• Gregor@gregtech.eu
        link
        fedilink
        English
        arrow-up
        0
        ·
        4 months ago

        The server side literally doesn’t matter. Even if it is FOSS they could do anything they please with it, other than reading it, because it’s all encrypted. They could wipe all passwords if they so wanted.

    • Kayn@dormi.zone
      link
      fedilink
      English
      arrow-up
      0
      ·
      4 months ago

      I switched to Pass recently after having used Bitwarden for a couple years. I’d say Bitwarden still has a slight edge in terms of features, but Pass has gotten good enough and it’s included in my Proton subscription.

  • rekabis@lemmy.ca
    link
    fedilink
    English
    arrow-up
    0
    ·
    4 months ago

    No-one should be using any password manager built into any browser, neither Chromium-based nor Firefox-based. Browser password databases are almost trivially easy for malware to harvest.

    Go with something external, BitWarden or 1Password, or if you are entirely within the Apple ecosystem their new password system built into iOS 18 is apparently really good.

    • howrar@lemmy.ca
      link
      fedilink
      English
      arrow-up
      0
      ·
      4 months ago

      What makes the built-in database easier to attack than a separate one?

      • rekabis@lemmy.ca
        link
        fedilink
        English
        arrow-up
        0
        ·
        edit-2
        4 months ago

        What makes the built-in database easier to attack than a separate one?

        For performance reasons, early versions weren’t even encrypted, and later versions were encrypted with easily-cracked encryption. Most malware broke the encryption on the password DB using the user’s own hardware resources before it was even uploaded to the mothership. And not everyone has skookum GPUs, so that bit was particularly damning.

        Plus, the built-in password managers operated within the context of the browser to do things like auto-fill, which meant only the browser needed to be compromised in order to expose the password DB.

        Modern password managers like BitWarden can be configured with truly crazy levels of encryption, such that it would be very difficult for even nation-states to break into a backed-up or offline vault.

      • Telorand@reddthat.com
        link
        fedilink
        English
        arrow-up
        0
        ·
        edit-2
        4 months ago

        It’s protected by the user’s login password. If an attacker can steal that or knows it already, the passwords are all there for them to see.

        Bitwarden (on the other hand, for example) has 2FA options to unlock the database.

        • orbitalmayo@lemmy.world
          link
          fedilink
          English
          arrow-up
          0
          ·
          4 months ago

          How does this work if accessing Bitwarden via the browser extension? I don’t like needing to type my master password in all the time as it’s long, so I have the setting turned on that times the vault out periodically, but so it’s also unlockable with a pin rather than requiring the master password every time. I understand the pin is shorter, but does the protection of the vault still stand?

          • Telorand@reddthat.com
            link
            fedilink
            English
            arrow-up
            0
            ·
            4 months ago

            That’s a good question. I don’t actually know the answer to that. I know the passwords are hashed locally when your vault is locked and before being synced, but I’m not sure whether it’s in plaintext when it’s unlocked or if it uses some kind of on-demand decryption. It’s probably in their docs, I should think.

    • dan@upvote.au
      link
      fedilink
      English
      arrow-up
      0
      ·
      4 months ago

      Go with something external, BitWarden or 1Password,

      When it comes to security software, I usually recommend sticking to open-source solutions, which is why I’d recommend Bitwarden over 1Password. Their whole stack (backend, frontend, and native apps) are all open-source. A premium account is well worth the $10/year.

      You can self-host their server, or self-host Vaultwarden which is an unofficial reimplementation of the Bitwarden backend designed to be lighter weight.

      • rekabis@lemmy.ca
        link
        fedilink
        English
        arrow-up
        0
        ·
        4 months ago

        Use ButWarden myself for a login-only subset of my KeePass content. I absolutely recommend it every chance I get, but some people prefer 1Password because reasons. And 1Password is pretty much the best closed-source option out there, which is why I do so… anything to give people options that keep them away from clusterf**ks like LastPass.

        • JC1@lemmy.ca
          link
          fedilink
          English
          arrow-up
          0
          ·
          4 months ago

          I migrated from Bitwarden to 1password because I wanted something that works better on Linux. With 1password-cli and PAM integration mainly. Bitwarden worked beautifully under Windows, but once I switched over to Linux, I realised that 1password had more Linux friendly features. I track some discussions over bitwarden that talk about implementing those features, I might come back at some point.

