this post was submitted on 18 May 2026
377 points (99.2% liked)

Privacy

48713 readers
1106 users here now

A place to discuss privacy and freedom in the digital world.

Privacy has become a very important issue in modern society, with companies and governments constantly abusing their power, more and more people are waking up to the importance of digital privacy.

In this community everyone is welcome to post links and discuss topics related to privacy.

Some Rules

Related communities

much thanks to @gary_host_laptop for the logo design :)

founded 6 years ago
MODERATORS
 

If you are interested in privacy you are probably interested in password storage ... plus I wanted everyone to know about the inevitable future enshitification of this product. Spread the word and replacement recommendations are welcome too.

you are viewing a single comment's thread
view the rest of the comments
[–] JakenVeina@midwest.social 2 points 2 days ago (5 children)

Why the hell is anyone using anything other than KeePass?

[–] RotatingParts@lemmy.ml 1 points 1 hour ago
  1. I want to get to my passwords on multiple devices. 2. Bitwarden has a nice feature where you can set up a trusted person to be able to get into your account by sending you an email and if you don't respond "no" after a set period of time, they get access. This can be very valuable if the you are incapacitated or dead and that (trusted) person needs to take care of things using your passwords. Are those things available in KeePass, if so, great and I'll have another look!
[–] potustheplant@feddit.nl 13 points 2 days ago (1 children)

Doesn't keepass only work on a single device? Meaning that you have to handle syncing the database file yourself. I prefer selfhosting vaultwarden. Maybe these changes will make me migrate to something else but for now I'm very satisfied with vaultwarden and the bitwarden client.

[–] AHemlocksLie@lemmy.zip 8 points 2 days ago (2 children)

Yeah, I just leave the file in a NextCloud sync directory. All my desktops and laptops download it automatically, and it's trivial to download to my phone. As an added bonus, my fucking password manager isn't exposed to the open internet where every hacker who finds it is gonna wonder what's inside.

[–] potustheplant@feddit.nl 4 points 2 days ago* (last edited 2 days ago) (1 children)

You need two apps though and I personally have more faith in vaultwarden being stable than nextcloud.

Glad your "fucking" password manager isn't exposed to the internet. Mine isn't exposed either since I use tailscale to access it. Your comment leads me to believe that your NextCloud instance IS exposed to the internet. Wouldn't that mean that if a hacker gets access to your account they could also get your keepass file as well?

[–] AHemlocksLie@lemmy.zip 1 points 2 days ago (1 children)

I just typed out a response to most of this, and rather than repeat all that, I'll copy a link here https://lemmy.zip/comment/26557132

A lot of it can be summed up in that compromising Vaultwarden means everything is screwed while compromising NextCloud is mainly a minor inconvenience. It provides neither information about the database's password nor any avenue to attempt to intercept the password.

[–] potustheplant@feddit.nl 2 points 2 days ago* (last edited 2 days ago) (2 children)

EDIT: Forgot to mention the worst part about KeePassXC. It's vibecoded crap.

I replied to that comment. You're assuming that compromising vaultwarden is somehow easier than compromising nextcloud. No idea why. Intercept the password where? I'm using a local client and only syncing the vault. You seem to be pretty unfamiliar with how vaultwarden works.

[–] boonhet@sopuli.xyz 1 points 2 days ago

EDIT: Forgot to mention the worst part about KeePassXC. It’s vibecoded crap.

Is RiiR still all the rage? Perhaps it's time to oxidize KeePass. There are a few libraries for kdbx files and at least one ready-made CLI.

[–] AHemlocksLie@lemmy.zip -1 points 2 days ago

No, I'm assuming that compromising NextCloud is less devastating than compromising Vaultwarden, so I'm taking a calculated risk that my database's password is secure enough to offset the slightly increased risk of access to the encrypted database because I don't always get to choose all the software I get to use in every environment I work with, so I might have to use the web client if I can't get the local client.

As for you only using the local client, congrats, we don't always get to choose what we use outside the home.

[–] dogs0n@sh.itjust.works 4 points 2 days ago (1 children)

As an added bonus, my fucking password manager isn't exposed to the open internet

WireGuard 🥹

[–] AHemlocksLie@lemmy.zip 1 points 2 days ago (2 children)

At that point, is it really easier than NextCloud? I don't have to worry about forgetting to disconnect and wasting my VPS's bandwidth or ruining my ping for games. On PCs and laptops, the file is immediately local, and on mobile, it's easier to download an updated version of the database than it is to mess with the VPN.

