• 0 Posts
  • 21 Comments
Joined 1 year ago
cake
Cake day: June 10th, 2023

help-circle








  • The point is that if someone really wants to get into your device, they will. It doesn’t matter if youre using open source firmware, in a custom implementation of linux, on a MIPS CPU, and you personally build every package from source and complete a compliance code review before installing it, etc.etc.etc. If government agency x is targeting you specifically, your best line of security is to lock your device in a safe, take a boat into the middle of the ocean, and then dump it at an unrecorded location and never retrieve it.

    A device is only secure as long as you are not using it, and it is not accessible physically, or by network.

    You do you dude, I’m just saying your advice is awful for the average user.



  • Does your threat model involve The Mossad? There’s no way on earth that you are genuinely remembering multiple 512 byte random passwords, let alone actually taking the time to type them in.

    Having a password manager, with MFA, a strong master password, and rule based device verification is ultimately more secure as you can have every password be randomized.

    Best practices are best practices for a reason. I recommend you follow them.


  • Genuinely terrible advice. Every popularly available password manager service hashes all your passwords, if they have a data breach they have extremely strict reporting compliance and the majority of services will re-hash all your passwords. If youre so extremely concerned about that, host your own.

    But what concerns me the most is

    Unless they specify they only store the hash I refuse to sacrifice one of my strong passwords.

    … What to you mean sacrifice?









  • I often think that to myself as well to be honest. Originally, it was mostly because it’s the only “secure” system that I’m currently hosting and I wanted the ability to airgap it without taking the rest of my homelab offline.

    I mostly use my homelab for tinkering/applying what I’m learning without breaking a production system at work so needless to say I’ve learned a lot since I originally deployed bitwarden… Now it’s just because I’m too lazy to spin a new vm and migrate everything.