How to Export Your Viber Chat History

Need to save a record of your Viber chats? It’s easy! Just follow these simple steps to export your messages:

  1. Open Viber on your mobile device.
  2. Go to More (usually found in the bottom-right corner).
  3. Click on Settings.
  4. Tap Calls and Messages.
  5. Select Email message history.

Alternatively, you can open this link directly from your mobile device:

viber://more/email_message_history_on

This action will allow you to save a zip file with all your conversations, which you can later share using other conventional methods.

Please note that the export file will only contain text messages and no media (photos, videos, etc.). If you need to save media, you’ll have to back those up separately.

That’s it! Your chat history will be emailed to the address you choose, and you can keep it safely stored for future reference.

An illustration for a logo that embodies a team of Cypriot ethical hackers, incorporating a sleek, modern shield with a stylized silhouette of Cyprus in the center. The shield is adorned with digital accents like a binary code halo and a keyboard pattern. The acronym 'CEH' for 'Cypriot Ethical Hackers' is boldly positioned across the shield, with a cybernetic font, set against a background that hints at a digital network.

Can’t Find Google’s App Passwords Option? Here’s How to Access It Directly

Introduction

Setting up app passwords is essential when you use applications or devices that don’t support 2-Step Verification codes. However, many users have reported difficulty finding the option to create an app password in their Google accounts, even after enabling 2-Step Verification. If you’re facing this issue, don’t worry—you can access the App Passwords page directly through a specific URL.

Why Is the App Passwords Option Missing?

Google frequently updates its interface and security settings, sometimes making features like App Passwords harder to locate. Reasons you might not see the option include:

  • Interface Changes: Google may have relocated the feature in recent updates.
  • Account Restrictions: Some account types, like business or education accounts, may have administrator restrictions.
  • Incomplete Verification Setup: If 2-Step Verification isn’t fully set up, the App Passwords option might not appear.

Direct Access to App Passwords

If the App Passwords option is elusive, you can bypass the navigation hassle by visiting the page directly:

🔗 Access App Passwords Directly

Step-by-Step Guide to Generate an App Password

  1. Visit the Direct Link: Click on the link above or enter it into your browser’s address bar.
  2. Sign In: Log in to your Google account if you’re not already signed in.
  3. Verify with 2-Step Verification: You may be prompted to complete a verification step to confirm your identity.
  4. Navigate to App Passwords: You should now be on the App Passwords page.
  5. Select the App and Device:
  • Select App: From the dropdown menu, select the app for which you’re generating the password. Select Other (Custom name) and enter a name if it’s not listed.
  • Select Device: Choose the device you’re using.
  1. Generate Password: Click Generate to create a unique app password.
  2. Use the Password: You’ll receive a 16-character password. When prompted for your Google account password, enter this into the app or device.

Tips and Considerations

  • Security: Keep your app passwords secure. Treat them like your regular passwords.
  • One-Time Use: Typically, you only need to enter the app password once per app or device.
  • Revocation: If you lose a device or no longer use an app, revoke its app password from the same App Passwords page.

Conclusion

Finding the App Passwords option can be frustrating, but accessing it directly through https://myaccount.google.com/apppasswords is a simple solution. Always ensure that your 2-Step Verification is fully set up and that you follow Google’s security recommendations to keep your account safe.

A digital vector logo for a team of Cypriot ethical hackers, featuring a stylized knight's helmet to represent the chivalry of ethical hacking. The helmet is merged with digital elements like pixels and circuit lines. The colors of the Cyprus flag are subtly integrated into the design, with a lock icon as the knight's crest to symbolize protection and cybersecurity.

Fixing KeePassXC Snap Not Detecting YubiKey

If you’re using KeePassXC installed from Snap and notice it’s not recognizing your YubiKey, you’re not alone. Snap packages have strict sandboxing and confinement rules that often block access to hardware devices like USB, including YubiKeys. This can cause issues when using features like Challenge-Response authentication with your YubiKey in KeePassXC.

This blog post’ll cover multiple ways to solve this problem, including switching to a different installation method or adjusting the Snap confinement settings.

Why Doesn’t KeePassXC (Snap) See the YubiKey?

Snap packages are sandboxed, which is great for security but can be problematic for applications that need direct access to hardware like USB devices. This restriction prevents KeePassXC from communicating with your YubiKey, as it requires access to your USB ports and smart card services.

Let’s explore different solutions to fix this issue.


Solution 1: Install KeePassXC from the Official PPA (Recommended)

Installing KeePassXC using the official PPA (Personal Package Archive) is the best way to avoid the Snap sandbox restrictions. This version doesn’t have the same hardware access limitations as the Snap version and is more likely to work seamlessly with your YubiKey.