[–] potustheplant@feddit.nl 2 points 2 days ago (1 children)

Yup, it is. On one hand, I would have wireguard configured regardless beacause I don't like publicly exposing my server. On the other, if you had to do it just for this and don't want to configure wireguard manually, just use zerotier, tailscale or netbird. They can be set up in like 15 minutes and after you get it working you don't need to touch it again.

[–] AHemlocksLie@lemmy.zip 0 points 2 days ago (2 children)

Eh, not worth it to me. Some of what I host is occasionally really handy to be able to access from a random machine, and I don't want to have to deal with barriers to entry when I need in. I can appreciate the security benefits, but I'll take my chances. Even if they break into my NextCloud, they'd have to crack an unreasonable password to break the password database open.

[–] dogs0n@sh.itjust.works 2 points 2 days ago (1 children)

You are choosing more convenience over security, which is fine, BUT it's good to know that syncing your passwords with NextCloud over the internet is not any more secure than syncing it over the internet any other way (that uses any encrypted transport method).

[–] AHemlocksLie@lemmy.zip 0 points 2 days ago (1 children)

Not necessarily. Compromising Vaultwarden would allow you to inject malicious JavaScript into the login page to steal passwords. NextCloud in no way interacts with the password database, so it provides no attack surface to the password database itself. Compromising the client for my password manager would require a supply chain attack on a Linux distribution's package repository or theft of the package signing keys for the Linux distro or the Android app

[–] dogs0n@sh.itjust.works 2 points 2 days ago (1 children)

What do you mean by comprimising VaultWarden? Someone hacking into your server and changing the login page to include extra javascript? Because if they are gaining code execution on your system, then you might already be done for. I can see your point, but I'm not personally going to be worried about it specifically.

[–] AHemlocksLie@lemmy.zip 0 points 2 days ago

By compromising Vaultwarden, I mean exploiting some flaw in it to gain extra access that may facilitate further attacks. If they have code execution on my server, they can't really do anything because the server never provides an interface to unlock the password database. They could attempt a more complicated malware attack on my clients, but that's WAY more effort than an automated attack on Vaultwarden instances, probably by several orders of magnitude.

[–] potustheplant@feddit.nl 2 points 2 days ago (1 children)

There's this wild technology called a hotspot. You can use your already authenticated device to give another device access to your services indirectly.

Even if they break into my NextCloud, they'd have to crack an unreasonable password to break the password database open.

That level of security is exactly the same as exposing your password manager to the "fucking" internet. Not sure why you criticized it before when you (incorrectly) assumed that I was doing that.

[–] AHemlocksLie@lemmy.zip 1 points 2 days ago* (last edited 2 days ago) (1 children)

There's this wild technology called a hotspot.

There's also this dated technology called a wired connection that some other dated technologies require. Since I don't get to choose every device I interact with or depend on, that's not always available.

That level of security is exactly the same as exposing your password manager to the "fucking" internet.

I would disagree. A Bitwarden instance identifies itself as such to every visitor that comes by. It advertises itself as a particularly high value target. By contrast, a lot of what a NextCloud instance hosts is often personal and more valuable to the user than a hacker, so it does not become clear if there's anything of value inside.

It also decreases the attack surface of my password manager itself because there are fewer features in it that may have a potential exploit. Even if an attacker compromises the NextCloud instance, that may grant access to the file itself, but they still have to contend with the entire security of the password manager. No device will ever make any contact with the server for password purposes other than to sync the database file, and there's no web interface to inject a password stealing JavaScript file.

[–] potustheplant@feddit.nl 1 points 2 days ago* (last edited 2 days ago) (1 children)

EDIT: Forgot to mention the worst part about KeePassXC. It's vibecoded crap.

There's also this dated technology called a wired connection that some other dated technologies require.

Hotspot does not imply that it needs to be wifi. You can share your internet connection via usb tethering too. (also a wild new technology, I know)

A Bitwarden instance identifies itself as such to every visitor that comes by. It advertises itself as a particularly high value target. By contrast, a lot of what a NextCloud instance hosts is often personal and more valuable to the user than a hacker, so it does not become clear if there's anything of value inside.

