• Appoxo@lemmy.dbzer0.com
    link
    fedilink
    English
    arrow-up
    1
    arrow-down
    1
    ·
    1 day ago

    False sense of security.
    The moment to fuck up certificate issuing and don’t use a wildcard certificate, the subdomain is public and will be probed to hell and back. And due to regex, probably by bots specialized to probe password vaults.
    Wish you best of luck and security.
    But I’ll stay here :)

      • Appoxo@lemmy.dbzer0.com
        link
        fedilink
        English
        arrow-up
        1
        ·
        7 hours ago

        osanna@lemmy.vg:

        there’s also the fact that hackers probably don’t know I’m hosting it. Where as bitwarden hosted makes for a very very juicy target

        Please point me to where keepass is mentioned

        Besides that:
        Yes, keepass is only an encrypted database-container but that comes with it’s own downsides.
        Syncthing can manage the syncing with stun-servers circumventing the port forwarding issue but it’s also a burden to manage it.

        Btw a geuine question:
        How does keepass manage simultanious access by two devices? Is the database write-locked during an editing action?
        And how does it combat silent corruption?

        • Aproposnix@scribe.disroot.org
          link
          fedilink
          English
          arrow-up
          1
          ·
          4 hours ago

          I’ve been using Keepass for about the past 15 years.

          When you jump into the middle of a conversation, this is what happens. In fact, I already answered your question. Even though you seem to be acting in bad faith, and you’re trying to get a “gotcha” out of me… I’ll elaborate a little

          I use a Nextcloud Server (there are other network sync tools as well). I have the Keepass file on the server which syncs with my remote devices. If I make changes to the database, it syncs with the cloud server which pushes the changes to the other devices. I have NEVER had a situation where I needed to make changes to the databases on two or more devices in parallel, nor can I think of a use case. My guess is that in such a situation, whichever file was saved last would be the one last saved by Nextcloud (overwriting the other edit). So your “gotcha” is valid but rare. The other option is to use the web app for Keepass in Nextcloud (not sure if it’s still being developed though, it’s been a long time since I used that).

          Anyway, the point of my question was to understand why people use a cloud service for this when it can be easily done (and be safer) than relying on a 3rd party cloud. From what I can tell it’s “convenience”.

          • Appoxo@lemmy.dbzer0.com
            link
            fedilink
            English
            arrow-up
            1
            ·
            3 hours ago

            You need to turn down your suspicions.
            Can’t ask questions without drawing the wrath of some users here…

            Anyway:
            I thought about it but in the end went with Bitwarden just because it’s convenient and didnt feel like entering the security minefield.
            Same was for pictures (kept them on my PC and that was backed up to another drive) and E-Mail.
            As my gear improved I started to use Immich.
            E-Mail is still outsourced as I can’t and don’t want to deal with getting put on spam-lists and having to deal with getting of of it (had the pleasure of getting my domain already marked by google safe browsing).

            The “gotcha” about conflicting (as you put it and trying to infer further bad faith conversations) was more about edge cases biting you in the ass.
            Not fun having to search accounts if you expect them to be securely saved in the vault but not being there.

            Anyway, the point of my question was to understand why people use a cloud service for this when it can be easily done (and be safer) than relying on a 3rd party cloud. From what I can tell it’s “convenience”.

            That’s mine and being under the assumption a corp that is specializing and programming a security product is probably better at it than me.
            And so far the behavior from Bitwarden after being audited and their current breach-history gives me enough faith for now.

            They had some oof-moments like master-password are used to encrypt the vault and weak encryption protocols with weak encryption parameters on top
            But they werent enough to start a transition elsewhere.