← Home ← Back to /g/

Thread 106397132

108 posts 30 images /g/
Anonymous No.106397132 >>106397155 >>106397168 >>106397181 >>106397194 >>106397207 >>106397522 >>106397525 >>106397545 >>106398081 >>106398099 >>106398574 >>106398592 >>106398771 >>106399094 >>106400166 >>106400179 >>106400194 >>106400199 >>106400216 >>106400659 >>106400845 >>106400969 >>106401248 >>106402059 >>106402158 >>106402253 >>106402747 >>106403711 >>106403764 >>106404140 >>106406171 >>106406389 >>106406650
best password manager?
Anonymous No.106397155 >>106398742 >>106399045
>>106397132 (OP)
Just use a .txt file on your desktop, retard.
Anonymous No.106397168 >>106399045
>>106397132 (OP)
Just use a post-it not on your monitor, retard.
Anonymous No.106397181 >>106397582 >>106399045
>>106397132 (OP)
write em on a small piece of paper until you remeber them retard
Anonymous No.106397185 >>106399045
Just use your mind palace, retard.
Anonymous No.106397194 >>106397524 >>106398584 >>106399045 >>106402520
>>106397132 (OP)
BitWarden for 10$/year is pretty good. Their Android and Chrome apps work well. We use 1Password at work and the UX is worse if you ask me same with LastPass. BitWarden is also open source.
Anonymous No.106397207 >>106402520
>>106397132 (OP)
KeePassXC. XC is sexy.
Anonymous No.106397522
>>106397132 (OP)
masterpassword.jar
Anonymous No.106397524 >>106398592
>>106397194
>paying for a password manager
Anonymous No.106397525 >>106397645 >>106397668 >>106398081 >>106402758 >>106404319
>>106397132 (OP)
what happens if you forget the password for your password manager
Anonymous No.106397545
>>106397132 (OP)
the rust tranny self hosted bitwarden is the /g/ choice op
Anonymous No.106397582
>>106397181
>remember dozens of random 32 character strings
Okay, Rain Man.
Anonymous No.106397645
>>106397525
If you forget your password you lose access, i.e. you're screwed. Although realistically it's unlikely that you forget your entire password so you might be able to bruteforce it with password cracking tools if you remember enough about your password. For example, bruteforcing a 20 character password isn't realistic. But if you remember like 16 out of 20 characters or so, you could probably bruteforce it.
Anonymous No.106397668
>>106397525
Use your recovery phrase. You did write down your recovery phrase, right?
Anonymous No.106398081
>>106397132 (OP)
I have use password manager from Google Chrome but I use better way now
>>106397525
you will not lose it in my better way
I now have only one password for everything! every account is the same password so I only must remember one and it is easy and very safe. it is very long so it is very safe
Anonymous No.106398089 >>106406676
keepassxc with whatever sync solution you want
Anonymous No.106398099
>>106397132 (OP)
pen and paper
Anonymous No.106398126 >>106399048
All the important logins have unique passwords that I write down in a notebook, random logins just use whatever password I'm using at the time or something generated.
Anonymous No.106398574
>>106397132 (OP)
Anonymous No.106398584
>>106397194
Why do tou donate money to them?
Its free
Anonymous No.106398592
>>106397132 (OP)
pen and paper, and not being an idiot.

>>106397524
>b..b..but if you don't pay then you are the product
Anonymous No.106398742
>>106397155
That's how they caught that one crypto couple btw
Anonymous No.106398754 >>106398818
Just get this.
Anonymous No.106398771 >>106398786
>>106397132 (OP)
Pen/cil & paper. There is never going to be a more secure method of keeping your passwords organized and free from malicious code. If they are already in your house, you are cooked.
Anonymous No.106398786 >>106398818 >>106398853 >>106398944
>>106398771
What about when you need to log in to something and aren't home?
Anonymous No.106398808
I've used KeePass (KeePass2 originally, then switched to KeePassXC) and synced the database with Syncthing for almost 9 years and I've never had a problem
I still recommend pen/paper for anyone not willing to setup that or any other self-hosted solutions like vaultwarden or whatever though because I will never trust those online password managers
Anonymous No.106398818
>>106398786
see>>106398754
Anonymous No.106398853 >>106398892
>>106398786
How often does this happen for you?
Anonymous No.106398875
write them all over yourself with a permanent marker. people will just think you are a schizo writing inane shit on yourself.
Anonymous No.106398879
https://www.passwordstore.org/
I keep it simple all I need is pass
Anonymous No.106398892 >>106398992
>>106398853
Very rarely, but it has happened.
Anonymous No.106398906 >>106398925 >>106398935 >>106399076 >>106406629
paper and a vault

