Top
Best
New

Posted by ferbivore 10/24/2024

Bitwarden SDK relicensed from proprietary to GPLv3(github.com)
1014 points | 369 comments
solarkraft 10/25/2024|
I’m relieved. Maybe the company would have survived this somehow, but they sure wouldn’t have been the techies’ darling anymore and that was going to be expensive.

I hope they realized that being FOSS is their moat and it nets them a lot of goodwill (it’s the whole reason I bother with their not-quite-the-best product in the first place). The bold claim „the most trusted password manager“ was kind of justifiable while it was FOSS (if we don’t count keepass), without it not at all.

I’m still not sure how I feel about them now. I can now somewhat trust that the applications will remain free software, but trust in the company has eroded a bit. I still haven’t seen official communication about this.

apitman 10/25/2024||
I'm cautiously optimistic, but still concerned about the long term.

* I just don't see how taking $100 million can be good for users in the long run. By far the most likely outcomes are bloat or enshittification.

* bitwarden does not appear to be very forkable, ie it's a complex system written in C#. The existence of Vaultwarden helps a lot with this, but what about the client apps? Forkability is the second most important protection against user-hostile action, behind being open source in the first place.

I hope it works out. I'm a recent adopter of bitwarden, and so far the UX has blown keepass out of the water.

_bin_ 10/25/2024|||
The client apps can pretty easily be forked and maintained. We probably wouldn't see much feature growth but I also don't think we need that so much. Lots of OSS projects have been messed up by fundraising and communities often just fork them and keep them around so I'm not too worried. Besides, garbage features could probably just be unsupported by Vaultwarden, which has worked extremely well for me and been nothing but stable.
EasyMark 10/25/2024||
I hope that they keep it a password manager and don’t try to turn it into a “security multitool” or something. I like it how it is. They’ve been careful about adding things and I appreciate that. If they wanted to say move from an electron app to a qt or tauri app I could appreciate that as well.
retrochameleon 10/26/2024|||
The UX of Bitwarden is pretty lacking compared to 1Password. I finally made the switch after years of Bitwarden because of the vast UX improvements.

For one, it's much easier and natural to add additional pieces of information on entries in 1Password. Bitwarden's implementation of this always feels like a poorly integrated afterthought.

cryptos 10/28/2024||
The UX is exactly the reason why a stayed away from Bitwarden.
EasyMark 10/25/2024|||
Eh it’s not as good as never having the OSS’ness of it challenged but it also shows they’re open to feedback and willing to reassess when customers get out the pitchforks and torches. It’s a story as old as time.
whimsicalism 10/25/2024||
the gh or had official communication. it was obviously a dep issue blown out of proportion
blendergeek 10/25/2024||
Thank you to Bitwarden for relicensing a thing to Free/Open License! Unfortunately, I no longer recommend Bitwarden for normal people because the built-in password manager in Firefox is too good. But for anyone with more advance needs (or who doesn't trust a password manager built into a web browser, I always recommend Bitwarden because KeepassXC + syncing is way too difficult for normal people.
jasode 10/25/2024||
>, I no longer recommend Bitwarden for normal people because the built-in password manager in Firefox is too good.

But a lot of "normal people" actually need a secrets manager which is larger in scope than just a "websites urls passwords manager". This means a password manager with extra metadata fields for users to add notes, associated email aliases, etc. E.g. if a website has an extra step of "Confirm your identity by answering this question : What was your childhood pet's name?", users want a place to save the answer ("BugsBunny") in the "notes" field of a password manager.) Another example would be the secret PIN unlock code for the spouse's phone. That's not a website url, it's just a "secret" that needs to be stored in an encrypted file.

Firefox password manager is too bare-bones with the only 2 fields being "Username" & "Password".

The better UI/UX for normal people is to have a unified app to store all their secrets instead of having some secrets in the Firefox password manager and other non-web-url secrets saved separately in yet another app.

cryptos 10/25/2024|||
I completely agree with you! Almost everyone needs to store more than only usernames and passwords for websites. Think of PIN for credit cards and the like.
throwaway984393 10/25/2024||
[dead]
qwertyuiop_ 10/25/2024||||
This ^ passwords just don’t live in Firefox when you are using apps that need passwords across platforms (mac ios windows) and apps. This is where Bitwarden shines.
jvdvegt 10/25/2024||
I don't know about iOS, but Firefox syncs my passwords between my Linux machine and Android phone just fine.
ErikBjare 10/31/2024||
Your web passwords, not your app passwords.
berkes 10/29/2024||||
AFAIK Firefox also doesn't store bank-account or creditcard details.

Here's why I recommend bitwarden to "my mom":

- It stores and fills in all your website passwords on your phone and on your laptop

- It makes it easy to generate new passwords for all these places

- It stores your PIN for your bank-accounts (in many EU country payments with PIN are the default)

- It stores your creditcard info and 3d passwords or other extra secrets it requires.

- It's the perfect place to store SSN, Tax IDs, "whats was the name of your first pet?" and so on.

I've never understood the rigid structure of e.g. Firefox or even lastpass, where they e.g. insist on having an URL or even insist on a username/password. I want secret notes with optional metadata - metadata that may follow a predefined structure (username, OTP secret, url, etc) but not always. Bitwarden does this much better IMO.

PawgerZ 10/25/2024||||
Bitwarden also stores authenticator keys for MFA and passkeys. The custom fields, notes section, and attachments are invaluable to me as well.
socratics 10/25/2024|||
Absolutely, everyone I recommend BW to appreciates the notes feature as well - it's handy to have a place to jot down important things that aren't log-ins!
danpalmer 10/25/2024|||
> Unfortunately, I no longer recommend Bitwarden for normal people because the built-in password manager in Firefox is too good

Interesting, I've always felt that browser-based password managers provided remarkably little value for most people. Using them on mobile is tricky and platform dependent, it's easy to have local-only, non-synced data and then lose it, and being multi-device is trickier, especially in a work context.

On the other hand, people generally understand installing an app on each device they own and that app doing it for them.

simfree 10/25/2024|||
Firefox password sync just works. It's one of those things I never think about.

Watching friends and family struggle with bespoke, poorly integrated password managers makes me cringe and is one of the big reasons I enjoy the seamless experience of the built-in Firefox password manager.

danpalmer 10/25/2024|||
Does it require a Firefox account? Does it only store them locally if you haven't signed in to Firefox? This is the sort of failure I've seen, where people think their passwords are synced but because they didn't sign in years ago it's actually not backed up at all. At least on Chrome you get reminded of that all the time on YouTube/Google search, etc.

I know for Safari all the sync is via iCloud meaning if you're not signed in it's locally stored and vulnerable in that way. Especially as many people can't/don't sign in to their own iCloud on work computers, or don't have a Mac.

neobrain 10/25/2024|||
> Does it require a Firefox account? Does it only store them locally if you haven't signed in to Firefox?

The passwords are available offline, so they are stored locally.

notpushkin 10/25/2024|||
Firefox reminds you a bunch of times, too. Would be nice if you could just link a new device via QR code (creating an account for you in the background).
codys 10/25/2024||
The original Firefox sync worked like this (with a unique code and pairing instead of an explicit account) (this is so on the nose I suspect you may know this).

This blog post goes over some of that history: https://blog.mozilla.org/services/2014/04/30/firefox-syncs-n...

callahad 10/25/2024||
Didn't expect to click on that link and end up on a blog post I wrote 10 years ago! The old Firefox Sync / PAKE stuff was fantastic for getting sync going between devices... but people wanted backup, not sync. I wonder if we'd do anything differently confronted with the same challenge today.
g8oz 10/25/2024||
Hey I love the syncing
nox101 10/25/2024||||
it just works for websites. it does not "just work" for apps where as the platform ones do or have a chance to work with apps.