This ignores how modern internet attacks work. Hackers don't sit around manually browsing websites. Automated botnets scan the entire IPv4 address space 24/7 looking for specific software signatures or known unpatched vulnerabilities. If a Nextcloud exploit drops today, a bot will breach the server before the hacker even knows what is stored inside.

Also, advertises itself to whom? I'm not exposing it to the internet. How many reports can you find of people getting their Vaultwarden instance hacked? This is a lot of assumptions that don't track with reality.

It also decreases the attack surface of my password manager itself

You're putting your database file in nextcloud. That increases the attack surface of your solution, a lot.

No device will ever make any contact with the server for password purposes other than to sync the database file

That's *exactly *what a client for vaultwarden does...

there’s no web interface to inject a password stealing JavaScript file

Vaultwarden has a web interface, true. It's also true that I've literally never used it for anythin other than creating the users. I haven't opened it in years.

You're choosing a very petty and small hill to die on, dude. Just admit that you prefer doing it your way even if there are better alternatives.

[–] AHemlocksLie@lemmy.zip 1 points 2 days ago (1 children)

Hotspot does not imply that it needs to be wifi. You can share your internet connection via usb tethering too. (also a wild new technology, I know)

Some environments restrict USB access for security reasons. Some environments don't have extra ports to spare. Sometimes, I just don't have the right cable on hand even if the environment is otherwise fine.

This ignores how modern internet attacks work. Hackers don't sit around manually browsing websites. Automated botnets scan the entire IPv4 address space 24/7 looking for specific software signatures or known unpatched vulnerabilities. If a Nextcloud exploit drops today, a bot will breach the server before the hacker even knows what is stored inside.

No, I'm well aware of that. I mean that when the inevitable scans come, the Vaultwarden instance will freely identify itself as such. An attacker would automate the breach if they detected my NextCloud instance and had an exploit ready, but then what? The contents are too unpredictable to have a one size fits all approach from there. Even if they scan all the servers they breach for password databases, they have to contend with the fact that they still have no means to try to intercept the password. They may have a slightly easier time obtaining the database, but cracking a huge pile of password databases is an infeasible task.

Also, advertises itself to whom? I'm not exposing it to the internet

Yes, if I did it the way you want, I could avoid exposing it and allowing it to advertise itself, but then I would be unable to access it without a VPN or other networking tool.

How many reports can you find of people getting their Vaultwarden instance hacked? This is a lot of assumptions that don't track with reality.

I never said that Vaultwarden had been hacked. I said essentially that Vaultwarden is a single point of failure that I do not want to risk exposing to the wider internet, and I don't want to hide the services behind a VPN because that can complicate access. It's a little less secure, but what's the point of security if I can't actually use it myself?

You're putting your database file in nextcloud. That increases the attack surface of your solution, a lot.

Of the overall system, yes. Of the password database itself, not really. Slightly less potential security through lack of access, but with a sufficiently secure password, cracking it isn't realistic. That becomes exponentially more true if you've got a huge pile of password databases you need to crack, as would most likely be the case for anyone who breached my server.

That's *exactly *what a client for vaultwarden does...

Yes, and you're just about get to the problem I have with the client if you'd finish my sentence before you got smug with me.

Vaultwarden has a web interface, true. It's also true that I've literally never used it for anythin other than creating the users. I haven't opened it in years.

And it's great that for your personal use case, that works our for you. But before you decide to act like a smug asshole, maybe consider that not every situation can resolve as cleanly as yours. There are a lot of reasons that restricting access to a VPN can at times be limiting. Sure, at home on your own hardware, not really, but some people need the same tools for different purposes in different environments.

You're choosing a very petty and small hill to die on, dude. Just admit that you prefer doing it your way even if there are better alternatives.

Just think beyond your own experiences and accept that other people have different needs than you for a variety of reasons that they can't always control.

[–] potustheplant@feddit.nl 1 points 2 days ago (1 children)

Some environments restrict USB access for security reasons.

Where are you even trying to use your password manager???? You're absolutely batshit dude. I'm not reading this wall of text.

[–] AHemlocksLie@lemmy.zip 1 points 2 days ago (1 children)

Corporate environments don't like you tampering with how their networks are set up. You might be able to get your hands on a portable copy of your password manager or even get installation authorized, but you might not be able to force a hotspot VPN onto the machine, and you'll have a WAY harder time getting a VPN cleared than you will getting a password manager to work.

