If you are interested in privacy you are probably interested in password storage … plus I wanted everyone to know about the inevitable future enshitification of this product. Spread the word and replacement recommendations are welcome too.

  • sakuraba@lemmy.ml
    link
    fedilink
    arrow-up
    7
    ·
    2 hours ago

    Yeah I’m done with cloud providers for this shit, I’m going all in for Keepass

  • Tinkerer@lemmy.ca
    link
    fedilink
    arrow-up
    6
    ·
    5 hours ago

    How will this affect vaultwarden? I’ve been using it for 5 years and absolutely love it. I’m worried that I’ll need to switch to something else though?

    • tomatolung@sopuli.xyz
      link
      fedilink
      arrow-up
      7
      ·
      4 hours ago

      The Article says:

      A Note for Vaultwarden Users

      Whether self-hosting stays viable long-term is the real question worth sitting with.

      Right now it works because Bitwarden’s clients are open source and the server API is public. Vaultwarden implements that API, and the official apps can’t tell the difference. That depends on Bitwarden continuing to publish open source clients and not restricting which servers they’ll talk to — neither of which is guaranteed under new management.

      The brake on the worst case: self-hosting is a listed Enterprise feature that generates real revenue. Killing it upsets paying business customers. That matters.

      The catch: what Bitwarden sells to enterprises is their own official server stack, not Vaultwarden. Vaultwarden exists in a space they’ve tolerated but never endorsed. If the calculus shifts, the tolerance ends without any announcement. Just let the API drift until compatibility breaks on its own.

      I don’t think that’s imminent. But I also thought the free tier commitment was ironclad, and “Always free” isn’t on the page anymore.The real safety net is that Bitwarden’s clients are Apache 2.0 licensed. A fork would need a rebrand to stay clear of the trademark — different name, tweaked UI, same engine — but that’s a speed bump, not a wall. The web vault works through any browser regardless of what happens to the apps, so worst case you’d lose autofill temporarily while a fork caught up. Inconvenient, not catastrophic. Vaultwarden itself is already proof the model works.

      Watch the clients. If they go closed, the community will notice fast, and the fork will follow.

    • godsammitdam@lemmy.zip
      link
      fedilink
      arrow-up
      4
      ·
      4 hours ago

      It shouldn’t in theory. Worst case is if bitwarden closes source, just fork the latest current open version and use it.

      Ideally, a group, either independent or joining with vaultwarden devs, can build/maintain the frontend for vaultwarden that is bitwarden.

    • Brainsploosh@lemmy.world
      link
      fedilink
      arrow-up
      1
      ·
      27 minutes ago

      Not very trust inspiring. There’s a lot of flowery words encircling enshittification.

      It does claim to want to always offer a free tier, but all the new values and buzzwords are funneled towards the paid versions.

    • BrilliantBadger@piefed.ca
      link
      fedilink
      English
      arrow-up
      3
      ·
      8 hours ago

      Yeah its like those sports headlines where they try vibe you up for some trash talk

      “Player A had a perfectly blunt statement about Player B”

      Only to read & find out they said Player B was great, such drama lol

      All just rage bait everywhere, AI or human that’s the clicks plan

  • yuman@programming.dev
    link
    fedilink
    arrow-up
    24
    ·
    14 hours ago

    if you were looking for an excuse to torpedo this abomination, here it is. hosting this gargantuan stack just for an encrypted csv file? at least the client (electron) gobbles up RAM like it’s free while being bug-compatible with whatever chrome version was current half a year ago.

    sadly, news ain’t great on the other side of the fence - keepassXC dev is all-in on vibeshitting; latest non-polluted version is 2.7.9.; works fine and the stuff they’re working on is pretty far from essential. some unknown folks forked it but who’s to say what their expertise is.

    never thought I’d disable my autoupdate timers but here we are. keep your eyes open.

    • potustheplant@feddit.nl
      link
      fedilink
      arrow-up
      2
      ·
      edit-2
      4 hours ago

      What do you mean by “gargantuan” stack? I have a single docker container for vaultwarden that was very easy to set up and it uses less than 100mb of ram.

      Not sure about the client claims though. I haven’t really looked into it that much. Are you saying all versions of the client and extensions of BitWarden have issues?

