@securopean
While i firmly believe a password manager is a good idea, the devil is in the details. The lastpass compromises, has me thinking about some stuff
Around how that’s setup and what my risks might actually be.
Also what I should tell friends and fam that I know use lastpass.
@securopean
I moved off of lastpass a while ago, but only just removed my lastpass about a month ago.
I moved to Bitwarden, it mostly what I recommend now. And I do tell people about keepass also.
And yea upcoming random pop quiz’s will happen.
yea solid on bitwarden, but looking at it more deeply.
so far, i am solid on bitwarden, and thats what i recommend. BUT: i an more deeply looking at bitwarden, and its model.
@securopean I hate to pick a nit in the context of all your good work here, but I disagree that attribution matters, and especially that it matters to our threat models.
What we know is one attacker was caught. We can't know their motives or what they'll do over time. We can make assumptions about those which (generally) lead to us convincing ourselves that all the very hard work of changing lots of passwords doesn't matter.
@securopean Take a look at the Mathematical Mesh. It is an infrastructure whose primary purpose is to manage private keys across multiple devices. It uses novel threshold cryptography to allow for a seamless user experience.
The credential vault is end-to-end encrypted and only the user's endpoints ever have decryption capability.
The system is designed to be resistance to certain types of supply chain manipulation of devices. It takes multiple compromised for any breach to occur.
It is all open source and open specification and no proprietary service either. Open as in open.
@securopean If you want to look at BW self hosted, check out Vaultwarden. Third party but, really, it should be the default option. Take a look at how that one's setup and configuration looks and feels?
I'd also argue that, in my opinion, you don't want to pick a user's master password for them. That just means they'll compromise it by having to write it down somewhere, or leave some reminders because it's not memorable. Fundamentally, if a user can't follow security practices enough to come up with something better than "password1" as their barrier to all their data, I don't think it's the job of a password manager to get in the way. It's a password manager, not an all encompassing infosec auditor hired to point out every security misstep.
@securopean I personally decided to selfhost BitWarden, largely because I trust myself to handle the inherited risks.
It also gives me the luxury of telling those that I have added to it that the attacker would need some specific pieces of information to actually mount a credible attack, which I find unlikely.
I also don’t think self hosting it is that difficult for those of us that know what to do, and encourage others to consider hosting it for their family as a way to protect them from themselves.