I’m currently using 1Password but I’m no longer satisfied with it.

  • Fizz@lemmy.nz
    link
    fedilink
    English
    arrow-up
    3
    ·
    11 months ago

    Its open source, self host-able or cloud host and its had enough audits to say its fairly secure.

  • drifty@sopuli.xyz
    link
    fedilink
    English
    arrow-up
    3
    ·
    edit-2
    11 months ago

    Top of the line, best of the best, nothing beats it. Especially if you self-host Vaultwarden, there is simply nothing that can compete. (Vaultwarden makes the 2fa component that is paid in Bitwarden free if you self-host it)

    • reflex@kbin.social
      link
      fedilink
      arrow-up
      2
      ·
      11 months ago

      Especially if you self-host Vaultwarden

      Out of interest, if you self-host, do you still have to pay for the “premium” BW features like TOTP-in-app?

      I was on standard BW for less than a month before moving everything to KeePassXC to have free TOTP.

    • speck@kbin.social
      link
      fedilink
      arrow-up
      1
      ·
      11 months ago

      Sorry, which is the gold standard, bitwarden or vaultwarden or are they something you use in tandem?

      • Scott@lem.free.as
        link
        fedilink
        arrow-up
        1
        ·
        11 months ago

        Tandem.

        BitWarden is the client. VaultWarden is the server-side, self-hosted component that emulates the official BitWarden cloud service.

  • ZenArtist@kbin.social
    link
    fedilink
    arrow-up
    2
    ·
    11 months ago

    I’ll play the devil’s advocate here.

    Since bitwarden is a VC funded company, I’m wary of the enshittification that might take place in the future. Even though technically speaking, you can self-host the server via Vaultwarden, it is largely possible because the project has blessing of official devs. That can change dramatically in future.

    For something as important as your passwords, trusting a for-profit company might not be the best idea.

    Would love to know what the community thinks about this.

    DISCLAIMER: I love Bitwarden and use it daily, both for personal use and at work.

    • Logster998@sh.itjust.works
      link
      fedilink
      arrow-up
      2
      ·
      11 months ago

      The VC money has gone to good though, like audits and open source code. A lot of the money they get is from company deals with bitwarden buisness anyway. As long as that works out, I can’t see them screwing over anyone while they have a money stream. If they do screw up, exporting to KeyPassXC is super easy anyway.

      • dngray@lemmy.oneM
        link
        fedilink
        arrow-up
        1
        ·
        11 months ago

        KeyPassXC is super easy

        One of the things I dislike about KeepassXC is that it exports to a unstructured CSV file, whereas Bitwarden exports to JSON. It’s a lot easier to use something like jq to parse a JSON structure, if you want to import it somewhere as opposed to dealing with CSV files.

        I also found the importer for Keepass CSV in Bitwarden didn’t import my “notes” and I had to individually check that for each record.

    • ebits21@lemmy.ca
      link
      fedilink
      English
      arrow-up
      1
      ·
      11 months ago

      While true, you can easily migrate your data elsewhere in such a scenario.

      If that changes they’re dead to me.

  • PublicLewdness@burggit.moe
    link
    fedilink
    English
    arrow-up
    2
    ·
    11 months ago

    I use an unnoficial Bitwarden app on Ubuntu Touch. I would prefer KeePassXC or KeePassDX as my go to password managers but have found no reason to distrust Bitwarden thus far.

  • candyman337@lemmy.world
    link
    fedilink
    English
    arrow-up
    0
    ·
    11 months ago

    I switched from bitwarden to 1password because the password autofill was less intelligent.

    What’s your issue with 1password?

  • paulcdb@kbin.social
    link
    fedilink
    arrow-up
    0
    ·
    11 months ago

    The one question no-one has mentioned yet given it’s probably Bitwarden’s biggest security vulnerability…

    How strong is your password?

    Because ultimately that is EVERY password managers weakness! I’m also still skeptical about the abuse, is it passkeys or something that I’m going to guess will make it so much easier to do social engineering on so I’d personally never use it on a vault.

    • Bristlerock@kbin.social
      link
      fedilink
      arrow-up
      2
      ·
      11 months ago

      It’s a good question. A vault is only as strong as the credentials required to access it.

      Bitwarden does have MFA support, though. If you’re using it without that enabled, you’re asking for trouble.

  • QubaXR@lemmy.world
    link
    fedilink
    English
    arrow-up
    0
    ·
    11 months ago

    I’m hearing a lot of good things about Bitwarden, especially from the Linux crowd.

    What I am curious about though is what’s in your opinion wrong with 1password - a solution I’m currently using too.

    • asap@lemmy.world
      link
      fedilink
      English
      arrow-up
      1
      ·
      11 months ago

      Because it’s closed source, there’s a higher likelihood that there is an undiscovered vulnerability in 1Password. Even though it is audited, a vulnerability could be introduced after the most recent audit and you would never know.

      For something as mission-critical as a password manager, going with an open source solution gives just that much more confidence that your data is safe. To me it’s simply not worth the risk to blindly trust a company with my login data, when I could trust a company that displays their entire solution in the open.

      • liara@lemm.ee
        link
        fedilink
        English
        arrow-up
        2
        ·
        11 months ago

        Going to play Devil’s advocate here, but open source does not automatically mean that things are safe or that anyone is even auditing the code on anything that resembles a regular basis.

        Heartbleed was introduced into OpenSSL source code in 2012 and wasn’t discovered and fixed until 2014