      • yuman@programming.dev
        link
        fedilink
        arrow-up
        13
        ·
        8 hours ago

        the dev vibecodes; I make a distinction between using the crap as a boilerplate helper and a full-blown agentic “hey computer, do this but do it super-good!”. not only that, they got a super-asshole vibe as they removed claude traces from the repo and then flaunted that it’s so people won’t know what parts were vibeshat. “good luck finding the cutoff point”, I’m paraphrasing here.

        to each their own, but that’s a hard pass for that fork from me.

        • Jason2357@lemmy.ca
          link
          fedilink
          arrow-up
          13
          ·
          8 hours ago

          A password manager is literally the poster child for “I would rather it lack features, but be built carefully by an expert.”

      • Croquette@sh.itjust.works
        link
        fedilink
        arrow-up
        6
        ·
        10 hours ago

        This is my unverified understanding of the situation.

        KeepassXC team added Copilot to their workflow to manage PRs and code some basic (according to KeepassXC) stuff.

    • (des)mosthenes@lemmy.world
      link
      fedilink
      arrow-up
      2
      ·
      3 hours ago

      thanks for all the suggestions - i’ve since moved to proton pass, not sure if I want to self host this aspect of my security stack - but will be watching closely

    • Bluewing@lemmy.world
      link
      fedilink
      arrow-up
      15
      ·
      9 hours ago

      I’ve been using it for years. But I have been waiting for this day to come. Because it always comes at some point without fail.

    • n1ckn4m3@lemmy.world
      link
      fedilink
      English
      arrow-up
      3
      ·
      8 hours ago

      It’s a very easy migration from Bitwarden to a self-hosted and OSS Vaultwarden, if you have means to self-host. Appreciably, many don’t want to self-host their own apps and I’m not defending Bitwarden’s enshittification at all. It comes for all tech at some point :(

      • kazerniel@lemmy.world
        link
        fedilink
        English
        arrow-up
        1
        ·
        4 hours ago

        It comes for all tech at some point :(

        Not sure if all tech, but definitely the ones that just want to grow grow grow. A counterexample (so far) is the Obsidian team.

      • Dultas@lemmy.world
        link
        fedilink
        arrow-up
        3
        ·
        6 hours ago

        I would say that Vaultwarden might not be the best introduction to self hosting given the critical nature and sensitivity of the data. And if you do maybe block the admin page from external sources.

    • youmaynotknow@lemmy.zip
      link
      fedilink
      arrow-up
      6
      ·
      11 hours ago

      You still have some time to decide which route to go. If you’re on the free version, stay there, but start looking for alternatives.

      Proton Pass is an option. KeePass with Syncthing works great, but it is a dramatically different and more involved workflow.

      I am using both, and deleted my Bitwarden account yesterday the moment I heard about this.

      Also, I can’t suggest enough that you export all your credentials to an encrypted json file every now and then, and store it on an offline storage device. This is important.

  • Jul (they/she)@piefed.blahaj.zone
    link
    fedilink
    English
    arrow-up
    45
    ·
    21 hours ago

    Vaultwarden will survive. Since the client is open source, once they close the API and break compatibility of the clients with Vaultwarden, the old version of the app can simply be forked and rebranded. I also do hope that the KeyGuard app will continue to support vaultwarden as well since if bitwarden closes the API and makes a breaking change, as is likely to happen, it will break KeyGuard as well, but it will still work with VaultWarden for some time.

    The real issue is that many people who are using Bitwarden aren’t savvy enough to host Vaultwarden in a secure way. Many people are careless with things like secret keys and such and dont know how to properly secure a web facing app or a VPN into their local network. But anyone who self hosts should result learn those things anyway. This one just happens to be a particularly high risk since it contains all of your passwords for everything else.

    • Dultas@lemmy.world
      link
      fedilink
      arrow-up
      1
      ·
      6 hours ago

      Good to know KeyGuard is an alternative. My main worry was with the extension no longer being compatible as, like you said, I doubt they’ll continue to keep the client and API open.

    • asdfasdfasdf@lemmy.world
      link
      fedilink
      arrow-up
      2
      ·
      9 hours ago

      We really need a VaultWarden paid service, if there isn’t anything against doing so in the license.