Kind of hope regulation will force apple/google/ms to allow iterations for 3rd parties to integrate with the os but on the other hand that will open a host of issues

joshvm 10/25/2024|||
It does on iOS, but I believe the onus is on the app developer to enable the autofill feature in the form, or at least make sure that the app hints to iOS that it can be filled with a password. I'm making that assumption because there are lots of apps which don't trigger the native Apple password manager either (which is a lousy user experience). However, if one works then both do. The UI offers a choice of password manager and Face ID works to unlock it.

I use both. Apple's manager supports OTP generation which is nice, but on desktop websites, Firefox is often more convenient.

phs318u 10/25/2024|||
I use the Strongbox app on iOS [0] and the KeepassXC app my Linux laptop. The passwords.kdbx file sits on my Onedrive, which the Strongbox app can access. On Linux I use a Onedrive client [0] that I use to sync several folders within my home folder. Strongbox supports both Keepass and pwSafe database formats. It also integrates well with iOS, with autofill supported (also supports Yubikey unlock and Apple Watch unlock).

[0] https://apps.apple.com/app/strongbox-password-manager/id8972...

[1] https://abraunegg.github.io/

BodyCulture 10/25/2024||
This discussion is about an open source password manager. I wonder why you are recommending a closed source software? Are you aware that many people prefer open source for security software for a reason?
KeePassium 10/27/2024||
I think most Strongbox users did not notice it turned proprietary. It's not like Strongbox advertised the change :)

Context: https://github.com/strongbox-password-safe/Strongbox/issues/...

phs318u 10/29/2024||
Correct. I did not realise this and am disappointed, having paid a pretty penny for the lifetime license. Reading the github thread, the surreptitious way they changed things is a bit of a dick move.
delfinom 10/25/2024|||
Yep, it's the same problem on Android. Some app developers go full asshole with the password text boxes. There was one electric utility here that I lambasted hard and they finally fixed their form which not only didn't trigger the password manager, it literally blocked all pasting.
monocularvision 10/25/2024|||
iOS already has all of the API required to integrate a password manager with the OS. Third party password managers can already integrate with both browsers and apps to provide passwords and password generation
mikae1 10/25/2024||||
But does it work for non-website passwords like the PIN for the door at your workplace or the usernames and passwords for your computers?
archermarks 10/25/2024||
Yes. You can add whatever passwords. It asks you for a URL but you can put anything in.
gouggoug 10/25/2024||
> It asks you for a URL but you can put anything in.

Well, that’s kind of the problem isn’t it?

Yes, you can put bogus URLs, but it’s far from a great user experience

RamRodification 10/25/2024|||
door://businesstreet/23/A/front
globular-toast 10/25/2024|||
Someone understands URLs! The URL will be 30 years old soon[0], and still many people don't know what it really is.

[0] https://datatracker.ietf.org/doc/html/rfc1738

bowsamic 10/25/2024||||
No end user understands URLs this way. Unless Firefox teaches them this, then this is nonsense
RamRodification 10/25/2024||
Yes, It's a joke. Sorry
bowsamic 10/25/2024|||
Is it? I thought you were being serious
RamRodification 10/25/2024||
Yes, it's a joke. Sorry.
bowsamic 10/25/2024|||
Why, though? Isn't it actually a good suggestion?
nutrie 10/25/2024||
Agree! And it's funny.
tverrbjelke 10/25/2024|||
Where is the joke? I don't get it!
eitland 10/25/2024|||
Why not both?
dbolgheroni 10/25/2024|||
Not supported. It can't be anything.
INTPenis 10/25/2024|||
Technically maybe someone could make you navigate to that url in the future, through mitm or some sort of DNS poisoning, and autofill a form with your password and then auto submit it.
ClassyJacket 10/25/2024||||
Can Firefox password manager work in other apps on Android?
attendant3446 10/25/2024|||
Looks like yes[1]

1. https://support.mozilla.org/en-US/kb/end-of-support-firefox-...

kome 10/25/2024|||
yes and it's perfect. firefox (with ublock) are really the best experience on android.
Nathanba 10/25/2024||||
that's not my experience, I've lost bookmarks due to firefox sync multiple times.
_fs 10/25/2024||||
Does it have the ability to unlock with faceID on ios?
phaerus_iconix 10/25/2024||
Yes it does.
jorvi 10/25/2024||||
That is such a laughable statement. 1Password has incredible UI/UX. Even has e-mail masking with Fastmail. And auto-enters TOTPs, for the less-important one’s you feel comfortable saving in your password manager.
miki123211 10/25/2024|||
Firefox sync made the criminal sin of implementing end-to-end encryption, enabling it by default, and being insufficiently clear to people that their passwords are lost forever when they forget the master password.

This provides a really terrible UX to "normal" users. I woulnd't recommend that option to anybody who doesn't already know what E2E is and what tradeoffs it has.

Google's implementation is a lot better in that regard, at least they offer plenty of avenues for account recovery.

KPGv2 10/25/2024|||
Can you identify the password managers that do not implement end-to-end encryption so I can avoid them forever?
bandrami 10/25/2024|||
Presumably the passwords themselves have recovery/reset procedures? I can't think of a good reason to add another risk surface to a password manager given that
mrwm 10/25/2024||||
I'm not sure how it is on iOS, but I've been using firefox as my password maanger on android. It's a trivial change in the settings and works across all apps as well.

I also recommend it to my friend group, as they can use firefox with uBlock Origin, and also have their passwords synced.

tetris11 10/25/2024|||
Yep, since Android 12 I think you can set Firefox as your main password manager.

It's genuinely delicious

lrem 10/25/2024||||
All serious browser vendors offer sync to logged in users. That’s multi-device, cross platform and pretty foolproof. I still prefer Bitwarden because of self-hosting and integrating nicely with the iOS ecosystem. But there’s not much wrong with the browser approach.
usrusr 10/25/2024||
Multi device is all nice and well, but what if you use products from more than one browser vendor?
lrem 10/25/2024||
Then you’re a rare corner case that’s served by something third party.
CJefferson 10/25/2024||||
I have the opposite problem. If I forget to log into bitwarden, passwords just get saved into firefox / chrome, so now I've got some passwords in bitwarden, some in chrome, some in firefox, and worst of all bitwarden doesn't seem to have an easy way to unify these databases.
trinsic2 10/25/2024||
That's a bit much to put on a 3rd party password manager.
CJefferson 10/26/2024||
I have the plugin installed in my browser, why does it wait for me to log in the come to life?
floydnoel 10/25/2024||||
> people generally understand installing an app on each device they own and that app doing it for them.

an app like Firefox or Chrome, perhaps?

danpalmer 10/25/2024||
This is obviously true for the HN crowd, but for normal people I think there's a distinction. Don't underestimate the value of centering a brand and an icon on a home screen around a single function.
JoshTriplett 10/25/2024|||
> Interesting, I've always felt that browser-based password managers provided remarkably little value for most people.

They provide the value of "you should, by design, have no idea what most of your passwords are; if you know any significant number of your passwords you probably have bad passwords".

And both Firefox and Chrome sync passwords between devices.

wruza 10/25/2024||
This is the value of any password manager, not a browser-based one.
JoshTriplett 10/26/2024||
The comment I was replying to said "browser-based password managers provided remarkably little value"; it didn't say "little value relative to other password managers".

Much as with cell phone cameras, "the best camera is the one you have with you"; the best password manager is the one you have with you.

wrasee 10/25/2024|||
If Mozilla released a separate passwords app so you could manage and access your passwords outside of Firefox I think the two would be more comparable. That would promote your passwords as part of your Mozilla account, not just Firefox.

Bitwarden excels here, and i think is the model to beat. However, Mozilla would have the advantage since their browser integration would essentially be built-in and first class.

Otherwise, unless you use Firefox exclusively for everything I just don't think a single browser is the right place to manage passwords. I would say that's true even for a broad audience, given the importance of passwords and security in the modern age.

