

Based on this added info I think it would be a major improvement. So I’d say go for it!
Based on this added info I think it would be a major improvement. So I’d say go for it!
Honestly it largely depends on your main PC specs, but like you are hearing from others. It probably isn’t a good idea.
It is the largest reason. Storing the password is one thing but to make the device reasonable to use I would likely store the key’s in TPM with a backup key. I don’t think she would be technical enough to use the backup keys were something additional to happen.
BioMyth
I understand that giving the keys can partially solve the access problem. But she would still possibly be unable to use the device. Additionally, I don’t know that she would be capable of using the keys without additional assistance and we don’t have other techies in our community who could step up in that capacity.
I don’t for a pretty simple reason. I have a wife, if something ever happened to me then she could end up a creek without a paddle. So by not having it encrypted then, anyone kinda technical can just pull data off the drive.
It’s a special edition so probably just scalpers
I’m on the bandwagon of not hosting it myself. It really breaks down to a level of commitment & surface area issue for me.
Commitment: I know my server OS isn’t setup as well as it could be for mission critical software/uptime. I’m a hobbiest with limited time to spend on this hobby and I can’t spend 100hrs getting it all right.
Surface Area: I host a bunch of non mission critical services on one server and if I was hosting a password manager it would also be on that server. So I have a very large attack surface area and a weakness in one of those could result in all my passwords & more stored in the manager being exposed.
So I don’t trust my own OS to be fully secure and I don’t trust the other services and my configurations of them to be secure either. Given that any compromise of my password manager would be devastating. I let someone else host it.
I’ve seen that in the occassional cases when password managers have been compromised, the attacker only ends up with non encrypted user data & encrypted passwords. The encrypted passwords are practically unbreakable. The services also hire professionals who host and work in hosting for a living. And usually have better data siloing than I can afford.
All that to say I use bitwarden. It is an open source system which has plenty of security built into the model so even if compromised I don’t think my passwords are at risk. And I believe they are more well equipped to ensure that data is being managed well.
OpenSUSE tumbleweed is a good compromise IMO. it is also a rolling release distro with built in snapshotting. So if anything does go wrong it takes ~5 mins to roll back to the last good snapshot. You can set the same thing up on arch but it isn’t ootb and YAST is a great management tool as well.
So I’ve been thinking about this a lot. Generally in places like, I dunno, the military which is under the DOD which is under the executive branch. There is instruction to disobey an illegal order from higher ups. But according to the definition of employee here & the requirement of item 7.
I think that if the president ordered an illegal act (which he cannot be charged for from the supreme court) for the military to enact. Then as federal employees, these forms of recourse would no longer be applicable as everyone in the chain of command would be forced to use the presidents definition of legality until a court case could remove/block that authority.
I hope that I’m missing something here but I think this gives him much more power than the rest of the order claims to be covering.