this post was submitted on 01 May 2024
512 points (97.6% liked)

Technology

59672 readers
2852 users here now

This is a most excellent place for technology news and articles.


Our Rules


  1. Follow the lemmy.world rules.
  2. Only tech related content.
  3. Be excellent to each another!
  4. Mod approved content bots can post up to 10 articles per day.
  5. Threads asking for personal tech support may be deleted.
  6. Politics threads may be removed.
  7. No memes allowed as posts, OK to post as comments.
  8. Only approved bots from the list below, to ask if your bot can be added please contact us.
  9. Check for duplicates before posting, duplicates may be removed

Approved Bots


founded 1 year ago
MODERATORS
 

Bitwarden Authenticator is a standalone app that is available for everyone, even non-Bitwarden customers.

In its current release, Bitwarden Authenticator generates time-based one-time passwords (TOTP) for users who want to add an extra layer of 2FA security to their logins.

There is a comprehensive roadmap planned with additional functionality.

Available for iOS and Android

you are viewing a single comment's thread
view the rest of the comments
[–] [email protected] 8 points 6 months ago (1 children)

And where would you store your Bitwarden login TOTP if you used their service instead of self hosting?

[–] [email protected] 1 points 6 months ago (1 children)

And what happens if your Bitwarden account gets compromised? Now you've lost both factors at the same time.

No, I'll keep my 2FA separate from my password manager, thank you very much.

[–] [email protected] 3 points 6 months ago (1 children)

Good luck getting your vault compromised.

Unless you have a weak password or the vault isn’t encrypted (which it is, AES256 iirc and you might be able to change that on a self hosted version), I don’t see that happening.

[–] [email protected] 2 points 6 months ago* (last edited 6 months ago)

Most password manager hacks don't attack the encryption or password themselves (my password is very long), they find/create a side channel. For example:

  • keylogger attack to grab password manager password
  • social engineering to reset a password
  • attack the server to intercept passwords

Every secure system can be defeated, but it's a lot less likely that two secure systems will be defeated at the same time. So I keep my passwords and second factors separate. It's unlikely that either will be compromised, and incredibly unlikely that both will be compromised at the same time.