Bitwarden is also nice in that you can "lock" access to your passwords while keeping the browser open. That way, for the 99% of the time you're just browsing the internet you essentially don't have access to all your passwords "open". The last time I looked at this I had to enter my master password on opening Firefox, even if I didn't need access to my passwords. That meant that "unlocking your vault" is essentially tied to opening the browser. That alone was enough for me to bail on it.

openopenopen 10/25/2024|||
> If Mozilla released a separate passwords app so you could manage and access your passwords outside of Firefox I think the two would be more comparable

They used to have one called LockWise https://support.mozilla.org/en-US/kb/end-of-support-firefox-...

greensh 10/25/2024|||
there used to be an android/ios app by mozilla called lockwise which did exactly that iirc. https://support.mozilla.org/en-US/kb/end-of-support-firefox-...
wrasee 10/25/2024||
Ah yes I remember that now, I had forgotten about that!

Funny, especially now that I see Apple are now going the other way with a dedicated "Passwords" app on iOS 18 and macOS 15. And for Apple to do this - against their instinct for featureless simplicity and implicit integration - to give passwords their own "shop front" as a dedicated app I think really does acknowledge the first-class importance that passwords now have, even for a broad audience.

It's a shame as I think Mozilla could really compete well in this space. They are both cross-platform, have their their own browser and have a good reputation on privacy. It's a killer combo. Bitwarden is evidence you can make it work and you don't need massive big-tech budgets to make a difference.

techwizrd 10/25/2024|||
I'm glad that Bitwarden moved quickly to resolve this. At least for me, Firefox's password manager isn't really a replacement. Bitwarden is approved by my employer, self-hostable, and supports logins for the litany of apps across my browsers and mobile devices. Whether it's the mobile app, mobile website, or site in my browser, Bitwarden just works for the most part. It's also quite nice that Bitwarden can store arbitrary information like CCs, secure notes, and how I capitalized the answers to security questions and other account recovery/login information.
ValentineC 10/25/2024|||
> It's also quite nice that Bitwarden can store arbitrary information like CCs, secure notes, and how I capitalized the answers to security questions and other account recovery/login information.

+1. I use my password manager (currently 1Password, but I have been looking at self-hosting Bitwarden/Vaultwarden) more for storing credit card information and security questions.

Most built-in password managers don't cut it on that front.

psd1 10/25/2024||||
It's more than self-hostable!

There's at least one API-compatible alternative (vaultwarden) which works with the official client.

Yay to breaking down walls.

seabrookmx 10/25/2024||
Vaultwarden is great! I've been running it for years (since it was bitwarden-rs) on a free-tier GCP VM. I use a cronjob to back up the DB to Backblaze B2 with rclone.
trinsic2 10/25/2024|||
Its Bitwarden only for personal use. Do they have a solution for Multi-use password sharing?
bloopernova 10/25/2024|||
Yes, my wife and I each have our own bitwarden account, and an "organization" where shared passwords go. It's worked great for quite a few years now.
leshenka 10/25/2024|||
in Vaultwarden you can have "organizations" that are like groups of people and you can have passwords there that are accessible by members

No idea how this maps into Bitwarden's own offerings though but all clients support this kind of thing

spiffytech 10/25/2024||
The downside is you can only share to other users on your Vaultwarden instance. You can't e.g., set up emergency sharing to family members who use cloud Bitwarden.
leshenka 10/25/2024||
well this is true the other way around

BW clients support having several accounts at once so you're not forced to choose. Your family can have a regular bitwarden.com account and your vw.example.com account just for emergency access

ahiknsr 10/25/2024|||
> Unfortunately, I no longer recommend Bitwarden for normal people because the built-in password manager in Firefox is too good.

I use both Bitwarden and Firefox and I would strongly encourage everyone to not use the password manager in Firefox. Do you know the tab sync across devices is broken in firefox? It was broken since Aug 24 and it is still not fixed https://bugzilla.mozilla.org/show_bug.cgi?id=1913795 . If they can't sync tabs across devices, i wouldn't trust them to sync my passwords.

digital_voodoo 10/25/2024||
Interestingly, password syncing is one of the most reliable things I've seen Firefox doing during the last years. If you don't even have to think about it, that means it "just works"
gertop 10/25/2024|||
Firefox's password manager stores passwords in clear text unless you use a master password (very few people do).

This means that any process on the computer can read them.

It also means that, unless you also use full disk encryption, a stolen device means you're fucked.

Chrome and Safari use the OS's keychain at least, so there is some level of security.

And a standalone password manager has its own encryption.

mikehotel 10/25/2024|||
This has been the case for a long time, and has not changed even in 2024. Please use a Primary Password if you are storing passwords in Firefox.

https://support.mozilla.org/en-US/kb/where-are-my-logins-sto...

sublimefire 10/25/2024|||
Browser password managers and their related files are the usual targets of the sophisticated malware creators. Not many people use good master passwords either if any.
alerighi 10/25/2024|||
I think that the Firefox password manager is good, however, relying on the browser is a terrible form of vendor lock-in. You need to use another browser (for any reason), you also need to switch password manager. Also, Firefox on Android is not great, and Bitwarden has a better integration.

Finally, Bitwarden (the payed version) manager also passkeys and OTP codes, the Firefox password manager not.

klabb3 10/25/2024||
I use both, and I agree, even if I’m very happy with Firefox. There are lots of apps outside of browsers that need passwords. It’s very common these days. Besides, does it support passkeys? That’s getting increasingly common as well.
bigfatfrock 10/25/2024|||
> because KeepassXC + syncing is way too difficult for normal people

I've been debating for ages if this is a hurdle that can be overcome by packaging or even hand-holding support. When I show "normal people" my pass+sync setup they beg me to implement it for them. Once it's running it's near-zero maintenance.

dcow 10/25/2024|||
Password management is like exercise. Even when people say they understand the value and want to do it, they don't. Even if you implement it for them, if it's not something that slots perfectly into their existing routine, they're not going to do it. Thankfully passkeys are here.
tjoff 10/25/2024||
It's fine, even bad password management is better than passkeys.

Thankfully the incredible hype for passkeys has been dead for years now and people are starting to question it.

runiq 10/25/2024||
Is this... is this sarcasm? I honestly can't tell anymore.
tjoff 10/25/2024||
It is not.
archi42 10/25/2024||
Would you care to elaborate? It also matters what counts as "bad password manager" to you - Poor crypto? Poor UX? A reddit post ;-)? LastPass?

With passkeys, both the website and the user can be pretty sure that the "password" is secure. The website knows that it's based on enough entropy, and the user knows that the website can not loose it.

Of course if I use a random generated 80 char password I only mildly care if the website stores it plain text or not.

But if I was a site operator, I could additionally trust that the users are using secure passwords. Without insane strength requirements (which people only work around anyway, e.g. Passw0rd!123 is usually accepted, but thisisasuperlongpassphrase often is not).

I'm in the business of testing security, which means I sometimes crack passwords. No matter how much training you put your employees through: Somebody gonna use ${some name}${0 or 1 special char}${some birthday} - is it's the spouse, kids or affairs data, your guess is as good as mine.

tjoff 10/26/2024||
Management, not password manager.

I'm not talking about technical merits, we all know passkeys are so complex they might work decently as obfuscation alone ;)

No, all that crap is meaningless when you give all your keys to an entity that simultaneously locks you in and couldn't give a fuck about you.

cryptos 10/25/2024||||
I did that for quite some time, but I had severe issues with multiple editing users and with android apps. All the tricks I tried, like nested vaults didn't fully work in the end. So I ended up with 1Password.
przmk 10/25/2024||||
Where did you manage to find "normal people" that begged you to install a password manager for them? I have yet to come across one person who wanted one.
archi42 10/25/2024||
There are normal people out there who have been hacked, or knew someone who was.

Also, some normal people are computer-smart enough to understand problems like credential-stuffing, if someone explains it to them.

lie07 10/25/2024||||
Would love to know how you have it setup.
peterpans01 10/25/2024||||
can you share how do you set this up?
freeone3000 10/25/2024||
I store the password vault in dropbox. Done.
dcow 10/25/2024|||
100% serious question: how is using dropbox (one cloud) to sync passwords any better or more secure than using a password manager that syncs your vault for you (another cloud)? I see so many "I don't trust <insert pw manager> so I use dropbox" comments around these parts and I just don't understand what real or perceived threat is being mitigated.
Brian_K_White 10/25/2024|||
It's valuable that the syncing mechanism is seperate because that makes it agnostic. Parent comment uses Dropbox, I use Google Drive, someone else uses OneDrive, someone else uses iCloud, someone else uses Syncthing or Nextcloud, etc.

