It never made sense to me to put password managers in the cloud. Regards to what you intend it to do, you’re making it accessible to a wider audience than necessary. And yet, I’m using iCloud. It’s time for a change.

I’m thinking of just running a locally hosted password manager on my home server and letting my devices sync with it somehow when I’m at home. I have a VPN into my home network when I’m away that automatically triggers when I leave the house, so even that’s not that big an issue, but I’m really not familiar with what’s gonna cleanly integrate with all my stuff and be easy to use. All I know is I wanna kill the cloud functionality of my setup.

I already have a jellyfish server so I figured I would just throw this onto that. Any suggestions?

  • AtariDump@lemmy.world
    link
    fedilink
    English
    arrow-up
    1
    ·
    edit-2
    9 months ago

    Is the data super important to you?

    Let someone else host it.

    Bitwarden in the cloud.

    Edit: Bitwarden paying the monthly/yearly fee to BW. I wasn’t implying trying to host it yourself in the cloud.

    • tmpod@lemmy.pt
      link
      fedilink
      English
      arrow-up
      0
      arrow-down
      1
      ·
      edit-2
      9 months ago

      This. And to add to what other commenters have said, by using Bitwarden and paying for their Premium plan (very cheap, just $10/year), even if you don’t use all their features, you’re supporting a good project. It’s critical infrastructure, I think the price is more than fair.
      Either way, you should always make periodic backups from any cloud service you use, encrypted of course.

    • WQMann@lemmy.ml
      link
      fedilink
      English
      arrow-up
      0
      arrow-down
      1
      ·
      9 months ago

      Well, not wrong that it solves the problem, but with data breaches happening frequently, I wouldn’t want to repeat 1 single password for all services lol.

      Even if companies hash passwords, it’s still a gamble whether they are using an up-to-date hash algorithm (or if they do even hash it, lol). Plus, generally best to avoid exposing passwords, hashed or not, in the first place.

      • metaStatic@kbin.earth
        link
        fedilink
        arrow-up
        1
        ·
        9 months ago

        I was being facetious. Every site has multiple special requirements to make your password stronger weaker, the odds of being able to use a single one are slim even if you where dumb enough to try.

      • alienscience@programming.dev
        link
        fedilink
        English
        arrow-up
        1
        ·
        9 months ago

        I do this for sites where I don’t care at all about security. One minor tip, that will protect against automated attacks if the password is cracked, is to add part of the website name into the password (e.g “mystrongp4ss!lemworld”) .

        A human could easily crack it, but automated systems that replay the password on different sites would probably not bother to calculate the pattern.