        • dan@upvote.au
          link
          fedilink
          English
          arrow-up
          0
          ·
          4 months ago

          Definitely true… Using 1Password is still better than reusing the same password for every site. I’ve never used it but it gets a lot of good feedback, especially from Mac users.

          • JackbyDev@programming.dev
            link
            fedilink
            English
            arrow-up
            0
            ·
            4 months ago

            The only problems I’ve had with 1password are usually not 1password’s fault. Like needing to log into something that opened through the Gmail’s app’s built in browser that closed the page when the app loses focus.

            I wish there was a way to link passwords and have note fields that are hidden by default. I’ve got a lot of stuff at work that is linked to my LDAP password but for various reasons uses different usernames on different sites. It’d be nice if there was a way to tell it “I know this password is reused, I promise it’s okay”

      • JackbyDev@programming.dev
        link
        fedilink
        English
        arrow-up
        0
        ·
        4 months ago

        That’s what I used before 1password. The UI is a bit finicky but it works great. Plus you can shove it into DropBox or other various cloud sync things to get a “cloud” version lol.

  • Pissipissini Johnson 🩵! :D@sh.itjust.works
    link
    fedilink
    English
    arrow-up
    0
    ·
    4 months ago

    I put all my passwords in a text document, then print it on a little strip of paper and shove it up my ass. Whenever I take a crap, I dig it out from the turds and try to memorise some of them again. Then I shove it back up there where noone else can find my data and I won’t lose it.

  • MrsDoyle@lemmy.world
    link
    fedilink
    English
    arrow-up
    0
    ·
    4 months ago

    A friend has a notebook next to her computer with all her passwords in it. Initially I was horrified - what if you’re burgled? - but actually it’s genius. Much more secure than letting a browser remember them, and she doesn’t even need to memorise a Bitwarden password.

  • krimson@lemmy.world
    link
    fedilink
    English
    arrow-up
    0
    ·
    4 months ago

    Recently started using Bitwarden and it works really well. You can even ditch authenticator because it has OTP built in too.

    I selfhost it though because I trust nobody with this type of sensitive data, encrypted or not.

    • WarlordSdocy@lemmy.world
      link
      fedilink
      English
      arrow-up
      0
      ·
      4 months ago

      I was thinking about self hosting but I was worried it would be less secure. I don’t really know a lot about setting that kind of thing up (I do have programming experience but don’t have a lot of server hosting experience outside of doing it for games like Minecraft) and I feel like I’d mess it up and it would be a lot easier to get into than a hardened server. Especially cause the odds I get a virus or something is probably higher then the odds someone breaks into bitwarden’s server. Idk if I’m wrong about this, would love to be corrected if I am, was just my initial thoughts when I switched over from a different password manager to bitwarden.

      • subtext@lemmy.world
        link
        fedilink
        English
        arrow-up
        0
        ·
        4 months ago

        If you don’t trust yourself 110%, don’t host it yourself. Too risky. I self-host everything, but I leave email and passwords to someone else because it’s just too important.

      • SkyeStarfall@lemmy.blahaj.zone
        link
        fedilink
        English
        arrow-up
        0
        ·
        4 months ago

        I think the bigger thing to worry about is, what would happen if your server fails or is destroyed? Would you have a backup of all your passwords? And if yes, are those backups updated regularly and stored in a safe place that also won’t get destroyed if the server gets destroyed (like, say, a house fire)?

        Then, yes, you got the cybersecurity angle too

        It’s a lot to think about for something as important and fundamental to everything you do on the internet as passwords (and accounts)

      • Allero@lemmy.today
        link
        fedilink
        English
        arrow-up
        0
        ·
        edit-2
        4 months ago

        Yep, and Vaultwarden too!

        Though the most secure practice is to store them separately.

        • dan@upvote.au
          link
          fedilink
          English
          arrow-up
          0
          ·
          4 months ago

          The most secure practice for any high-value accounts (email etc) is to use WebAuthn with a hardware key like a Yubikey.