You don't have to trust the single cloud provider to encrypt and not be able to spy. The vault is encrypted on your own device using fully open software, and the cloud only ever sees a blob they have no keys to, directly or indirectly. The encrypting/decrypting software was not written by the cloud provider.

You don't have to trust any single cloud provider to stay up, be available in your country, stay friendly to you. If Dropbox goes down or kills your account, you just flip to any of 20 other options.

You say you don't understand why someone prefers Dropbox over the special custom syncing, but I don't understand what the excuse is for a special vendor-specific implimentation of something that is already generic and agnostic. It's like using a browser that uses it's own version of http to download files and only works with one web site that has the matching special server.

It's not a remotely equivalent comparison between "one cloud" and "another cloud". One is a single vendor-specific, custom purpose, single-provider thing, the other is agnostic and infinite, use any method you want from any provider you want any time you want.

For me it's not about "mitigating a real or percieved threat". It's just basic system resilience and principle to avoid special things and prefer generic/agnostic things, and keep concerns seperated. But it is also more secure not to trust any integrated cloud provider, vs having the cloud be just storage that doesn't know anything about the blob being stored, and can't even if they turn bad, or are pressured by a government, or get hacked, etc.

chpatrick 10/25/2024||||
I guess the idea is that you trust open source software to encrypt the vault, so Dropbox couldn't do anything with it even if they wanted to. That's also true for the open source Bitwarden clients though.
freeone3000 10/25/2024|||
It’s small enough for dropbox’s free tier so it saves me a subscription.
dcow 10/25/2024||
Ah! Threat to the wallet I see. That Dropbox referral credit must still be paying dividends.
teo_zero 10/25/2024||||
> store the password vault in dropbox

No local backup? Do you rely on the network working all the time?

I do something similar on the mobile phone (the reasining is, if there's no network, there's nothing I need to login to) but I also keep a local copy on my laptop (that I sometimes operate with limited connectivity). Without any automatic syncing, one of the two copies will be stale.

anilakar 10/25/2024|||
Back in the day we tried to sync KeePass vaults at work and ended up with a conflict about once a week, which is way too often. Not sure if other password managers have solved this.
Dylan16807 10/25/2024|||
> No local backup? Do you rely on the network working all the time?

Normal dropbox behavior keeps a copy on every computer.

teo_zero 10/26/2024||
> Normal dropbox behavior

Ah, you mean by using some app or daemon. I excluded that possibility because on at least one of my laptops I'm not allowed to install anything, so for me "normal" behavior is using Dropbox as a container for files to download when needed.

Dylan16807 10/26/2024||
Well if you do that then you get plenty of copies; just restrain your delete key finger a bit. It does risk some staleness, but only rarely.

And maybe you could write a small shell script to keep that particular file up to date?

Also the one program I've used that opens keepass files directly from dropbox servers keeps a local copy.

gregwebs 10/25/2024||||
I did this a long time ago but eventually ended up with conflicts. Password managers write new entries in a file and easily avoid conflicts whereas agnostic file managers will immediately conflict if sync wasn’t working for a while on a device
sublimefire 10/25/2024||
I use it (Keepass) for a while and never got the conflict on the desktop client (osx), nor on Firefox. But the iOS app does not like the file on the Google Drive and occasionally it needs to be reloaded.
ekianjo 10/25/2024||||
You can use syncthing too. Works just as well.
dwightgunning 10/25/2024||
Is there a robust Syncthing app for iOS? Last time I checked there was only an affiliate project and their story wasn't convincing.
subarctic 10/25/2024|||
I use mobius sync and I'd say the app itself is fine, you just have to open it whenever you want things to sync. That's one of the things I miss from Android. Also you can't sync your camera folder
jcotton42 10/25/2024||||
Mobius Sync works really well, the only caveat is that it's not completely free (you're limited in the sync size unless you pay $5, but that's a one-time thing), and that while it can background sync, it's not continuous, and you'll want to open the app if you need to make sure something's synced.
dsp_person 10/25/2024||||
it was just discontinued for android :(
conradev 10/25/2024|||
Nope. I have a cloud Syncthing box that is accessible over SSH, and I use ShellFish to read/write my synced folders. It works okay, especially for lazily sending stuff from my phone to my laptop.
SkiFire13 10/25/2024|||
Instructions unclear, I have no password vault.
kcmastrpc 10/25/2024||
Right, doesn't everybody just use the same password everywhere? I don't see the point of these things.
KPGv2 10/25/2024||
You laugh, but that's apparently what I did a decade and a half ago.

I recently mounted a HDD that was at my parents' house. Most files are from 2009-2012ish. I was there one summer between undergrad and grad school and used it for a couple months.

I found an Opera password list that I'd exported, presumably to copy over to my new laptop. It was fun last night skimming the list, seeing which websites I'd completely forgotten about that I used to have accounts for. Almost none of them even exist anymore besides the big players (Slashdot, Apple, etc.), but the point is *almost all of them had the same password*. o.O

sigzero 10/25/2024|||
KeepassXC also doesn't have templates for things. It's in the works. When it comes out I might take another look at it.
elric 10/25/2024|||
I recommend Bitwarden family plans to non-technical people. It's pretty user friendly, and you can give people emergency access. A couple of recent deaths in my life have made me painfully aware that this is something that many people really need.
bloopernova 10/25/2024||
Gen X and boomer techies are getting older.

It's kind of funny to see how gen x in particular deals with aging. For example, menopause memes as gen x women hit perimenopause. We're supposed to be all nonchalant and cynical, and it's interesting to see those attitudes hit the immovable object of aging.

Ayesh 10/25/2024|||
I used Firefox password manager for years, and moved to Bitwarden for: - Passkey syncing - Bitwarden on Android works properly, compared to Firefox's dedicated password app that's abandoned. - TOTP support (to use with some apps I don't want the strongest security)

But you are maybe right, if the only browsers you use are Firefox desktop/mobile.

lxgr 10/25/2024|||
Can it store TOTPs and passkeys as well? These are two things encountered even by "regular people" more and more.

Especially keeping passkeys platform-independent is a huge advantage, in my view.

freedomben 10/25/2024|||
There will always be different opinions, but my opinion is that storing your TOTPs in your password manager is at best a reduction in security because you're reducing your 2 factors down to 1 factor. If the password manager gets compromised (even phished! It needn't involve the password manager's servers getting hacked), then you gain nothing by having 2FA enabled.

I would strongly advise using something like Aegis on Android, or Gnome Authenticator on desktop (or both). I like to duplicate/backup my seeds so that I'm not SOL if my phone breaks, but I do it by having them on my laptop, desktop, and phone. That way as long as I have one of the three devices, I can always get in, and then they're not "in the cloud." Though, "in the cloud" is still better than "in the cloud alongside all my passwords."

dcow 10/25/2024|||
The only true 2nd factor is a setup where your totp codes live on a separate piece of physical hardware. If your totp codes are in an app on your phone, and your password is in a different app on your phone, you're not pure 2nd factor despite convincing yourself that you are. Anything that is convenient is not real 2FA. Real 2FA needs to be pick two of: a password in your head, a verifiable biometric signature, a code/key on your phone or separate physical hardware yubikey.

I'm not saying I think everyone needs real 2FA. I think 99.999% of the time storing your 2FA codes in your PW manager, or just moving on to Passkeys, is the right answer. 2FA is a hack put in place to mitigate passwords being relatively insecure and phishable. It's supplanted by Passkeys.

freedomben 10/25/2024|||
I think you're letting perfect be the enemy of good. It doesn't have to be pure 2FA to be better than 1FA. Being in separate apps does give some benefits. It's always going to be harder to compromise two apps than it is to compromise just one of them (even if the difficulty increase is marginal, it's non-zero). Often simply not being low-hanging fruit is enough to save you from an attack.

