77

Objective: Secure & private password management, prevent anyone from stealing your passwords.

Option 1: Store Keepass PW file in personal cloud service like OneDrive/GoogleDrive/etc , download file, use KeepassXC to Open

Option 2: Use ProtonPass or similar solution like Bitwarden

Option 3: Host a solution like Vaultwarden

Which would do you choose? Are there more options ? Assume strong masterpassword and strong technical skills

(page 2) 50 comments
sorted by: hot top controversial new old
[-] techgearwhips@lemmy.world 3 points 2 years ago* (last edited 2 years ago)

I went from Keepass synced via NextCloud (self hosted) for years... to trying out Bitwarden (their servers) and found the experience much better... then I switched to Vaultwarden via Docker going through Cloudflare Tunnel (with zero trust email authentication required) and fail2ban added. I'm content with the last option.

[-] dogma11@lemmy.world 3 points 2 years ago

I'm currently hosting vaultwarden on my rack, mostly just because I can really. It's easy enough and I have plenty of resources.

[-] hamFoilHat@lemmy.world 3 points 2 years ago

Why not Keepass on a webdav server? Both Keepass on the computer and Keepass2Android can open the file directly. If you save it on one it will merge the changes in any other copies you have open.

[-] doubletwist@lemmy.world 3 points 2 years ago

I've been using option 1 for many many years. It lets me keep control of the encryption, and it's accessible just about anywhere.

[-] possiblylinux127@lemmy.zip 3 points 2 years ago

I choose keepassXC stored locally

[-] nix@merv.news 2 points 2 years ago

I switched to proton pass after using bitwarden for a couple years

[-] BCsven@lemmy.ca 2 points 2 years ago

For highest security don't store in cloud or multiple places. Memorize them or keep a separate device that has no intermet access and keep them on that device encrypted/locked

load more comments (4 replies)
[-] rmstyle@feddit.de 2 points 2 years ago

To improve security of option 1 you could use a keyfile, that is either only transferred manually to devices or stored at a second cloud provider.

[-] AA5B@lemmy.world 2 points 2 years ago

Apple keychain. Supposedly secure, extremely convenient, may be in the Cloud but not centralized - can’t lose everyone’s credentials at once.

The plug-in for Windows works pretty well too, although I wonder if that puts my confidential data at more risk

[-] keyez@lemmy.world 2 points 2 years ago

Been using option 3 but with Bitwarden for almost 5 years at this point. First started out on a VM in a cloud provider. Now it's in a VM on unraid behind a local HAProxy or Cloudflare tunnel for remote access.

Bitwardens full docker stack provides great daily backups which I've had to restore on occasion or go back to one from months ago to dig out a password for my wife.

Been testing and hoping to move to the unified-container from them soon, assuming I can replicate encrypted backups like their solution.

[-] 0xD@infosec.pub 2 points 2 years ago

Option 2, because once you start thinking about the ways your stuff could be stolen ("threat modelling") you'll see that realistically it's the easiest option.

[-] Still@programming.dev 1 points 2 years ago

I do 3 and have encrypted backups to Dropbox so I can easy restore/spin up a cloud server if I need to

load more comments (1 replies)
[-] Nibodhika@lemmy.world 1 points 2 years ago

I like LessPass, essentially you choose one password and then it generates secure passwords for each website, since it uses a predefined generation algorithm it's completely offline and doesn't need syncing it's very secure. However it has the inconvenience of needing to remember the way you spelled the website, but if you stick to something like all lowercase it's fine.

[-] nyakojiru@lemmy.dbzer0.com 1 points 2 years ago
load more comments (1 replies)
[-] UninvestedCuriosity@lemmy.world 1 points 2 years ago

I did option 1 for a number of years but now I'm doing option 3 off a proxmox container and some cloud scripted backup. So far so good.

We just started doing option 3 at work and just keep it behind the firewall. It is going well so far.

[-] Artaca@lemdro.id 1 points 2 years ago

I like Enpass. $25 lifetime sub via Stack social. Does the trick. If they ever pull the rug out on lifetime folks, I would go to Bitwarden.

[-] vector_zero@lemmy.world 2 points 2 years ago

I ended up scoring a free lifetime membership years ago, but is their stuff open source? I never fully trusted it, so I didn't end up using it for anything

[-] aksdb@feddit.de 1 points 2 years ago

Enpass uses the open source library sqlcipher (which is an sqlite fork with encryption). So while Enpass as a whole is not fully open source, you can still exfiltrate your passwords with open source tools, should they ever vanish or radically change their business model. You can then use for example enpass-cli.

That gives me enough confidence to trust in Enpass, since they can't easily hold my data hostage.

[-] Artaca@lemdro.id 1 points 2 years ago

It's not open source, so that's an easy deal breaker for some. Considering the vaults are encrypted and Enpass itself stores nothing on their servers, I've been okay with it. The vaults just exist on my phone and wherever I've chosen to back it up (OneDrive, GDrive, Nextcloud, NAS, etc).

load more comments
view more: ‹ prev next ›
this post was submitted on 28 Sep 2023
77 points (100.0% liked)

Selfhosted

46672 readers
663 users here now

A place to share alternatives to popular online services that can be self-hosted without giving up privacy or locking you into a service you don't control.

Rules:

  1. Be civil: we're here to support and learn from one another. Insults won't be tolerated. Flame wars are frowned upon.

  2. No spam posting.

  3. Posts have to be centered around self-hosting. There are other communities for discussing hardware or home computing. If it's not obvious why your post topic revolves around selfhosting, please include details to make it clear.

  4. Don't duplicate the full text of your blog or github here. Just post the link for folks to click.

  5. Submission headline should match the article title (don’t cherry-pick information from the title to fit your agenda).

  6. No trolling.

Resources:

Any issues on the community? Report it using the report flag.

Questions? DM the mods!

founded 2 years ago
MODERATORS