          TOTP is still vulnerable to phishing (a fake login page can ask for both a password and a TOTP code) so business/corporate environments are moving away from them.

          • Godnroc@lemmy.world
            link
            fedilink
            English
            arrow-up
            0
            ·
            4 months ago

            To set a scene, you awake in the middle of the night because your phone is making noise. Blearily you unlock it, glance at a prompt, and then approve a login and fall back asleep. The intruder now has access to your password manager!

            They attempt to log into your bank and drain your life savings, but despite having your password it sends another prompt to your phone. This time, you wake up enough to realize something is wrong. This time, you deny the prompt.

            The entire second paragraph cannot happen if your MFA is a single factor. Don’t store MFA in your password manager!

            • subtext@lemmy.world
              link
              fedilink
              English
              arrow-up
              0
              ·
              4 months ago

              I mean yeah it’s less secure than if they were separated. But my mom is never going to use a separate app for passwords and 2FA, so the two in one app is still better than nothing.

            • Hexarei@programming.dev
              link
              fedilink
              English
              arrow-up
              0
              ·
              4 months ago

              If your MFA is stored in your password manager, you’re not getting prompts to your phone about it. You’re just prompted for a otp code that you have to go out of your way to copy/paste or type in from the manager.

            • JackbyDev@programming.dev
              link
              fedilink
              English
              arrow-up
              0
              ·
              4 months ago

              Blearily you unlock it, glance at a prompt, and then approve a login and fall back asleep.

              The idea that people would approve that is wild to me.

              • Godnroc@lemmy.world
                link
                fedilink
                English
                arrow-up
                0
                ·
                4 months ago

                Mate, I’ve had users who were sharing an account that only some of them had MFA prompts for. They didn’t bother checking who had initiated the prompt, they just approved it because it was easier. And that was while they were fully awake and thinking…

                • JackbyDev@programming.dev
                  link
                  fedilink
                  English
                  arrow-up
                  0
                  ·
                  4 months ago

                  What’s funny to me is that doing this while you know your target is asleep probably has a higher success rate just because they’re more likely to press the wrong thing just because their eyes are groggy. I can read my phone without my glasses but when I wake up in the night that’s not the case right away.

            • Telorand@reddthat.com
              link
              fedilink
              English
              arrow-up
              0
              ·
              4 months ago

              Bruh, if my phone is sending me notifications in the middle of the night, the first thing I’m doing is uninstalling whatever app is sending me notifications.

              If people are that gullible to fall prey to an attack like this, managing OTP in two apps is probably more than they can handle anyway. Everybody has a different threat model, and it’s okay if it’s not covered by hardware passkeys and locally hashed and managed databases.

      • EddoWagt@feddit.nl
        link
        fedilink
        English
        arrow-up
        0
        ·
        4 months ago

        Not really as you’re still protected from password breaches, which is most likely to happen anyways, especially if you self host.

        If you’re actively being targeted for your bitwarden password, you likely have bigger problems

      • krimson@lemmy.world
        link
        fedilink
        English
        arrow-up
        0
        ·
        4 months ago

        Technically yes if my vault gets compromised I would be fucked. I have it firewalled tho and only accessible from home (or VPN to home). So should be pretty secure. I used google authenticator but found it a major pita (can’t even search entries on Android, wtf?). If they make this more user friendly I’ll gladly switch back to a seperate OTP store.

  • communism@lemmy.ml
    link
    fedilink
    English
    arrow-up
    0
    ·
    4 months ago

    Me when I don’t use Chrome, I don’t use Windows, and I don’t use browser password saving either

    • dan1101@lemm.ee
      link
      fedilink
      English
      arrow-up
      0
      ·
      4 months ago

      All of them are vulnerable to bugs though. Just a matter of luck.

        • dorythefish@discuss.online
          link
          fedilink
          English
          arrow-up
          0
          ·
          4 months ago

          One of the mobile clients corrupted all passwords for me. I ended up losing only 2 passwords, and only 1 I wasn’t able to restore. Good lesson on why backups are important though :)

          • PrettyFlyForAFatGuy@feddit.uk
            link
            fedilink
            English
            arrow-up
            0
            ·
            4 months ago

            One of the reasons i use Mega to sync my keepass db across devices where it’s needed. They have version control, so if it gets corrupted then i can restore from a previous version

        • Feathercrown@lemmy.world
          link
          fedilink
          English
          arrow-up
          0
          ·
          4 months ago

          If he knew, do you think he’d be wasting time talking here about it instead of, I don’t know, ransoming millions of user passwords?