There are plenty of things for which a 2FA in PW manager is fine, but the most important things I think it's an unnecesary and regretful reduction in security. For example, email account. Email is the "forgot password" way to get access to almost everything, so it's worth a trifling inconvenience in having to load your 2FA into a different app. Same with things like AWS, Cloudflare, and other high-value targets. For the vast majority of people, keeping your Twitter seeds in your PW manager is fine, but it's foolish to do that with your email and other high-value targets, and IMHO if you're already going to have to have two apps, you might as well just standardize and keep the seeds in your authenticator app, and your passwords in your vault. YMMV

dcow 10/25/2024||
No I’m specifically not. Did you read my 2nd paragraph? It’s essentially your argument here.

The person I was responding to was arguing that totp in pw manager is no good. Maybe you meant to reply to them and not me?

freedomben 10/25/2024||
I did read your second paragraph. There is some ambiguity, but I ultimately decided you weren't agreeing with me because you said (emphasis added):

> I think 99.999% of the time storing your 2FA codes in your PW manager, or just moving on to Passkeys, is the right answer.

If you're storing your 2FA codes in your PW manager, then you're NOT using separate apps. You're using the same app (your PW manager). My argument is that you should use separate apps for the things that matter, like your email (which can be used to get access to almost every other account), and since you're already using separate apps for those things, you might as well just be consistent so you don't have to remember where each TOTP token is stored.

I see three levels we've discussed:

1. Pure 2FA using hardware token or equivalent (which I agree is rarely needed)

2. Impure 2FA but separate app for storing passwords and TOTP tokens (which I'm advocating for)

3. Storing TOTP tokens in PW manager (which you appear to be arguing for in 99.999% of cases, which is basically all of them)

If you are actually advocating for level 2, then we agree, but from reading your 2nd paragraph it seems pretty clearly to be arguing for level 3.

dcow 10/25/2024||
I may be arguing for (3) but then I’m not letting the perfect be the enemy of the good. I don’t fancy the security types that do that.
KPGv2 10/25/2024||||
> Real 2FA needs to be pick two of: a password in your head, a verifiable biometric signature, a code/key on your phone or separate physical hardware yubikey.

My thumbprint isn't stored on my phone, so I have two factors.

From the PCI Security Standards supplement on MFA,

> The issue with authentication credentials embedded into the device is a potential loss of independence between factors—i.e., physical possession of the device can grant access to a secret (something you know) as well as a token (something you have) such as the device itself, or a certificate or software token stored or generated on the device. As such, independence of authentication factors is often accomplished through physical separation of the factors; however, highly robust and isolated execution environments (such as a Trusted Execution Environment [TEE], Secure Element [SE], and Trusted Platform Module [TPM]) may also be able to meet the independence requirements.

So your phone can constitute a token, while the biometric constitutes the second factor. I don't know about Apple phones, but Google's requirements for biometrics are:

> Capturing and recognizing your fingerprint must happen in a secure part of the hardware known as a Trusted Execution Environment (TEE).

> Hardware access must be limited to the TEE and protected by an SELinux policy.

> Fingerprint data must be secured within sensor hardware or trusted memory so that images of your fingerprint aren't accessible.

dcow 10/25/2024||
I think you misunderstood me. I agree that biometric plus password or device key would constitute two factors. I perhaps believe that you can’t really trust the device to have performed biometric verification without some sort of software attestation. So if the security if your protocol depends on two factor, you’d need to yes have a biometric signature or remote attestation that a biometric check has been performed.
lxgr 10/25/2024|||
> Anything that is convenient is not real 2FA.

That's a pretty user-hostile attitude. Sure, some combinations of factors are pretty unergonomic, but I'd call that a bug, not a feature.

It's also incorrectly suggesting that somehow complexity/painful usability automatically yields security, while usually the opposite is true:

An effective secure authentication solution absolutely must consider usability, or it's doomed to be circumvented by users in one way or another (either via some insecure practice, or by your users simply ceasing to be your users).

dcow 10/25/2024||
I’m speaking to how things are practically implemented, not making a statement about ideals.
czarit 10/25/2024||||
This depends on the threat model. Having 2FA in the PW manager defends against someone phishing the password and database leaks on the server side, which are the most common in my threat model. But note that if they can phish your pw, they can probably phish your 2FA as well.

It does obviously not protect against the scenario where someone is breaking into your password vault.

I tend to enable 2FA but conveniently save the token in the PW manager for relatively low equity stuff, just to make it less enticing for an attacker, but use hardware FIDO for everything actually important.

guerby 10/25/2024||
Same here.

TOTP is trivially phishable via evil nginx just like your password, and via social engineering.

FIDO2 is not phishable and you have no secret to give out to social engineering attacks.

KPGv2 10/25/2024||
> TOTP is trivially phishable . . . via social engineering

Is it? I've been on the Internet since the 80s and haven't been phished a single time (despite being the recipient of many obvious attempts). Maybe I could be phished, but I think that's evidence it's not trivial.

I have to wonder how many people sophisticated enough to use and pay for a password manager like Bitwarden could be "trivially" phished.

lxgr 10/25/2024||
That's great for you, but also a sample size of one (probably technically sophisticated) user, i.e. irrelevant to the bigger picture.

The phishability of TOTP really is exactly as bad as that of passwords, except that a once-phished TOTP isn't reusable by the attacker(s), unlike a phished password.

But even one-time access is often catastrophic, especially if it allows the attacker to rotate credentials.

AyyEye 10/25/2024||||
Sometimes the TOTP is forced on me for a service I really don't care about. That's most of mine, actually.
freedomben 10/25/2024||
Indeed, when that's the case I think the PW manager is fine.

Though, if you already have to have an app for the important stuff like your email, then IMHO it's actually simpler to just keep them all in one place even if you don't care too much about some of the tokens. Just one less thing you have to remember (i.e. where did I put service X's token again? was that in bitwarden or Aegis? etc).

saint_yossarian 10/25/2024||||
It's still 2 factors though, if someone discovers your password they don't automatically know the TOTP key. So I use TOTP in my password manager for sites where I wouldn't use 2FA otherwise (because using my phone would be inconvenient), so it's still a security improvement for me. And for critical accounts I do use Aegis on my phone.
hsdropout 10/25/2024||
That's not 2FA, that's two of the same factor.

The factors are:

- Something you know

- Something you have

- Something you are (biometrics)

lucideer 10/25/2024|||
That list makes for a nice slidedeck but the separation (like many things in tech) isn't as clear cut as the metaphor.

"Something you know" (password) becomes "something you have" as soon as you store/autogenerate/rotate those passwords in a manager (which is highly recommended).

"Something you have" in the form of a hw key is still that device generating a key (password) that device/browser APIs convey to the service in the same way as any other password.

"Something you are" is a bit different due to the algorithms used to match biometric IDs but given that matching is less secure than cryptographic hash functions - this factor is only included in the list for convenience reasons.

The breakdown of this metaphor is one of the reasons passkeys are seen as a good thing.

saint_yossarian 10/25/2024|||
Not sure what you mean, it's still a second unique token that an attacker would need to know to access my account, so it's improving my security even when stored in my password manager. This was in response to grandparent's opinion that it's "at best a reduction in security".

I'm not talking about my password vault getting breached, in that case I'd be fucked either way.

freedomben 10/25/2024||
> I'm not talking about my password vault getting breached, in that case I'd be fucked either way.

But that's the whole point. If your password vault is breached, the second factor is what prevents you from being fucked. That's why putting your seeds in the vault is a reduction in security. It may be a reduction/risk that you're willing to take for convenience, but it's still a reduction.

lucideer 10/25/2024||||
Aegis is no more secure than storing your TOTPs in your password manager - 2 factors primarily protect against remote attacks, which don't have direct access, in which case the app your 2nd factor lives in is moot. If your threat model involves direct access you need dedicated hardware for your 2nd factor. Most people are fine with TOTP in pw manager.