You get a keylogger on your computer and the password manager can't help you.
Anonymous No.106398925 >>106398933
>>106398906
that's not how keyloggers work
autotype obfuscation and autofill exists
if you said clipboard hijacking or click jacking like the recent vulnerabilities have shown for browser extensions sure
Anonymous No.106398933
>>106398925
what about having a physical keyboard that has a firmware level keylogger on it?
I mean any malware on the computer in general.
Anonymous No.106398935
>>106398906
You still have to type in the passwords to log in. The protection is MFA (and not picking up keyloggers in the first place)
Anonymous No.106398944
>>106398786
small piece of paper and hide it in ur wallet
Anonymous No.106398992 >>106399003 >>106399177
>>106398892
I asked because you have three options, to prevent exposure but still retain access; it requires some forethought though.
If you know you are going to need them, then right them down on a piece of toilet paper or a small piece of paper and carry a lighter to dispose of them in a hurry.
If you don't want to secret squirrel, then create a small email to yourself with curated passwords(you are capable of remembering one password for your email, I hope) and then dispose of the email when you are done.
Keep a locked zip file with passwords as an attachment in your email. You don't even need to extract the contents to view the needed passwords.
Anonymous No.106399003
>>106398992
>right
>incorrect
write*
Anonymous No.106399045
>>106397155
>>106397168
>>106397181
>>106397185

Don't do this.
Many people do, but don't.
This used to be ok for me but eventually you get old and forget them.

But I actually encrypted them with a mental algorithm on paper, so it got confusing.

>>106397194
>paying for a pw manager
wow, it's like you want corporations to know your shit.
Anonymous No.106399048 >>106402934
>>106398126
Important ones I wouldn't recommend this.
I found a book of passwords at a McDonalds once. He was lucky I just threw it straight into the bin.
Anonymous No.106399076 >>106399112 >>106404338
>>106398906
Doesn't help. Safes are easily cracked.
You need to encrypt them with a mental algorithm or a permanent equivalent of a one time pad. Basically cold war tactics still work.
Computer stores are crackable, but generally do fine. It's things for top secret information that need this.

So passwords to encrypted drives.
Anonymous No.106399094 >>106402520
>>106397132 (OP)
KeePassXC if you need it as an individual and not organization.
Anonymous No.106399112 >>106399162
>>106399076
The safe is just a decoy. I have the real passwords hidden in a secret compartment in my house.

You just proved you wouldn't find them. kek.
Anonymous No.106399128
Probably not the best for your password, but with regards to encryption autism, for me, it's the OTP.
https://en.wikipedia.org/wiki/One-time_pad
It's just cool how such an old method is still effective.

This is now an encryption autism thread.
Anonymous No.106399162
>>106399112
If it isn't encrypted then it's still not safe.
Even people before good computers knew this. Just look at enigma. Arguably part of the reason why computers even exist is to encrypt your ass (Turing helped the poles that cracked enigma). The internet just complicated that purpose with malware.

Honestly, an isolated and simple encrypting machine is your best bet. Even that has issues, as obviously enigma was cracked. But that's still much better than a safe.
Your brain isn't that safe. There are interrogation methods to drug your and get it out. This is why Guantanamo exists.
Anonymous No.106399177 >>106399272
>>106398992
Didn't know that this was a YLYL thread. Anyway, lost.
Anonymous No.106399190
Moved all my passwords, which I used to store on Microsoft Edge, to Bitwarden recently

It's alright and, most importantly, free
Anonymous No.106399253 >>106400388
KeePassXC, use a randomly generated word-based password as your password for the database (which you can create within KeePassXC), it should be 6-10 words long with a random number at the end of each word, each word separated by a hyphen.

