| ▲ | mobeigi 4 hours ago |
| KeePass users continue to live the stress free live. I've managed to avoid several security breaches in last 5 years alone by using KeePass locally on my own infra. |
|
| ▲ | gbalduzzi 2 hours ago | parent | next [-] |
| I don't understand how this solves the issue in this case. Bitwarden vaults were not compromised, there was a problem in a tool you used to access the secrets. What makes it impossible for KeePass access tools to have these issues? |
| |
| ▲ | john_strinlai an hour ago | parent [-] | | >What makes it impossible for KeePass access tools to have these issues? the superiority of keepass users scares away the bad actors |
|
|
| ▲ | 1024kb 4 hours ago | parent | prev | next [-] |
| I need my passwords to be accessible from my infrastructure and my phone. How do you achieve this with KeePass? I assumed it was not possible, but in fairness, I haven't really gone down that rabbit hole to investigate. |
| |
| ▲ | worble 4 hours ago | parent | next [-] | | Keepass is just a single file, you can share it between devices however you want (google drive, onedrive, dropbox, nextcloud, syncthing, rsync, ftp, etc); as long as you can read and write to it, it just works. There are keepass clients for just about everything (keepassxc for desktops, keepass2android or keepassdx for android, keepassium for iphone). | | |
| ▲ | aborsy 3 hours ago | parent [-] | | How is the quality of browser extensions compared to Bitwarden? | | |
| ▲ | worble 2 hours ago | parent [-] | | I don't have any points of comparison since I've never used Bitwarden, but it works well enough for my purposes. It'll match the url, offer to autofill (sometimes those multiflow sites like Microsoft will trip it up, but you can always just right click -> enter username/password for a site and that'll work), and it does TOTP filling too. |
|
| |
| ▲ | yolo_420 4 hours ago | parent | prev | next [-] | | Not op but I mean you can use a public cloud with Cryptomator on top if you don’t trust your password DB on a non E2E cloud. Or you can just use your own cloud (but then no access outside or can risk and open up infra), and then any of the well known clients on your phone. Can optionally sandbox them if possible and then just be mindful of sync conflicts with the DB file but I assume you, like most people, will 99.9% of the time be reading the DB not writing to it. | |
| ▲ | piperswe 4 hours ago | parent | prev | next [-] | | Syncthing can synchronize Keepass files between devices quite well. | | |
| ▲ | jasonjayr 4 hours ago | parent | next [-] | | I rely on this too, but counting down the days android no longer lets syncthing touch another app's files :( | | |
| ▲ | antiframe 3 hours ago | parent | next [-] | | I never enjoyed the Android syncthing experience, so I just plug my phone in once a month and manually copy the vault over. I don't ever edit on my phone, so I don't need two-way syncing. | |
| ▲ | piperswe 4 hours ago | parent | prev [-] | | It would be strange if Android locked that down further than even iOS - Keepassium on iOS can open files from any sync app IIRC |
| |
| ▲ | alcazar 3 hours ago | parent | prev [-] | | What happens if you add a new item on two devices simultaneously? | | |
| ▲ | 63stack 2 hours ago | parent [-] | | It renames one of them to $hostname_conflicted, or something like that.
Keepass has a built in tool for reconciling two databases, you can use that in this scenario. |
|
| |
| ▲ | mrWiz 2 hours ago | parent | prev | next [-] | | I use MacOS and iOS for home home devices and Windows for work, and use Strongbox on the Apple side with KeePassXC on the Windows side and sync them using DropBox. | |
| ▲ | SV_BubbleTime an hour ago | parent | prev | next [-] | | Someone is about hop on and tell you how they simply run a Dropbox/GDrive to host their keepass vault and how that’s good enough for me (which should be Keepass’s tagline) and mobile they use a copy or some other manually derived and dependency ridden setup. They will support ad hoc over designed because their choice of ad hoc cloud is better than a service you use. | |
| ▲ | thepill 4 hours ago | parent | prev | next [-] | | For me it is nextcloud + wireguard | |
| ▲ | xienze 3 hours ago | parent | prev | next [-] | | I use self-hosted Bitwarden (Vaultwarden) for this. It runs on my local network, and I have it installed on my phone etc. When I’m on my local network, everything works fine. When I’m not on my local network, the phone still has the credentials from the last time it was synced (i.e., last time it was used while the phone was on the home network). It’s a pretty painless way to keep things in sync without ever allowing Bitwarden to be accessible outside my home network. | |
| ▲ | Matl 4 hours ago | parent | prev | next [-] | | I mean there are ways i.e. if you run something like tailscale and can always access your private network etc. but it is a hassle. Plus, now you're responsible for everything. Backups, auditing etc. | |
| ▲ | walrus01 4 hours ago | parent | prev [-] | | In short, when I make a major password or credential change I do it from my laptop, consider that file on disk to be the "master" copy, and then manually sync the file on a periodic basis to my phone. I treat the file on the phone as read-only. Works fine so far. To date there have been zero instances when I needed to significantly change a password/service/login/credential solely from my phone and I was unable to access my laptop. Additionally the file gets synchronized to a workstation that sits in my home office accessible by personal VPN, where it can be accessed in a shell session with the keepass CLI: https://tracker.debian.org/pkg/kpcli You can use an extremely wide variety of your own choice of secure methods for how to get the file from the primary workstation (desktop/laptop) to your phone. |
