RanchOnPancakes,
@RanchOnPancakes@lemmy.world avatar

I use Bitwarden with some trepidation. I keep hoping that eventually Proton Pass morphs into something that seems even more secure but right now it’s pretty basic.

amanneedsamaid,

If you’re willing to use a cloud-based solution, why do you have trepidation about Bitwarden (open source, great track record, standalone service) and not Proton Pass (also open source, and Proton has a great reputation for account security, but adding your password database to the same account you use for email, drive, vpn, and calendar, which is putting all your eggs in one basket IMO.

If you have trepidation trusting the security of your passwords to someone else, use KeePass.

RanchOnPancakes,
@RanchOnPancakes@lemmy.world avatar

I mean for example if proton decided to also add a secret key like 1password. Something that provides at least what to me would be like even more security. But it too new of a service right now, time will tell.

amanneedsamaid,

I recommend using a YubiKey on your Proton account if you want a strong second factor thats a bit easier to manage than a key file. If you use all or most of Proton’s apps, might be worth looking into.

BrikoX,

What are your thoughts on password managers?

They are mandatory in current digital age.

Do you use one?

Yes. Bitwarden.

Would you recommend it to others?

Already do and most are receptive to it once you show them that every single one of them were caught up in a breach at some point.

Asafum,

But what about Bitwarden? What you say about the breach is exactly what I’m worried about when having ONE source that has EVERY password. At least now I have different passwords for different sites so only one can be affected, it’s just a pain in the ass to have to go look them up. I save a portion of my passwords with cryptic messages that only I understand.

I can’t think of anything that hasn’t been hacked, I feel like it’s just a matter of time before these password sites are too if they haven’t already. :/

deong,

A good password manager will be encrypted on device using your master password and only the encrypted data ever synced anywhere. So if Bitwarden gets hacked, and the worst case scenario happens, that means an attacker makes off with the complete contents of your vault. But all they have is an encrypted file. To decrypt it, they need your master password. Bitwarden doesn’t have the keys to lose – they only have the lock, and only you have the key. So an attacker would need to compromise Bitwarden (the company) to get access to the vault, and then separately, compromise you personally to get your master password (the key).

Alternately, they could try to brute-force the master password offline. If you think you could guess a user’s password if you tried 100,000,000,000 guesses, and each guess took you 1 nanosecond, you could guess all hundred billion in a little under two minutes. Bitwarden uses techniques to make it intentionally very slow (slow if you’re a CPU at least) to generate the hashes needed to compare a password. If it takes you 100,000 nanoseconds per guess instead, then instead of two minutes, it takes almost 4 months. Those numbers are completely made up, by the way, but that’s the general principle. Bitwarden can’t leak your actual passwords directly, because they never get them from you. They only get the encrypted data. And if an attacker gets the encrypted data, it will take them quite a bit of time to brute force things (if they even could – a sufficiently good master password is effectively impossible to brute force at all). And that’s time you can use to change your important passwords like your email and banking passwords.

One important realization for people to have is that none of us get to choose perfection here. You don’t only have to worry about Bitwarden getting hacked. You also have to worry about you forgetting them. You have to worry about someone figuring out your “cryptic messages that only I understand” scheme. Security is generally about weighing risks, convenience, and impact and choosing a balance that works best for you. And for most people, the answer should be a password manager. The risks are pretty small and mitigation is pretty easy (changing your passwords out of caution if the password manager is breached), and the convenience is high. And because it’s, as you put it, “a pain in the ass” to manage good unique passwords yourself, virtually no one actually does it. Maybe they have one or two good passwords, and rest are awful.

zahel,

The way that Bitwarden stores your data, it is encrypted as a blob on AWS. If anyone compromises Bitwardens infrastructure, they can’t do anything because even Bitwarden doesn’t have the keys to decrypt your vault.

Your vault can only be decrypted with your master passwords, and decryption happens locally, on device. No decrypted information is sent over the internet.

As far as someone gaining access to your master password and this all other passwords stored in the pass manager, that is why 2 factor authentication exists.

I could give you my Bitwarden master password right now, but that won’t help if you don’t also have my 2fa code.

And that’s just talking about using the hosted version of Bitwarden.

If you self host, you don’t even have to have the app available to the public internet, and can access it purely through a vpn to your LAN.

Then the attacker would not only need to have access to your local network, also know your master password, and have access to your 2fa.

If they know that much about you, you have larger concerns.

So in short, your concern is mostly addressed and not really a concern if you utilize the features provided, such as 2fa

oatmilkmaid,

Bitwarden all day every day. I don’t even know any of my passwords because they’re all randomly generated. Try to guess my password now hacker man

beta_tester,

Bitwarden didn’t work perfectly fine for me. Proton pass does.

Monologue,

yup randomly generated 20+ digit passwords are the way to go

Zectivi,

Same, just gotta watch out for sites that don’t support it and don’t tell you that they don’t. I got into a password reset loop with a site once, until I realized it was truncating my 20 character password to their supported max of 16. They never said the max was 16, and never game an error that 20 wasn’t allowed. Just simply an asshole design. I probably could check bitwarden for whatever password I changed the most and see if it’s still an issue with the site.

actually_a_tomato,

That sounds infuriating

Trexman,

My old bank limited passwords to 12 characters. Unbelievable.

butternuts,

I consider this lazy programming. I’ve had it happen a few times but luckily it has been rare for me.

desorientado,

+1 to Bitwarden. I can’t live without it anymore

aeharding,
@aeharding@lemmy.world avatar

Bitwarden is great, no excuse to stick with last pass these days

SendMePhotos,

It’s probably… Um… 8#shJo9$f ?

CaptFeather,

I use Bitwarden!! It’s great cause I have a long complicated password to access the vault (my phone will do it by fingerprint though) but it’s the only password I need to actually memorize. Don’t know how someone can be secure without one nowadays, way too many services

knowncarbage,

Think I’m still on keepassxc but looking to change. Bitwarden is looking good.

Do you selfhost?

oatmilkmaid,

I used to, and it was a fairly easy process. I eventually just decided to use Bitwarden’s own servers because I didn’t trust myself to not lose all my passwords while self hosting

  • All
  • Subscribed
  • Moderated
  • Favorites
  • android@lemmy.world
  • tacticalgear
  • DreamBathrooms
  • mdbf
  • InstantRegret
  • ngwrru68w68
  • magazineikmin
  • thenastyranch
  • Durango
  • rosin
  • Youngstown
  • slotface
  • khanakhh
  • kavyap
  • ethstaker
  • JUstTest
  • cubers
  • cisconetworking
  • normalnudes
  • modclub
  • everett
  • osvaldo12
  • GTA5RPClips
  • Leos
  • anitta
  • tester
  • provamag3
  • megavids
  • lostlight
  • All magazines