this post was submitted on 13 Dec 2025
-19 points (27.9% liked)

Selfhosted

53627 readers
790 users here now

A place to share alternatives to popular online services that can be self-hosted without giving up privacy or locking you into a service you don't control.

Rules:

  1. Be civil: we're here to support and learn from one another. Insults won't be tolerated. Flame wars are frowned upon.

  2. No spam posting.

  3. Posts have to be centered around self-hosting. There are other communities for discussing hardware or home computing. If it's not obvious why your post topic revolves around selfhosting, please include details to make it clear.

  4. Don't duplicate the full text of your blog or github here. Just post the link for folks to click.

  5. Submission headline should match the article title (don’t cherry-pick information from the title to fit your agenda).

  6. No trolling.

  7. No low-effort posts. This is subjective and will largely be determined by the community member reports.

Resources:

Any issues on the community? Report it using the report flag.

Questions? DM the mods!

founded 2 years ago
MODERATORS
 

So I'm using bit warden self hosted and now I'm freaking out about the very real possibility of my passwords getting stolen or lost in a fire. Having passwords on my phone makes no sense.

We need some sort of distributed password manager safety net. Like I keep your passwords safe if you keep mine. But how can I trust you? Can you trust me?

you are viewing a single comment's thread
view the rest of the comments
[–] MaggiWuerze@feddit.org 24 points 20 hours ago (2 children)

Why would your passwords be stolen? If you have a good master password you could pass around thumb drives with the database and noone would be able to acces them, wince they are securely encrypted. Having them on your phone makes no difference as long as you don't leave your phone and password manager app unlocked and out in the open (which both actively warn you against)

[–] BCsven@lemmy.ca 5 points 19 hours ago (1 children)

Use a yubikey hardware device, only the person with the hardware in hand and password can unlock your accounts

[–] MDCCCLV@lemmy.ca 5 points 18 hours ago (1 children)

You don't want that as the only option though, because you can definitely lose that and it's not incredibly hard to break.

[–] BCsven@lemmy.ca 1 points 12 hours ago* (last edited 12 hours ago)

The solution to that is you purchase a backup key and enroll both when presented with the QR image for new OTP links, or add a secondary FIDO key on some accounts. Then you store the other one in a fireproof box.

Or you use a cryptographic key and print it out using shard tool. The shard tool lets you specify how many splits and how many required for a tebuild. It prints out the shards and you distribute to safe places or people. They are useless by themselves but if you scan in the required amount of pieces the tool will rebuild your cryptographic key

[–] BCsven@lemmy.ca -3 points 19 hours ago* (last edited 18 hours ago) (1 children)

Just takes a brute force or 0 day vulnerability to get master password access, then they have everything.

Something that seems secure never is online, like the 2017 Intel managetment vulnerability where remote attackers could access your computer by sending a null password, and access your keyboard and camera etc

[–] hummingbird@lemmy.world 1 points 13 hours ago (1 children)

That's why tools like keepass allow you to require more than just a password to decrypt.

[–] BCsven@lemmy.ca 1 points 12 hours ago

Yes 2FA is good, but most people default to their phone being the tool, but your phone number can be ported by scammers, or is often the target of theft