Make sure your database is encrypted, and store the database inside a veracrypt encrypted file container, using a different password for the container, make that password using the same method as mentioned before.

Regularly (at least once a week) back up your password database file to a usb stick or some other file-storing device. The first time you do this, move the veracrypt file container into the USB, and then unlock it and you can start backing it up into there. I don't recommend deleting old backups, they only take up a few kilobytes and can save your ass if you accidentally delete a password. Store the USB in some sort of sealed, airtight container, preferably something small, my old pill bottles work fine. This is very good incase of a flood, leak, or something else. It also just helps protecting the USB from the elements. I recommend using multiple USBs for backups and storing them at different locations. I also recommend storing them somewhere you won't usually rummage through, or somewhere where someone might go rummaging through. You don't want someone to find your USB, even though it's encrypted, because you don't want to loose your backups. I just have my USB hiding behind a book on my bookshelf, and sometimes in my flag collection that isn't on the wall.

MAKE SURE EVERYTHING IS FUCKING ENCRYPTED, if that wasn't obvious already.

You could also use syncthing if you want to sync the database file between multiple devices.
Anonymous No.106399272 >>106399398
>>106399177
This is a "what's the most impractical and insecure method of encryption thread".
None of these answers are good kek.
Then again, 4chan used to be certain about specific methods with pw managers, then those managers got cracked a few years ago, so they're utterly useless now.

When you're dealing with technocrat cartels, you need to go batshit insane with your encryption methods now. That means off the grid generally now. This is just what happens when the NSA have so many backdoors into your shit.

Personally, build your own device. Don't rely on third party.
If you cannot afford that, you are not truly protected.

The amount of corporations and agencies that don't even do this stuns me to this day.
Anonymous No.106399314 >>106399398
Software encryption simply doesn't cut it for me anymore. You need a robust hardware form of encryption that nobody else knows.

Intel, Nvidia and AMD are probably the most leveraged with their ability to manufacture very sophisticated methods, but they have government and corporate eyes within their place all over the joint.
So ironically small fry with hardware sophistication might have the biggest opportunity here. hmmm.
>IC startups

Alternatively, go old school and use mosfet circuits. kek
Weird times.
Anonymous No.106399398 >>106399429
>>106399272
>>106399314
>muh NSA
What's with people attributing godlike powers to government spooks? Encryption works, you can't backdoor math.
Anonymous No.106399429
>>106399398
Anonymous No.106400026
6th for KeepassXC+Syncthing. Just works. Bonus points for self hosting stdisco and your own relay but the public ones work fine and the e2ee is probably ok.
Anonymous No.106400166
>>106397132 (OP)
I just use standard notes.
Password managers are too r3ddit for me.
Anonymous No.106400179
>>106397132 (OP)
just write password in paper
be very careful not to publicly expose paper containing the username and passwords

also be careful when you don't lose paper containing username and passwords
Anonymous No.106400194
>>106397132 (OP)
i just do password recovery every time
Anonymous No.106400199
>>106397132 (OP)
I just use passkeys
Anonymous No.106400216
>>106397132 (OP)
Spreadsheet of usernames and incomplete password hints. Vastly more reliable that relying on memory alone for 60+ accounts, but also uncrackable because the complete password is never actually recorded anywhere (unlike a cypher or other obfuscation).
Anonymous No.106400388
>>106399253
I dont see the point of having it in a vercrypt container. If they can crack the veracrypt password, then they can crack the keepass password. It just adds more for you to remember.
>wait was this the seventh word of the veracrypt container or the keepass database?
Or worse, you have to unlock both a veracrypt container and a keepass database everytime you want to enter a password. It's bad enough doing it with the keepass.