          • communism@lemmy.ml
            link
            fedilink
            English
            arrow-up
            0
            ·
            4 months ago

            I like to think that most people would just contact the devs privately to get a fix pushed asap instead of ransoming everyone’s passwords.

            • Feathercrown@lemmy.world
              link
              fedilink
              English
              arrow-up
              0
              ·
              4 months ago

              Right, but my point was that there aren’t public bugs in encryption algorithms just hanging around. Asking for those is categorically bad faith.

    • yggstyle@lemmy.world
      link
      fedilink
      English
      arrow-up
      0
      ·
      4 months ago

      A better statement should be: you should remain vigilant and light on attachment to any banner. If an ill wind blows and you don’t like it, it’s time to move. Control your data- aspire to be a digital nomad.

      Firefox isn’t without it’s own issues, recently. Google used to be viewed as a paragon once, too.

    • BearOfaTime@lemm.ee
      link
      fedilink
      English
      arrow-up
      0
      ·
      4 months ago

      I don’t use the password manager in Firefox, what a terrible idea.

      Use an independent password manager, something purpose-built.

      And using Linux? Hahaha, right, right. Call me when there’s a serious OneNote, or even more importantly, Excel competitor. (Or even a standard shell on Linux, or the same set of tools built in).

      • lemmyvore@feddit.nl
        link
        fedilink
        English
        arrow-up
        0
        ·
        4 months ago

        Firefox Sync was purposefully built too, they didn’t wake up one day to find it on the porch in a basket.

        It syncs passwords, works on desktop and mobile and can do some other cool stuff — syncs tabs and bookmarks, alerts you to password breaches, send tabs from one device to another, lets you export your passwords etc. It’s a good password manager.

      • Aatube@kbin.melroy.org
        link
        fedilink
        arrow-up
        0
        ·
        4 months ago

        Use an independent password manager, something purpose-built.

        Why? You’re talking as if browser password managers aren’t purpose-built. “I love entering a password to fill my passwords for me instead of entering a password” —statement dreamed up by the utterly deranged. (I think we all should just use auto-locking.)

        OneNote

        Web-based stuff like Notion and Google Keep

        Excel

        LibreOffice Calc with Tabbed UI

        standard shell

        what is that

      • tabular@lemmy.world
        link
        fedilink
        English
        arrow-up
        0
        ·
        edit-2
        4 months ago

        It is not the software which can lack seriousness, but the developer and the user. One is proprietary where the developer controls the user’s computing - the other is free software where the user is in control (free as in freedom).

      • ᗪᗩᗰᑎ@lemmy.ml
        link
        fedilink
        English
        arrow-up
        0
        ·
        4 months ago

        Call me when there’s a serious OneNote…

        OneNote works on the web, but there’s also Notenook if someone is looking for similar features with an app for offline access + End-to-end encryption and open source alternative. I’ve got it syncing to my Android, Windows, Linux and Mac clients without issue.

        …or even more importantly, Excel competitor.

        There’s OnlyOffice which has a spreadsheet. Yeah it’s not Excel which has existed for a million years, but it should work for the vast majority of users’ basic needs. It may not work for your specific use case, but it is a viable alternative that exists today. If you want more online collaborative features (like the o365 version has) you can use CryptPad, which provides an end-to-end encrypted and open-source collaboration suite, including the web version of OnlyOffice Spreadsheets.

        Or even a standard shell on Linux…

        What does this even mean? Nearly every major Linux distro sets bash as the default shell, and if not the default, is probably already installed and called if needed. Not sure I understand the problem here.

        …or the same set of tools built in

        Stick to a single OS and you get the same set of tools built in? This is a strange statement to be making against a system that not only thrives on diversity but has lots of niche systems that require a myriad of default tools.


        I do completely agree about not using any browser’s built-in password manager.