      I don’t know why the server needs any specialized software at all though. In the end, if it’s just some password history, why not just have a client that allows generic storage backends and you can upload to Filen or S3 or whatever else you use?

    • twoBrokenThumbs@lemmy.world
      link
      fedilink
      English
      arrow-up
      22
      ·
      18 hours ago

      This is why despite me self hosting some things I don’t rely on vaultwarden. I’m a flawed person and my family has no idea about anything. I don’t need to stretch my imagination very far to think of a handful of reasons why it would fail my situation. I’ll gladly pay for a password manager to not have to deal with that.

      • TheMadCodger@piefed.social
        link
        fedilink
        English
        arrow-up
        11
        ·
        15 hours ago

        Same! I self host a number of things, but I just didn’t trust myself with something as important as this. I had been paying for bitwarden even though the free plan was sufficient, just to show support. But obviously not if they go this route. I will also gladly pay for a password manager to not have to deal with that.

        • Jason2357@lemmy.ca
          link
          fedilink
          arrow-up
          2
          ·
          8 hours ago

          That’s where I was for years until I got that surprise $80CAD credit card charge a few weeks ago. Now I have 11 months to either go with someone else or figure out a self-hosted solution I can trust. It will need several layers of backups the family can actually access in an emergency.

    • potustheplant@feddit.nl
      link
      fedilink
      arrow-up
      11
      ·
      15 hours ago

      Doesn’t keepass only work on a single device? Meaning that you have to handle syncing the database file yourself. I prefer selfhosting vaultwarden. Maybe these changes will make me migrate to something else but for now I’m very satisfied with vaultwarden and the bitwarden client.

      • AHemlocksLie@lemmy.zip
        link
        fedilink
        arrow-up
        10
        ·
        14 hours ago

        Yeah, I just leave the file in a NextCloud sync directory. All my desktops and laptops download it automatically, and it’s trivial to download to my phone. As an added bonus, my fucking password manager isn’t exposed to the open internet where every hacker who finds it is gonna wonder what’s inside.

        • potustheplant@feddit.nl
          link
          fedilink
          arrow-up
          4
          ·
          edit-2
          8 hours ago

          You need two apps though and I personally have more faith in vaultwarden being stable than nextcloud.

          Glad your “fucking” password manager isn’t exposed to the internet. Mine isn’t exposed either since I use tailscale to access it. Your comment leads me to believe that your NextCloud instance IS exposed to the internet. Wouldn’t that mean that if a hacker gets access to your account they could also get your keepass file as well?

          • AHemlocksLie@lemmy.zip
            link
            fedilink
            arrow-up
            2
            ·
            6 hours ago

            I just typed out a response to most of this, and rather than repeat all that, I’ll copy a link here https://lemmy.zip/comment/26557132

            A lot of it can be summed up in that compromising Vaultwarden means everything is screwed while compromising NextCloud is mainly a minor inconvenience. It provides neither information about the database’s password nor any avenue to attempt to intercept the password.

            • potustheplant@feddit.nl
              link
              fedilink
              arrow-up
              2
              ·
              edit-2
              4 hours ago

              EDIT: Forgot to mention the worst part about KeePassXC. It’s vibecoded crap.

              I replied to that comment. You’re assuming that compromising vaultwarden is somehow easier than compromising nextcloud. No idea why. Intercept the password where? I’m using a local client and only syncing the vault. You seem to be pretty unfamiliar with how vaultwarden works.

              • boonhet@sopuli.xyz
                link
                fedilink
                arrow-up
                1
                ·
                38 minutes ago

                EDIT: Forgot to mention the worst part about KeePassXC. It’s vibecoded crap.

                Is RiiR still all the rage? Perhaps it’s time to oxidize KeePass. There are a few libraries for kdbx files and at least one ready-made CLI.

              • AHemlocksLie@lemmy.zip
                link
                fedilink
                arrow-up
                1
                ·
                3 hours ago

                No, I’m assuming that compromising NextCloud is less devastating than compromising Vaultwarden, so I’m taking a calculated risk that my database’s password is secure enough to offset the slightly increased risk of access to the encrypted database because I don’t always get to choose all the software I get to use in every environment I work with, so I might have to use the web client if I can’t get the local client.