Steps to Install KeePassXC via PPA:

  1. Remove the Snap Version
    First, you’ll want to remove the Snap version of KeePassXC if it’s currently installed:
1
sudo snap remove keepassxc;
  1. Add the Official KeePassXC PPA
    Next, add the official KeePassXC PPA to your system and update your package list:
1
2
sudo add-apt-repository ppa:phoerious/keepassxc;
sudo apt-get update;
  1. Install KeePassXC from the PPA
    Now, install KeePassXC from the PPA:
1
sudo apt-get install keepassxc;

This method bypasses the limitations of Snap and ensures full hardware access to devices like the YubiKey. After installation, KeePassXC should immediately detect your YubiKey.


Solution 2: Adjust Snap Confinement to Allow Hardware Access

If you prefer to stick with the Snap version of KeePassXC, you can adjust its permissions to allow access to the necessary system interfaces.

To enable USB and PC/SC (smart card) support for KeePassXC Snap, run the following commands:

1
sudo snap connect keepassxc:raw-usb;

This command allows the Snap package to access the USB device and observe hardware resources.

After running the commands, restart KeePassXC:

1
snap restart keepassxc;

This should grant KeePassXC Snap access to the YubiKey via USB and PC/SC protocols.


Solution 3: Use Classic Confinement for Snap (Less Secure)

Snap packages have strict confinement modes by default, but you can loosen these restrictions by installing KeePassXC in classic confinement mode. This allows the application to access your system as if it were a regular app installed outside of Snap, without the sandbox limitations.

Steps to Install KeePassXC with Classic Confinement:

  1. Remove the Existing Snap Version
    If you already have the standard Snap version of KeePassXC installed, remove it:
1
sudo snap remove keepassxc;
  1. Install KeePassXC with Classic Confinement
    Now, reinstall KeePassXC with the --classic flag:
1
sudo snap install keepassxc --classic;

By using --classic, you’re bypassing the tight confinement, which means KeePassXC will be able to access hardware devices like the YubiKey without the sandbox restrictions.

Note: This approach compromises some of the security benefits provided by Snap’s confinement model, so only use this method if you need it for specific reasons.


Solution 4: Use Flatpak as an Alternative to Snap

If you’re facing persistent issues with the Snap version of KeePassXC and don’t want to use the PPA, you can try installing KeePassXC via Flatpak. Flatpak offers a more flexible and modern sandboxing approach, and it often has better hardware access capabilities compared to Snap.

Steps to Install KeePassXC via Flatpak:

  1. Install Flatpak (if not already installed)
    First, install Flatpak on your system if you don’t have it yet:
1
sudo apt-get install flatpak;
  1. Add the Flathub Repository
    Add the Flathub repository to your Flatpak sources:
1
flatpak remote-add --if-not-exists flathub https://flathub.org/repo/flathub.flatpakrepo;
  1. Install KeePassXC from Flathub
    Now install KeePassXC from the Flathub repository:
1
flatpak install flathub org.keepassxc.KeePassXC;

Flatpak applications typically have more flexible access to hardware, so your YubiKey should work without issues after switching to this version of KeePassXC.


Solution 5: Ensure pcscd Is Running

YubiKeys often rely on the PC/SC daemon (pcscd) for smart card operations. If the daemon is not running, KeePassXC won’t be able to detect the YubiKey even if all permissions are set correctly.

To install and start pcscd:

  1. Install pcscd:
1
sudo apt-get install pcscd;
  1. Start and enable the pcscd service:
1
2
sudo systemctl start pcscd;
sudo systemctl enable pcscd;

Ensure that pcscd is running and that your system recognizes the YubiKey through PC/SC.


Conclusion

The most reliable solution for getting KeePassXC to work with your YubiKey on Linux is to install KeePassXC from the official PPA. This eliminates the Snap confinement issues that often prevent hardware from being detected. Alternatively, adjusting Snap’s permissions or switching to Flatpak are also viable solutions.

Here’s a quick recap of the options:

  • PPA Installation (Recommended): Full access to hardware without Snap’s restrictions.
  • Snap Adjustments: Grant KeePassXC Snap permissions to access USB and PC/SC devices.
  • Classic Confinement: Loosen Snap restrictions (less secure).
  • Flatpak Installation: Another sandboxed app system, but with better hardware access.
  • Ensure pcscd is Running: Required for YubiKey smart card functionality.

With these solutions, you should be able to get KeePassXC and your YubiKey working together on your system.

Happy securing your passwords with YubiKey and KeePassXC!

A movie poster in the style of Pixar animation featuring the Lockheed SR-71 Blackbird. The aircraft is characterized with a friendly and brave face on the nose, cartoonish in nature, to fit the Pixar aesthetic. It's flying over a picturesque ocean with a sunset backdrop, casting a heroic shadow on the water below. The title of the movie is playfully written in the sky with contrails, and a supporting cast of various animated aircraft characters is flying in formation with the Blackbird.