this post was submitted on 05 Jul 2024
730 points (99.2% liked)
Technology
59672 readers
2852 users here now
This is a most excellent place for technology news and articles.
Our Rules
- Follow the lemmy.world rules.
- Only tech related content.
- Be excellent to each another!
- Mod approved content bots can post up to 10 articles per day.
- Threads asking for personal tech support may be deleted.
- Politics threads may be removed.
- No memes allowed as posts, OK to post as comments.
- Only approved bots from the list below, to ask if your bot can be added please contact us.
- Check for duplicates before posting, duplicates may be removed
Approved Bots
founded 1 year ago
MODERATORS
you are viewing a single comment's thread
view the rest of the comments
view the rest of the comments
Bitwarden would be my vote
Just out of curiosity: is it wise to keep you MFA within your password safe? Like is that not the opposite of multi factor? I'm no troll, I'm seriously uninformed.
Realistically the threat we care about is others leak your password. So it doesn’t matter.
If you have a setup where your password vault is at risk then yes it’s a bad idea.
I suppose there is a certain level of risk but that's true with any solution. Passwords generally don't get changed very often and that's usually what's going to be nabbed up by somebody that in your username of course. With TOTP, putting that in bitwarden means that in order to get access to whatever account, they first have to get your credentials which they probably got from a dump filled with a bunch of other credentials, then I'd have to figure out that you're using bitwarden was your be no sign that you are. Then they'd have to actually get into your bitwarden which if you're doing it properly should be difficult. And if the login to bitwarden is completely different than the account are trying to get into it's basically invisible to them.
The only way I see bitwarden being the weak link, is 1. Someone has physical access to your devices and they know what they're looking for (in this case it's probably a roommate or family or friend, someone that you trust but probably shouldn't). 2. Bitwarden gets compromised (which is an impossible but it is probably more difficult because it is an open source thing). 3. You go to shady website and install shady stuff and that install some sort of keylogger, or something else that shows what your system has (hell, Microsoft recall would actually fall into this category) and a back actor sees that you have bitwarden and how you log into it. But that being said, 1 and 3 aren't necessarily stopped by having a password manager solution and the separate MFA solution... But it could slow them down.
But physical MFA isn't impervious either. I don't recall if it was yubiki or Google's Titan, if I remember back years ago one of them had a problem.
I’ve been running a self-hosted Vaultwarden server with Bitwarden clients. It’s been perfect. The clients could use some usability work, but other than that, no complaints.
This