usb seems unnecessatry too. Just use syncthing instead, ti will keep everything up to date across devices. Well of course this somewhat depends on how many devices you have, if you only have a phone then yeah a usb is necessary. If you do use a usb just keep your most important passwords and stuff there, you dont need to back that up weekly,
Anonymous No.106400584
Redpill me on / explain to me FIDO2
I can use PKI to login to websites as long as the website supports it? So no passwords, just an authenticator app?

https://fidoalliance.org/passkeys-directory/
Anonymous No.106400659
>>106397132 (OP)
I'm still just using Password Gorilla. Tiny, portable, and doesn't need internet access.
Anonymous No.106400845 >>106400929
>>106397132 (OP)
use lastpass like a normal human being
Anonymous No.106400849
I auto save mine via the firefox pw manager
I have a very complicated pw for my firefox account
Is there a reason why I should switch to a dedicated pw manager?
Anonymous No.106400929
>>106400845
>use this close-sourced proprietary vendor-locked cloud-hosted service, like a normal human being
you wish, mr. bright
Anonymous No.106400969
>>106397132 (OP)
Let me guess, you need more?
Anonymous No.106401233
If you want to use Bitwarden, make sure to self-host. Their public service is atrocious. Otherwise, 1password is great, but not open-source. KeePass is great, but you have to set up sync and avoid conflicts.
Anonymous No.106401248 >>106402520
>>106397132 (OP)
keepass
Anonymous No.106401651 >>106401739
its genuinely baffling that anyone would use anything besides a self hosted vaultwarden instance lmao
Anonymous No.106401659
use bitwarden. you can host it yourself if you want. there's a good client for it with a native material ui called keyguard. use keepassxc if you'd rather simply have a file or don't wanna deal with webapps and electron.
Anonymous No.106401662
You may think your're special but your real threat level is chang and Rajeesh and... of course corpo either stealing your data in a repair shop (You retards use it) Or you downloading some shit/getting caught by some exploit/leak.
If you're not mentally retarded (Since you post here) You can easily host your own vault warden instance and use bitwarden be it compiling from source or downloading the app and be done with it.
You should also either use a hardware key or OTP on that vault as well to deny Rajeesh/Chang their climax if you get hit.
Anonymous No.106401739 >>106401790
>>106401651
name me 1 (one) good (!) reason to host and use a bit/vaultwarden instance, over just using keepass that you sync between your devices with syncthing. what do you need the whole server for, unless you provide the service to an organization?
Anonymous No.106401790 >>106402047
>>106401739
running a podman container is easier than doing all of that and has more widespread support than you cobbled together piece of shit setup
Anonymous No.106401822
Do you retards unironically use different passwords for different accounts? Get a life.
Anonymous No.106402047 >>106402388 >>106402662
>>106401790
>this whole client-server stack inside a container, that runs remotely inside a vm, is somehow (!) simpler (!!) than just having a serverless air gapped client-only workflow
your setup is a definition of "cobbled together piece of shit setup" with all that machinery
>has more widespread support
what kind of support? can you be a bit more concrete?
Anonymous No.106402059
>>106397132 (OP)
self hosted passbolt
Anonymous No.106402158
>>106397132 (OP)
Self-hosted bitwarden, Keepassxc, pen and paper, your brain, random bible verses.
Anonymous No.106402193 >>106402492
>before
>username and password fields are both visible
>press pwm extension autofill shortcut key
>press enter
>i'm in
>now
>only username field is visible
>autofill
>enter
>now enter password
>autofill
>enter
>now enter 2fa
>autofill shortcut doesn't work
>have to ctrl+v
>enter
>finally login