|
|
| ▲ | afavour 4 hours ago | parent | prev | next [-] |
| Which is great for Hacker News users that can maintain their own infra. But if we're talking "stress free", that's not an answer for the average user... |
| |
| ▲ | kelvinjps10 3 hours ago | parent | next [-] | | what "infra"? keepass works locally, and just opens a database file. it works the same as any other password manager. | | |
| ▲ | afavour 2 hours ago | parent [-] | | Most other password managers have a cloud component so if your local storage breaks or gets lost you don't lose all your passwords. |
| |
| ▲ | NoMoreNicksLeft 4 hours ago | parent | prev [-] | | The average user is reusing their password everywhere, and rotation means changing the numeral 6 at the end of the password to 7. | | |
| ▲ | NegativeK 4 hours ago | parent [-] | | We should be encouraging those users to switch to a password manager. | | |
| ▲ | NoMoreNicksLeft 3 hours ago | parent [-] | | I do when I can, but there's a learning curve, and the rest of the world is trying to move those users in a very different direction (passkeys and other bullshit). Password habits for many people are now decades-old, and very difficult to break. |
|
|
|
|
| ▲ | Perz1val 3 hours ago | parent | prev | next [-] |
| Ok, single file, blah, blah. Realistically how do you sync that and how do you resolve conflicts? What happens if two devices add a password while offline, then go online? |
| |
| ▲ | eipi10_hn an hour ago | parent [-] | | I actually was a Bitwarden user at first, but over time in reality the frequency that I change email/password is not that much. It's not like I change those things every hour or every day like with my work files/documents and need constant syncing to the drive. And the chance that I add/change passwords at 2 devices at a close time is even less. So gradually I don't feel I need syncing that much any more and switched to Keepass. I made my mind that I'll only change the database from my computer and rclone push that to any cloud I like (I'm using Koofr for that since it's friendly to rclone) then in any other devices I'll just rclone pull them after that when needed. If I change something in other devices (like phones), I'll just note locally there and change the database later. But ofc if someone needs to change their data/password frequently then Bitwarden is clearly the better choice. |
|
|
| ▲ | pregnenolone 4 hours ago | parent | prev | next [-] |
| > KeePass users continue to live the stress free live. https://cyberpress.org/hackers-exploit-keepass-password-mana... |
| |
| ▲ | pertique 3 hours ago | parent | next [-] | | This article is borderline malicious in how it skirts the facts. This wasn't a case where KeePass was compromised in any way, as far as I can tell. This appears to be a basic case of a threat actor distributing a trojanized version via malicious ads. If users made sure they are getting the correct version, they were never in danger. That's not to say that a supply chain attack couldn't affect KeePass, but this article doesn't say that it has. | |
| ▲ | dspillett 3 hours ago | parent | prev | next [-] | | That looks like you'd have to download and run a hacked installer that was never avaliable from an official location. That is a much lower risk than a supply-chain attack where anyone building birwarden-cli from the official repo would be infected via the compromised dependency. Long term keepass users aren't going to be affected. If you mention software to others make sure you send them a link to a known safe download location instead of having them search for one (as new users searching like that are more at risk of stumbling on a malicious copy of the official site hosting a hacked version). | |
| ▲ | derkades 4 hours ago | parent | prev | next [-] | | This AI generated article is not about vulnerabilities in KeePass, rather about malicious KeePass clones. | |
| ▲ | jaxefayo 3 hours ago | parent | prev | next [-] | | I think most people use keepassxc, not original keepass. | |
| ▲ | baby_souffle 4 hours ago | parent | prev | next [-] | | Happy 1password user for more than a decade. It's only a matter of time until _they_ are also popped :(. | |
| ▲ | hypeatei 4 hours ago | parent | prev [-] | | That's an AI slop article. I'm not sure how someone creating their own installer and buying a few domains to distribute it is a mark against KeePass itself. > The beacon established command and control over HTTPS |
|
|
| ▲ | kelvinjps10 3 hours ago | parent | prev [-] |
| the only thing I can't find to do with keepass is how back up it in the cloud, like if you encrypt your back up, then where do you save that password, then where do you save the password for the cloud provider?. |
| |
| ▲ | hootz 3 hours ago | parent | next [-] | | You save the single password in your head. All other passwords go inside Keepass. | |
| ▲ | eipi10_hn an hour ago | parent | prev [-] | | Same as Bitwarden? You just need to remember Keepass password, just like remember Bitwarden password. |
|