• Cyborganism@lemmy.ca
    link
    fedilink
    English
    arrow-up
    0
    ·
    1 month ago

    I’m very skeptical about online cloud-based password managers. I don’t trust that at all. I still prefer to use a local off-line password manager like KeePassXC.

    • mino@lemmy.ml
      link
      fedilink
      arrow-up
      0
      ·
      edit-2
      30 days ago

      What is your threatmodel here?

      The problem for me with completely self hosting it is that it’ll be relatively hard to get my backup, availability and sync requirements satisfied without a lot of effort.

      Whereas I trust encryption in theory enough to hand my encrypted data to anyone. If the implementation is properly audited then I also trust that.

      Most of my passwords are for accounts with 2fa anyway so even if both the storage leak and the encryption turn out to be subpar my threatmodel is still not violated.

    • ChiefGhost295@lemmy.one
      link
      fedilink
      arrow-up
      0
      ·
      edit-2
      30 days ago

      Since the vault is end-to-end encrypted, it shouldn’t matter where it is hosted, even if it is in the cloud. Here is what a security researcher and a password cracker Jeremy M. Gosney has said about this after the LastPass incident.

      ”Is the cloud the problem? No. The vast majority of issues LastPass has had have nothing to do with the fact that it is a cloud-based solution. Further, consider the fact that the threat model for a cloud-based password management solution should *start* with the vault being compromised. In fact, if password management is done correctly, I should be able to host my vault anywhere, even openly downloadable (open S3 bucket, unauthenticated HTTPS, etc.) without concern. I wouldn’t do that, of course, but the point is the vault should be just that – a vault, not a lockbox.”