(I do use Aegis as I like the UX but that's a separate topic)

magackame 10/25/2024||||
Doesen't having the seeds available on all of the devices make it not 2FA? You now need only one device to login at any given time.
mason55 10/25/2024||
The second factor isn’t a second device, it’s the TOTP code.
AStonesThrow 10/25/2024||
No, factors are supposed to have different qualities, such as:

"Something you know"; "something you have"; "something you do"; "something you are [biometrics]"; "somewhere you are [geolocation]".

Passwords are in your head - "something you know".

TOTP codes are generated by a hardware token - "something you have".

If the TOTP codes are crammed into your password manager, then the factors are no longer distinguished by these qualities, but they're now the same factor, and it's not true MFA anymore, whether or not they're split up across devices, or apps.

ivanfilhoz 11/5/2024|||
Actually, they are pretty much split up. To get access to my passwords and TOTP secrets, the attacker needs one of my devices (something I have) and its password (something I know) or my face/fingerprint (something I am).

The whole point of a fully featured password manager like 1Password or Bitwarden is to rely on it instead of the security of the service you're using. And that implies that you must trust the security of the vault itself.

Of course, each device you have is an additional (an equally dangerous) attack surface. However, most people should be more worried if someone hacks into their devices than their Facebook accounts anyway.

akho 10/25/2024|||
2FA via TOTP implies two things: 1) you know a password; 2) you know the seed. This is why people criticize that approach. In practice, knowing a password and having a file (seed) seem different enough, and work against some phishing threats.

Logging in through a password manager requires that you know a password (your master password), and have a file (your vault).

KPGv2 10/25/2024||
Or alternatively something you are (fingerprint) alongside something you have.
odo1242 10/25/2024|||
I mean, if you're using a password manager, you're already protecting against 99% of the things that 2FA is designed to protect against. If you really wanted to, it would probably make the most sense to enable 2FA on your password manager?
ivanfilhoz 11/5/2024||
Not really — I do it just for peace of mind, TBH. Although your primary password could be cracked somehow, so it doesn't hurt to have this additional layer.
odo1242 10/25/2024||||
Yes, through TOTPs will run you a (worth it imo) $10/year subscription. Passkeys have been supported for a while (free) on all major platforms, and I haven't seen any issues with it.
Uvix 10/25/2024|||
Yes, Bitwarden can store both.
lxgr 10/25/2024||
I was referring to Firefox with that question.
odo1242 10/25/2024|||
It can't, you need a browser extension for that.
Uvix 10/25/2024|||
Ah, sorry for misunderstanding.
ants_everywhere 10/25/2024|||
Given that Mozilla just acquihired a bunch of Meta advertising execs, I think the prudent plan would be to cautiously diversify away from putting sole trust in Firefox.
vitro 10/25/2024|||
> because the built-in password manager in Firefox is too good

If only they could add labels to the name/password combination. I have several accounts stored for a website, with generated gibberish logins that I cannot change and sometimes it takes me multiple tries to get to the correct account.

Also, sometimes a site has two password fields - two secret codes - and for this usecase the password manager doesn't work very well either and remembers only one field.

Other than that, I love how it just works, you add a password on one device and have it seamlessly available on the other with a very little setup. It's a nice experience.

vitro 10/25/2024||
> have several accounts stored for a website

Another usecase for named logins are those multiple routers that you administer for your friends and family that all have http://192.168.1.1

sph 10/25/2024|||
> the built-in password manager in Firefox is too good

Too good in what way that according to you "normal" people shouldn't be using Bitwarden? Or do you just like the Firefox one but are overselling it a bit too much?

I use Firefox, but I do not trust the Mozilla products. Bitwarden costs me $10/year so I wonder what is so amazing and groundbreaking about Firefox password sync, and does it work across browsers?

pmontra 10/25/2024|||
What if you want to use a password where you don't have Firefox installed or from somebody's else computer?

The same applies to the password manager any other browser.

I carry with me my keepass db inside my phone and I can use it anywhere at any time.

angra_mainyu 10/25/2024|||
For me, the reason bitwarden is excellent is sharing account login data with my family (I have an org account w a few members) for next to no money / year.

Also, I regularly hop between 3 machines + a personal phone and a work phone, and I love being able to have access to my logins + secure notes across all 5 devices.

All for the cost of a coffee/month.

t0bia_s 10/25/2024|||
Syncthing android app is not developed anymore. Hopefully syncthing-fork will be.

https://old.reddit.com/r/Syncthing/comments/1g7zpvm/syncthin...

SPBS 10/25/2024|||
Built-in password managers don’t work across apps. They only work for the browsers they’re built into.
ezst 10/25/2024|||
What finally brought me to using BW was that I simultaneously needed to backup/sync my TOTPs across mobile/desktop devices, and came to have the need for sharing an increasing number of passwords with my SO. It delivered beautifully on all of that.
CaptainNegative 10/25/2024||
This isn't an area I know much about, but wouldn't there be a security risk involved with storing the TOTP seeds alongside the passwords? Or is that not a real concern?
ezst 10/25/2024|||
Totally correct, the lame excuse being that it didn't make the situation worse for the reason that those factors were anyway authenticated using the same device previously already. But at least I am now in much less trouble in case this device gets lost/broken/stolen/…
3np 10/25/2024|||
It's a valid concern. Especially if you use the same BW for password and TOTP for the same service, you've effectively reduced 2 factors to 1. If you really must sync both your TOTP secrets and your passwords, those should be completely separate systems.
Shorel 10/25/2024|||
> Unfortunately, I no longer recommend Bitwarden for normal people because the built-in password manager in Firefox is too good.

I don't doubt the quality of Firefox's password manager, or your honesty.

But normal people just don't use Firefox.

blendergeek 10/25/2024||
Normal people don't use Bitwarden either. And I suppose I don't know any normal people which isn't too surprising.

Normal people use Apple's built-in password manager.

slightwinder 10/25/2024|||
> I no longer recommend Bitwarden for normal people because the built-in password manager in Firefox is too good

I wouldn't say it's good, but it does its job, if you can live with the insecurity and limitations. It's very comfortable, which is the only reason I'm still using it over KeePass and Bitwarden. KeepPass has no reliable Browser-integration, and Bitwarden is hard to selfhost. Firefox Passwordmanager is just there, always works, syncs without hassle, usability at it's peak (for this job).

seabrookmx 10/25/2024||
Have you tried vaultwarden (formerly bitwarden-rs)?

It's trivial to self host. I've been running it in a GCP free tier VM for years.

slightwinder 10/28/2024||
Yes, I know vaultwarden. And it's indeed simple to start the docker-container. But no every use case can be satisfied with docker.
seabrookmx 11/2/2024||
Unless you only have non-Linux hosts available, this use case can :)
xnzakg 10/25/2024|||
I actually switched from Firefox's password manager to Bitwarden. There used to be a bug on Android where the autofill button sometimes would stop doing anything.
Thaxll 10/25/2024|||
Keepass file on Google drive is kind of trivial though.
throwuxiytayq 10/25/2024||
Never store anything remotely important on a Google service.
arnavpraneet 10/25/2024|||
I know we are kidding but damn the news Google Drive is being sunsetted by December would ruin a lot of people's days
ClassyJacket 10/25/2024||
At this rate they'll sunset google search and their advertising business just because.
teo_zero 10/25/2024|||
Never store the only copy of anything remotely important on any online service.

Storing copies is ok, though, provided that sensitive information is encrypted.

Anunayj 10/25/2024|||
Can someone also comment on how secure the built in password in manager in Firefox is to unsophisticated malware attacks that simply copy your browser extension data and such. Compared to bitwarden which requires a password to unlock it, and as I understand stores everything encrypted on disk.
slightwinder 10/25/2024||
If you don't use a master password, it's unsafe. And even with master password, I vaguely remember it's not that safe either, but that might be outdated info.