[–] potustheplant@feddit.nl 1 points 2 days ago* (last edited 2 days ago) (1 children)

You should also not be ysing a corporate laptop for your private stuff. If you do need to use it, you can do use the password manager the old way, just read from your phone and manually type it in.

Lastly, since you're proposing a corporate scenario, you wouldn't be able to install a random program on your laptop. IT would either block the installation or you'd have to explain why you're installing random programs on your work computer.

This is getting pathetic dude, just move on.

[–] AHemlocksLie@lemmy.zip 1 points 2 days ago

You should also not be ysing a corporate laptop for your private stuff. If you do need to use it, you can do use the password manager the old way, just read from your phone and manually type it in.

Yeah, but some stuff kinda blurs the line, and some stuff is just useful both places. It's not ideal, but I can maintain some separation with different NextCloud users and different database files.

Lastly, since you're proposing a corporate scenario, you wouldn't be able to install a random program on your laptop. IT would either block the installation or you'd have to explain why you're installing random programs on your work computer.

Portable versions of password managers work sometimes. There are browser extensions you might be able to use. Most notably, both of these are more likely to be authorized than a VPN tunnel into my personal machines if I even need authorization for them. In some places and jobs, you might get a little influence over what gets installed, within reason, and an open source, strictly offline password manager is less of a threat than a VPN connection to an uncontrolled endpoint. I might be able to get a Vaultwarden client, but then I'm back to exposing Vaultwarden to the open internet, which was what I didn't want to do.

[–] dogs0n@sh.itjust.works 1 points 2 days ago (1 children)

That's a fair point, I was mostly pointing out in the original comment that VPNs are an option that stops your password manager being exposed to the internet (though if their NextCloud IS exposed to the internet and is syncing their password db, then there is not much difference).

Plus you can tunnel traffic that needs to go to your VPS through the VPN, leaving all other traffic untouched (ie not tunneled), if you are worried about leaving it connected by accident. This would be max convenience.

[–] AHemlocksLie@lemmy.zip 0 points 2 days ago (1 children)

Compromising Vaultwarden provides an opportunity to inject malicious JavaScript and steal the database password when it's opened. NextCloud can never leak any info about how I open my password database.

[–] dogs0n@sh.itjust.works 2 points 2 days ago* (last edited 2 days ago) (1 children)

Any password manager could be comprimised. A bug could even be installed on your system or malware. What's the difference?

NextCloud doesn't know how you open the password db, but KeePass (for example) does, so the master pass comprimise would be with that.

Specifically the syncing part being done with any tool, doesn't matter.

Who or how are you thinking Vaulwarden is being comprimised?

[–] AHemlocksLie@lemmy.zip 0 points 2 days ago (1 children)

Sure, any manager could be compromised, but no client that handles my password database in any way connects to the internet, and all of them come from either signed Linux packages or signed Android apps. If Vaultwarden has a security vulnerability, you can steal the key and the database. If NextCloud is compromised, you can steal the database but not the key. To compromise the password manager client would require either stealing the publishing keys or getting the original author to publish a malicious version.

[–] dogs0n@sh.itjust.works 1 points 2 days ago (1 children)

I see your point, but if your server can only be accessed through a VPN, I think the risk is mitigated. Maybe I'm being naive.

[–] AHemlocksLie@lemmy.zip 1 points 2 days ago

Yeah, that would largely mitigate the risk, but this whole discussion started because I personally didn't want to do that.

[–] nibbler@discuss.tchncs.de 6 points 2 days ago

I use vaultwarden in my company - need to share some passwords/group with specific other users etc.

[–] silentjohn@lemmy.ml 2 points 2 days ago (1 children)

The one that has had multiple hacks. I'm good mate.

[–] sakuraba@lemmy.ml 1 points 2 days ago (1 children)

Do you have a source on these hacks for KeePass?

[–] silentjohn@lemmy.ml 4 points 2 days ago (1 children)
[–] sakuraba@lemmy.ml 3 points 2 days ago* (last edited 2 days ago)

thanks!

edit: oh it's phishing via ads, you could say OBS Studio has been 'hacked' in the same way

the second case assumes your computer is already compromised, I think at that point a RAM dump with my master password would be the last of my problems

[–] hellinkilla@hexbear.net 0 points 2 days ago

Way too complicated for average user.