So I’m using bit warden self hosted and now I’m freaking out about the very real possibility of my passwords getting stolen or lost in a fire. Having passwords on my phone makes no sense.

We need some sort of distributed password manager safety net. Like I keep your passwords safe if you keep mine. But how can I trust you? Can you trust me?

  • MaggiWuerze@feddit.org
    link
    fedilink
    English
    arrow-up
    26
    ·
    1 day ago

    Why would your passwords be stolen? If you have a good master password you could pass around thumb drives with the database and noone would be able to acces them, wince they are securely encrypted. Having them on your phone makes no difference as long as you don’t leave your phone and password manager app unlocked and out in the open (which both actively warn you against)

    • BCsven@lemmy.ca
      link
      fedilink
      English
      arrow-up
      9
      arrow-down
      3
      ·
      1 day ago

      Use a yubikey hardware device, only the person with the hardware in hand and password can unlock your accounts

      • MDCCCLV@lemmy.ca
        link
        fedilink
        English
        arrow-up
        5
        ·
        1 day ago

        You don’t want that as the only option though, because you can definitely lose that and it’s not incredibly hard to break.

        • BCsven@lemmy.ca
          link
          fedilink
          English
          arrow-up
          1
          ·
          edit-2
          1 day ago

          The solution to that is you purchase a backup key and enroll both when presented with the QR image for new OTP links, or add a secondary FIDO key on some accounts. Then you store the other one in a fireproof box.

          Or you use a cryptographic key and print it out using shard tool. The shard tool lets you specify how many splits and how many required for a tebuild. It prints out the shards and you distribute to safe places or people. They are useless by themselves but if you scan in the required amount of pieces the tool will rebuild your cryptographic key

    • BCsven@lemmy.ca
      link
      fedilink
      English
      arrow-up
      5
      arrow-down
      9
      ·
      edit-2
      1 day ago

      Just takes a brute force or 0 day vulnerability to get master password access, then they have everything.

      Something that seems secure never is online, like the 2017 Intel managetment vulnerability where remote attackers could access your computer by sending a null password, and access your keyboard and camera etc

      • hummingbird@lemmy.world
        link
        fedilink
        English
        arrow-up
        2
        arrow-down
        1
        ·
        1 day ago

        That’s why tools like keepass allow you to require more than just a password to decrypt.

        • BCsven@lemmy.ca
          link
          fedilink
          English
          arrow-up
          1
          ·
          1 day ago

          Yes 2FA is good, but most people default to their phone being the tool, but your phone number can be ported by scammers, or is often the target of theft