This was going around the last days: https://github.com/Sohimaster/Firefox-Passwords-Decryptor

BrandoElFollito 10/25/2024|||
> because the built-in password manager in Firefox is too good

I just checked it and it looks really basic, right? No OTP, no multiple URLs, no special URL matching?

Where is its "goodness" (I may have missed something entirely)

throwuxiytayq 10/25/2024|||
Does the FF password manager still irrecoverably nuke your password with no versioning/undo when you accidentally or intentionally use the „forget this website” option in the history panel?
kwanbix 10/25/2024|||
The problem with the Firefox (or Chrome) password managers is that they only work on their browsers. Bitwarden works on any browser, on windows, macos, linux, ios, android.
conradev 10/25/2024|||
It’s also the only browser that doesn’t support Passkeys yet :(
frenkel 10/25/2024|||
Does it support sharing passwords with family members?
Yodel0914 10/25/2024||
This (along with syncing on iOS) is what made me switch from `pass` to Bitwarden. Password sharing (and self-hosting sync with vaultwarden) are killer features for me.
twilo 10/25/2024|||
Is the Firefox one better than the one Edge has? I've been using that for a while and it seems quite good overall.
odo1242 10/25/2024||
It's not end-to-end encrypted (if you enable account sync), so Microsoft can technically see your passwords. Feel free to switch or not switch based on that information.
notpushkin 10/25/2024||
Firefox isn't end-to-end encrypted either anymore, IIRC.
morsch 10/25/2024|||
They say it is: https://support.mozilla.org/en-US/kb/sync
notpushkin 10/25/2024||
I stand corrected! https://support.mozilla.org/en-US/kb/reset-your-firefox-acco...

> Mozilla accounts uses your password to encrypt your data (such as bookmarks and passwords) for extra security. When you forget your password and have to reset it, this data could be erased. To prevent this from happening, generate your unique account recovery key before forgetting or resetting your password.

odo1242 10/25/2024|||
It still is, as is all Firefox Account data
rnewme 10/25/2024|||
I enjoy Ecrypted Fossil SCM instance (encryption over sqlite extension)
Klaphark 10/25/2024|||
All the browser password managers are not really secure enough and give a false sense of security.
SV_BubbleTime 10/25/2024||
> built-in password manager in Firefox is too good.

lol, sorry but this is a ridiculously narrow opinion and wouldn’t even apply to my SO and me as a two person team.

Hmm, maybe I want my passwords on my phone?

itfossil 10/25/2024||
Nice to see Bitwarden make a course correction here. I wasn't looking forward to switching to another password manager, so I'm quite happy.
ryukafalz 10/25/2024|
Yeah, likewise. I'm a Bitwarden subscriber but I'd been looking into alternatives recently because of the licensing kerfuffle. But switching password managers is a pain, so I'm glad to not feel like I have to now.
spl757 10/25/2024|||
KeePassXC (and I assume the other versions) can import an encrypted JSON Password Protected (NOT Account Restricted) export from Bitwarden.

I use them both. I have KeePassXC for my local machine, and Bitwarden for things I may need out and about.

With the browser plugins for both it's not that hard to manage them both, at least in my opinion.

I was hoping to see some course correction on this from Bitwarden, even if the over-stated impact was really just to the SDK. They appear to understand the look of their licensing move was going to cost them more than it probably should have. Most companies refuse to change course at all, so I at least see it as encouraging.

edit to fix a typo

EasyMark 10/25/2024|||
There is little chance I’ll ever move to keepassxc as that requires me to maintain it myself and take the chance on deleting something very precious. I’ll stick with the cloud solutions for now.
alwayslikethis 10/25/2024||
Synchronizing is not too difficult. You can use syncthing or any cloud-based storage solutions you are already using. You can also back stuff up. Given it has a recycle bin I wouldn't think accidentally deleting stuff is any more likely than a cloud solution. It's probably harder to back up a cloud solution as you don't have direct access to the file.
xigoi 10/26/2024||
How does Syncthing handle concurrent writes?
SirGiggles 10/26/2024|||
A caveat that bears mentioning is that an export of a Bitwarden vault does not contain attachments.
creesch 10/25/2024||||
Are there other alternatives that are 1) open source 2) offer the same integration to begin with and finally 3) have been audited or are popular enough to be under constant scrutiny?

There is of course the KeePass ecosystem, but that is why I included my second point, as with KeePass you are responsible for vault syncing, having clients for all platforms, etc.

I suppose that it is good to be aware of other options. At the same time, jumping ship so easily also doesn't seem realistic or ideal behavior to me.

zie 10/25/2024|||
I have no affiliation, just found them this week, but https://psono.com/ exists. So 1 and 2 are met and 3 is half-way there maybe? It's a self-audit but they have been around a while. Apache2 licensed.

Again, I literally found them the other day, and other than a cursory check to make sure the UI/UX is friendly enough to compete with BW or 1P, I haven't had a chance to look through their code at all yet. I have no idea if the promises they document are met.

chickahoona 10/25/2024||
Hi, Sascha here, the main developer behind Psono. Psono has been audited multiple times so far, usually on a yearly bases. The last one here https://psono.com/blog/security-audit-2024 (you will also find a link to the audit itself)
zie 10/25/2024||
Thanks! I missed that!
WD-42 10/25/2024||||
https://www.passwordstore.org/
KPGv2 10/25/2024||||
The audited part is going to be tough to meet because it's a very niche skill people generally won't do constantly for free.
hedora 10/25/2024||||
I decided that vaultwarden should not have an internet accessible port. Are there any that meet those requirements and also let you (reliably!) edit/create passwords when offline?

Also, sometimes the bitwarden client decides to blow away my local copy of the password database. I'd like it to store it pesistently on all machines so I have to lose my phone, my laptop, my vaultwarden server and its two backups before I get locked out of everything.

Currently, the phone + laptop don't count as backup copies.

BrandoElFollito 10/25/2024||
> I decided that vaultwarden should not have an internet accessible port

So how does your browser extension work when outside your LAN? via Tailscale or similar VPN mesh? And for people who use it outside of the LAN entirely?

hedora 10/25/2024||
The app (and iOS keyboard integration) degrades to read only mode. It works about 95% of the time. I'd rather it work 100% of the time, and be read-write.

I don't run the browser extension. (There have been too many other password managers with exploitable password bugs.)

g19fanatic 10/25/2024||||
i use the keepass ecosystem with app.keeweb.info. Its an open source webclient that can directly pull from your google drive (and other places!). I use a google drive through keeweb for syncing, 2 clicks and its syncd. Auto pulls when past pw.

keepass works in browser (how I use it on a computer), can work offline (which is good in air-gapped instances, one of my reqs) and works directly on my android phone without issue.

creesch 10/25/2024||
It is actually sort of how I used it as well, though through nextcloud. It did still remain a hassle. It also requires all different apps to be maintained and equally safe.

Keeweb for example has not had an active maintainer since 2022 https://github.com/keeweb/keeweb/issues/2022

Glazui 10/25/2024|||
I‘ve recently learned about PassBolt, but it doesn’t meet criteria 3 I’m afraid
sirdvd 10/25/2024||||
Switching is decisively a pain. But apparently this episode was what I needed to start looking seriously into VaultWarden.
horsawlarway 10/25/2024|||
Huge VaultWarden fan here. It's been running absolutely unattended for about 3 years from a machine in my basement now, and it's great.

I back things up fairly often, but otherwise I would have no idea I'm not just using the enterprise grade Bitwarden license. Things just work, features are there.

Side-note - VaultWarden is incredibly reliable for a self-hosted free solution (I have 1 pod restart 27 days ago due to a power outage, but otherwise it basically does not fall over. No memory leaks, no high cpu consumption, no reliability problems)

idonttalkenough 10/25/2024|||
Tacking onto this comment as another thumbs up for vaultwarden. "incredibly reliable" is exactly the way to describe it, in the world of tech headaches the password manager is the last thing you want to be worrying about and I can say with confidence that vaultwarden is a reliable well-oiled machine.