Why the fuck do they do this?
Anonymous No.106402253
>>106397132 (OP)
uhm literally just use the apple one like a normal himan??
Anonymous No.106402388 >>106402712
>>106402047
>air gapped
>syncthing

you do not know what that means
Anonymous No.106402471 >>106402520
Bitwarden
It just werks
Anonymous No.106402492
>>106402193
its easier
Anonymous No.106402520 >>106405149
>>106397194
>>106397207
>>106399094
>>106401248
>>106402471
elite password manager users have "password123" as their secure master pw btw

i know because that's my master pw. no one cbf to pick a complex pw to type
Anonymous No.106402662 >>106402712
>>106402047
you are amazingly stupid, i almost envy how little you know
Anonymous No.106402712
>>106402388
>dude, semantics!
okay, sure. syncthing transmits data over a local network. how does it change anything, other than quibbling? if you want real air gap, nobody stops you from syncing the database physically with a usb.
>>106402662
>heh, you're so stupid! i won't even tell you why!
see? you went full ad-hominem, attacking me and not the argument.
Anonymous No.106402747
>>106397132 (OP)
KeePass, synced via dropbox
Anonymous No.106402758
>>106397525
KeePass has a recovery page youre supposed to save. I sync it to my Dropbox and only my wife and lawyer can access it
Anonymous No.106402762 >>106402967
redpill me on pass. just pass. it's made by a gentoo guy iirc
Anonymous No.106402834
I use bitwarden but I add the word FAGGOT to every randomly generated password, so if someone has access to my BW all the passwords will be useless if they don't type FAGGOT at the end
Anonymous No.106402934
>>106399048
That thing isn't leaving my house, none of those accounts would require me to login to them while I'm out. I can just go home.
Anonymous No.106402967 >>106406205
>>106402762
The redpill is that it's an abandonware that leaks your metadata and uses gpg for encryption. Don't bother. If you want something local, then just use KeePass.
Anonymous No.106403652
Anonymous No.106403711
>>106397132 (OP)
KeePassXC
Anonymous No.106403764
>>106397132 (OP)
With the recent password manager hacks, writing your passwords in a physical notebook is unironically more safe than using a password manager.
Anonymous No.106404097
god i fucking wish my workplace had one. it's annoying as fuck to deal with 20 passwords.
Anonymous No.106404140
>>106397132 (OP)
the one you make yourself
Anonymous No.106404319
>>106397525
you dont. if you use a password manager you want to store all your passwords in it. meaning that you need to type in your master password everytime you need to access any other password. it would be the only password you need to remember, which is the whole point of a password manager. and typing the same password over and over again will make you remember it no matter what.
my master password over 60 characters long and its absolutely no problem to remember for me.
Anonymous No.106404338
>>106399076
getting access to your PC is theoretically possible for anyone on the entire planet, assuming your PC is connected to the internet at all.
your safe is a physical location that youd first need access to.
even if you put your safe out on your driveway, the only people able to access it are the ones that can physically get to your place.
Anonymous No.106405149
>>106402520
I mean, it doesn't matter what your master password is so long as you are keeping your password manager file secure. I think most people using a password manager can get away with that since they probably aren't posting their file on catbox or something
Anonymous No.106406171
>>106397132 (OP)
>picrel
>literally everything is a glowing pos
Behold, the real password manager
Anonymous No.106406205
>>106402967
>noooo the software must be updooted or it's le BAD
Also 90% is done by GPG which gets updated, the last 10% are mapping of files and calling GPG.
Anonymous No.106406253 >>106406321
You can use PowerShell, bash, python or anything really to run sha256 over a password file with a known key.
Anonymous No.106406321
>>106406253
> sha256
not for cryptography
Anonymous No.106406389 >>106406560
>>106397132 (OP)
Been using keepass for years and since recently trying out self hosted vaultwarden.
Never a cloud based password manager, let alone a subscription based one, that's pants on head retarded.
Anonymous No.106406560
>>106406389
well how is it compared to keepass?
Anonymous No.106406573
How's the new password manager from Proton?
Anonymous No.106406629
>>106398906
This is the lockpickinglawyer and today I will show you how to unlock anon’s safe with a magnet and a small wire.
Anonymous No.106406650
>>106397132 (OP)
self hosted vaultwarden or KeePass
If you're not a complete schizo and understand how zero knowledge works then Bit warden
Anonymous No.106406676
>>106398089
copy paste is my sync solution
it's not like you are making new passwords every day
it's a rare occurrence