Same. Maximum comfort since Bitwarden autofills and puts the token in your clipboard, you dont have to change apps or need you smartphone when you are on desktop.
You are less secure though, but its worth it to me.
Honestly a big debate, so it really depends on your threat model. Lots of people even keep their totp seeds within their password manager which basically defeats 2fa imo, but it’s highly convenient. Personally I keep my totp seeds seperated in a sandboxed user profile.
It only defeats 2FA from a standpoint of someone gaining access your PW manager. But for everything else like a service getting hacked and leaking your passwords for it, the 2FA will still do its job fine.
I store my totp seeds in a separate, rarely used password manager, which then follows me on an “emergency USB” - hopefully something I won’t need to use at all
Depends on what is secure enough to you. For me that is secure enough but I know a ton of people out there who would say it's not secure enough for them. So in the end it's up to you. Think about the risks and make a decision.
In the case of Keepass, it is commonly said that it is best to have a database exclusively for your OTP.
For example, you have your passwords in a db called “My passwords” with an exclusive encryption password, and then another db called “My OTP’s” with its own encryption password, so if someone somehow get access to one, that person still won’t have access to the other, and therefore cannot enter your account.
It provides pretty good translations, but it’s not particularly good for privacy. Obviously it’s better than Google, but their privacy policy isn’t great.
My main issue is they want credit card info to get an API key, which is required if you want to use it through (properly integrated) addons or whatever. The translations are pretty much magic though. Really good results most of the time.
I feel like you’d get this with the Protonmail Bridge. It acts as it a email provider on your local network, and handles the encryption stuff itself. I believe Thunderbird sees and stores the email it sees through that as plan text.
This may be a long shot, but it’s what I do, so it might be an option: Set up a crypto gateway like CipherMail which will automatically decrypt inbound email and sign/encrypt outbound. The result is that your Thunderbird will never get to see an encrypted email, decryption is handled transparently before it hit’s your inbox. Obviously, if you don’t trust your email provider, this is not an option.
This isn’t simple and hence not for everyone, also comes with dependencies on your email provider, but it works flawless for me ever since I set it up. I run my own email server, hence adding in CipherMail wasn’t a big deal.
I am annoyed by this too. The big limitation would have had you could not use IMAP as that is remote.
The other issue is implementation. It would be easy to forward or attach or just store unencrypted in an insecure way which may not be desirable. Frankly for what I do I would prefer Thunderbird decrypt on receipt but place all content in a vault. If one wanted to add some more restrictions one could make it hard to forward by accident mail that was originally encrypted.
The big issue with PGP has always been a combination of bad implementations and key distribution.
privacyguides
Hot
This magazine is from a federated server and may be incomplete. Browse more on the original instance.