessitates your active participation. In addition to the provider’s native offerings, implement additional security controls covering, among others, identity and access management (IAM), cloud security posture management (CSPM), cloud workload protection (CWP), data loss prevention (DLP) and zero trust network access (ZTNA).
- Enhanced security monitoring and integration: Integrate the cloud service’s logs and security telemetry into your enterprise’s security information and event management (SIEM) and security orchestration, automation and response (SOAR) platforms. This centralised visibility and correlation capability allows your security operations centre (SOC) to detect, analyse and respond to threats across both your on-premises and cloud environments, bridging any potential gaps left by the provider’s default monitoring.
- Proactive governance, risk and compliance (GRC): Update your internal security policies and procedures to explicitly account for the new cloud service and its specific risk profile. Map the provider’s security controls and your compensating controls directly to relevant regulatory requirements (eg GDPR, HIPAA, PCI DSS). Maintain meticulous documentation of your risk assessments, mitigation strategies and any formal risk acceptance decisions.
By adopting these strategies, IT and IT security leaders can confidently embrace innovative cloud technologies, minimising inherent risks and ensuring a strong compliance posture, even when faced with SLAs that don’t initially meet every desired criterion.
The bottom line
Make sure to follow the principle “own your security posture” by implementing customised security policies and not relying solely on your cloud provider. Treat security as a core component of your infrastructure and not an add-on. Adopt and deploy unified controls to align security strategies across all environments to strengthen defences against the expanding threat landscape, thereby reducing risk and boosting resilience. Shared responsibility doesn’t mean shared blame, it means shared diligence.
Aditya K Sood is vice president of security engineering and AI strategy at Aryaka.
-
Tech1 week ago
Top CDC Officials Resign After Director Is Pushed Out
-
Sports1 week ago
Dolphins GM Chris Grier says fans threatened his family in string of vile emails after team’s lackluster year
-
Entertainment1 week ago
YouTube TV viewers could lose access to Fox channels over contract dispute
-
Tech1 week ago
Real-time technique directly images material failure in 3D to improve nuclear reactor safety and longevity
-
Tech1 week ago
Manufacturas Eliot boosts digital shift with Coats Digital’s VisionPLM
-
Tech7 days ago
SSA Whistleblower’s Resignation Email Mysteriously Disappeared From Inboxes
-
Sports1 week ago
Graziano: Don’t be surprised if these 32 things happen, from an MVP run to rookies who could star
-
Entertainment1 week ago
Sabrina Carpenter gives insight into her new music and viral debate over album cover