                As for you only using the local client, congrats, we don’t always get to choose what we use outside the home.

          • AHemlocksLie@lemmy.zip
            link
            fedilink
            arrow-up
            2
            ·
            12 hours ago

            At that point, is it really easier than NextCloud? I don’t have to worry about forgetting to disconnect and wasting my VPS’s bandwidth or ruining my ping for games. On PCs and laptops, the file is immediately local, and on mobile, it’s easier to download an updated version of the database than it is to mess with the VPN.

            • dogs0n@sh.itjust.works
              link
              fedilink
              arrow-up
              1
              ·
              6 hours ago

              That’s a fair point, I was mostly pointing out in the original comment that VPNs are an option that stops your password manager being exposed to the internet (though if their NextCloud IS exposed to the internet and is syncing their password db, then there is not much difference).

              Plus you can tunnel traffic that needs to go to your VPS through the VPN, leaving all other traffic untouched (ie not tunneled), if you are worried about leaving it connected by accident. This would be max convenience.

              • AHemlocksLie@lemmy.zip
                link
                fedilink
                arrow-up
                1
                ·
                6 hours ago

                Compromising Vaultwarden provides an opportunity to inject malicious JavaScript and steal the database password when it’s opened. NextCloud can never leak any info about how I open my password database.

                • dogs0n@sh.itjust.works
                  link
                  fedilink
                  arrow-up
                  2
                  ·
                  edit-2
                  6 hours ago

                  Any password manager could be comprimised. A bug could even be installed on your system or malware. What’s the difference?

                  NextCloud doesn’t know how you open the password db, but KeePass (for example) does, so the master pass comprimise would be with that.

                  Specifically the syncing part being done with any tool, doesn’t matter.

                  Who or how are you thinking Vaulwarden is being comprimised?

            • potustheplant@feddit.nl
              link
              fedilink
              arrow-up
              2
              ·
              8 hours ago

              Yup, it is. On one hand, I would have wireguard configured regardless beacause I don’t like publicly exposing my server. On the other, if you had to do it just for this and don’t want to configure wireguard manually, just use zerotier, tailscale or netbird. They can be set up in like 15 minutes and after you get it working you don’t need to touch it again.

              • AHemlocksLie@lemmy.zip
                link
                fedilink
                arrow-up
                1
                ·
                8 hours ago

                Eh, not worth it to me. Some of what I host is occasionally really handy to be able to access from a random machine, and I don’t want to have to deal with barriers to entry when I need in. I can appreciate the security benefits, but I’ll take my chances. Even if they break into my NextCloud, they’d have to crack an unreasonable password to break the password database open.

                • dogs0n@sh.itjust.works
                  link
                  fedilink
                  arrow-up
                  1
                  ·
                  6 hours ago

                  You are choosing more convenience over security, which is fine, BUT it’s good to know that syncing your passwords with NextCloud over the internet is not any more secure than syncing it over the internet any other way (that uses any encrypted transport method).

                • potustheplant@feddit.nl
                  link
                  fedilink
                  arrow-up
                  1
                  ·
                  8 hours ago

                  There’s this wild technology called a hotspot. You can use your already authenticated device to give another device access to your services indirectly.

                  Even if they break into my NextCloud, they’d have to crack an unreasonable password to break the password database open.

                  That level of security is exactly the same as exposing your password manager to the “fucking” internet. Not sure why you criticized it before when you (incorrectly) assumed that I was doing that.

  • DashboTreeFrog@discuss.online
    link
    fedilink
    English
    arrow-up
    85
    ·
    24 hours ago

    This is really disappointing… I figured the open source nature of Bitwarden would save it from enshittification but as the author says, in the end, the company doesn’t need to keep it open source.

    • Croquette@sh.itjust.works
      link
      fedilink
      arrow-up
      11
      ·
      9 hours ago

      As soon as VC money comes in, the founders cash out and the enshittification begins as the VC will be expecting returns on their money.

  • fira@lemmy.today
    link
    fedilink
    arrow-up
    11
    ·
    20 hours ago

    I have nothing but good things to say about Proton Pass. Syncs across iOS, macos, PC & Linux, stores not just usernames & passwords, but short notes, product keys, & can generate temporary email addresses that can be disabled when they start receiving spam