Backups are also fairly easy so if need be a DR can be done (and automated) with very little hassle. The vaultwarden backend does depend upon the bitwarden apps for client devices but also features it's own web UI.

cmeacham98 10/25/2024|||
Your comment was marked dead FYI, I vouched for it.

Normally this would mean you are shadow banned, but I don't see any other comments in your history getting this treatment - perhaps this comment caught the ire of some anti-spam algorithm.

xelamonster 10/25/2024||
I mean it reads like ad copy, and the entire first paragraph takes so many words to say nothing more than "I agree." As comments go, I have to say I've seen better.
Brian_K_White 10/25/2024||
I got more out of it than this one.
hedora 10/25/2024|||
Old versions of vaultwarden broke recently (for just about everyone?) due to incompatible changes on the iOS client.

Breakage is not ideal, but here's how they handled the second, more subtle compatibility break:

https://github.com/dani-garcia/vaultwarden/issues/5069

I haven't worked up the courage / time to back up my database and upgrade the docker container; will probably get to it this weekend. However, I can't imagine using bitwarden with the official server (too bloated to be trustworthy), or with their cloud thing. I got burnt by lastpass. I'm not putting my passwords in a giant high-value target again.

BrandoElFollito 10/25/2024||||
Same here - I just see that versions change from time to time (yeah I know I should do that manually but there we are).

One thing I do not like (or, say, "miss") in Bitwarden/Vautwarden is the ability to make decrypted backups. I run the service for my immediate family and would like to have access to some people's passwords (of course with their agreement) to make sure they are fine.

A solution is to use Organizations but you cannot have a "organization-only account" - an account that would exclusively save to an organization without a private vault.

The "solution" is to tell people to move what they save to such and such Org but this works fine with me, recently with my wife but somehow my father does not do it and we sometimes end up with tense moments when it is time to get to some accounts :)

apitman 10/25/2024|||
Vaultwarden is great, but it's only half the equation. If bitwarden does go user-hostile eventually, who's going to fork all the client apps and extensions?
AzzyHN 10/25/2024|||
VaultWarden is great. But I don't use it, because I trust Bitwarden's infrastructure more than my own, for now at least.
slenk 10/25/2024|||
I found psono and spun up a self-hosted instance. I may just try to keep them in sync for a while while this business fully settles
jdlyga 10/25/2024||
Bitwarden is still excellent, but keep an eye on them over the next few years. Remember that Bitwarden was originally a LastPass alternative without the fuckery.
prophesi 10/25/2024||
The LastPass fuckery was long and frankly egregious.

Though I don't understand why this git commit is what's linked here. I'd rather hear the discussions on it. https://github.com/bitwarden/clients/issues/11611

hnbad 10/25/2024||
After reading through the issue thread and the final reply by Bitwarden, I think the only context this provides is that the headline should rather be something like "Bitwarden SDK fixes dependency licensing issue".

The opening comment and the final reply are the only valuable contributions in that issue. Everything in between is random people jumping in to feign outrage or telling people to use Vaultwarden (which btw recently was in the news for more significant negative reasons). If anything it's a perfect example of the sad state of online discourse.

ferbivore 10/25/2024|||
This wasn't an "issue", it was working as intended. The GPLv3 client intentionally depended on proprietary code. The CTO's comments on bitwarden/clients#11611, bitwarden/sdk#898 and fdroid/fdroiddata!15353 make it clear this was deliberate. They've now changed their stance because of the backlash.

It looks to me like people expressed genuine concerns about being lied to by a company, one they'd trusted with their passwords no less. Calling it "feigned outrage" is a bit rude.

kevincox 10/25/2024||
Real links for easy clicking:

https://gitlab.com/fdroid/fdroiddata/-/merge_requests/15353

https://github.com/bitwarden/clients/issues/11611

SirGiggles 10/25/2024|||
> (which btw recently was in the news for more significant negative reasons)

Do you by chance mean CVE-2024-{39924, 39925, 39926}?

hedora 10/25/2024||
Interestingly, none of those impact me, since they involve an authenticated attacker. I trust all the users that can log into my vaultwarden instance.

Were there any other recent issues?

odo1242 10/25/2024|||
I mean, it still is. It’s honestly gotten better too - for evidence, it’s the one password manager that never gets recommended by sponsored YouTubers but always gets recommended by non-sponsored YouTubers.
afavour 10/25/2024||
It depresses me that Bitwarden has also taken VC funding, just like 1Password. It’s still a great product but as with any VC product I’m just waiting for the other shoe to drop when it’s revenue generation time.
KPGv2 10/25/2024||
I honestly don't think the password manager market could bear more than $3–5/mo for an individual user or family.

I used 1Password for years until they went from one-time payment to monthly sub and removed local sync so you could only use multiple devices by paying them. I think a big decision there was that they wanted $10/mo or something. I can't remember, but at the time it seemed ludicrous.

Years later, when my new laptop couldn't run the final local-sync version of 1Password, I finally decide to look into password managers again, and lo and behold $3/mo. I signed up immediately.

throwaway918299 10/26/2024|||
Despite being proprietary, 1Password still hasn’t had any fuckery that I am aware of. I have been tempted to switch to an open source solution many times but I think I’ll be parking right here for a few more years yet.
petterroea 10/25/2024||
Thank you Bitwarden for listening. This kind of stuff gives me hope for the business model of Open Source.
chx 10/25/2024|
[flagged]
attendant3446 10/25/2024|||
How would you explain that[1]?

1. https://github.com/bitwarden/sdk/issues/898#issuecomment-222...

petterroea 10/25/2024|||
They still handled the situation in a serious and responsible manner, clearly communicating what had happened and why. They then followed up later when the problem was fixed. To me it seems clear that they understood the seriousness of the situation, and why people were initially pissed.

I think this is the correct way of handling a rugpull scare, bug or not.

ferbivore 10/24/2024||
Also: https://github.com/bitwarden/clients/issues/11611#issuecomme...

Previously: https://news.ycombinator.com/item?id=41893994

teach 10/25/2024|
Thank you. I had missed this story and was struggling to piece things together from the varied comments.
Scipio_Afri 10/25/2024||
Well that’s one way to handle that effectively and in what seems to be open source way without fuckery; glad to hear it cause that was going to be a bit annoying migrating away from them.
amszmidt 10/25/2024||
Not entirely there yet ... Some parts of have been re-licensed, some have been licensed under the old non-free software SDK license. E.g,

https://github.com/bitwarden/sdk-internal/commit/db648d7ea85...

ferbivore 10/25/2024|
The non-GPLv3 bits are for their separate Secrets Manager product. It doesn't look like that's advertised as open-source. Bitwarden has always been open-core and not fully GPLv3, and that seems understandable; they need something to sell after all.
weikju 10/25/2024||
Props for them to step in the right direction, it wasn’t obvious at all for a few days what they would do.
chx 10/25/2024|
Repeatedly: when people post shit like this they more or less guarantee the next company won't even try. People! this is one of the few companies which open sources their product. The time to doubt and preach is not here yet... by far.
AdmiralAsshat 10/25/2024||
Not really. It was keeping them honest. This wasn't like the Winamp thing. Bitwarden has proudly proclaimed itself as "Open Source" from day one. It's right on their front page. It's in their marketing materials. It's in their podcast advertisements.

I pay for Bitwarden based on the premise that it is open source. If it tries to pull a Meta and decide that "open source" suddenly means whatever they want it to mean in defiance of the commonly-understood meaning, I want to know about it.

I'm glad they righted the ship on this.

powersnail 10/25/2024|
It's a welcome change. It still feels like they are trying to be too smart on licensing, especially how to combine GPL and proprietary licensed code, which I think is the root cause of the whole drama. The open core model works better as a hosted service, where you are not distributing the amalgamation of GPL and proprietary. Open core in client code seems a bit too rife for potential misunderstandings and confusions.

Hope it works out for them, though. It's a good product.

More comments...