Over the past 3 years the pace of development in APS has steadily fallen off as maintainers including myself have moved on to other things. I no longer have time and motivation to dedicate to this project, and in the absence of significant external contributions there is no-one else I can offer the project’s stewardship to.
To that effect, I will be archiving the repository on Monday, October 14th 2024 at 7AM GST. In the situation that a serious and viable fork emerges, I will help them as much as I can with the transition. The criteria for what counts as “serious and viable” is entirely vibes-driven for now, and may become more specific in the future. In case I determine that a fork does not live up to my made up standard, they will have to come up with a slightly more creative name than “Android Password Store” and watch low 4 figures of cash wither away in OpenCollective’s bank account.
This one hurts… as I use this as my password manager on mobile :{
what are you gonna do now? i might switch to keepassxc but i don’t wanna learn new stuff.
I’m not sure. As long as it keeps working, I’ll probably keep using it until a viable alternative appears. I use my laptop more than my phone, so I don’t actually need passwords on my phone as often.
I was using this app until I created a new gpg key and OpenKeychain did not work because of this https://github.com/open-keychain/open-keychain/issues/2886. I then installed password store inside termux and I am using it as if I am using it from my PC. That works pretty well.
Can CLI applications inside Termux interact with the Android clipboard?
Thanks
Good thing i switched to selfhosted vaultwarden setup.
Sees bitwarden drama, Noooo😭
vaultwarden is perfectly fine. we just need to fund 3rd party clients for platforms. on android we already have keyguard, albeit it being only source available
Yeah vaultwarden even has its own web interface so my passwords probably not going to locked behind priopority apps. İ think i will keep using it for a while at least.
albeit it being only source available
Isn’t that exactly why we need to leave the official Bitwarden client for something else?
yup, my point was we need fully open source clients for all platforms
I agree
Yeah, with all the stuff going on with password managers, I wonder if there’s a truly future-proof setup that can be self-hosted and will never have these issues.
I was a Keepass user many years ago, but I’m not confident that a Keepass-like system would work well with some very computer-illiterate family members. Bitwarden is hard enough to teach them, and it’s one of the easy ones!
There is no such solution but you could just not update your mobile app and keep using vault warden. Nothing will change for you.
you could just not update your mobile app and keep using vault warden.
Well, I’d prefer that the apps that are a gateway to my most important pieces of data (passwords) be updated to plug vulnerabilities and exploits. If it were any other app/service, then I can live without updates. But not something related to passwords.
Someone will fork it, once Bitwarden close the source you won’t know if they are even patching vulnerabilities.
Yup. I’m either hoping for a more sustainable alternative, or a fork with active updates.
For now, I’m holding my position, but preparing for an exit from Bitwarden.
Honestly we need to invent something better than password managers.
Webauthn already exists.
This is more often 2FA & a password is still needed
You still need to store those secrets. You would probably refer to a keychain but in the end it is still a password/secret manager.
And the current implementation is not really better, services like paypal still do not allow you to use a passkey on the desktop.
Any self-hosted software to recommend?
Kanidm
Thx. Will check!
Best we have and probably will ever have on the current web. Not sure what the problem is with password managers?
Personally I would never trust an app to save and manage my passwords. There are a lot of risks with it. But I still think writing down passwords on a piece of paper and storing it in a physical safe when needed is the best approach so ik nobody will understand.
Differences in the thread model. And of course convince. How to you backup your paper regulary? How do you transfer it? What if you need to access a pasdword when you are not home?
Most ppl will just reuse or use very weak passwords when they have to write every password they have to enter.
Differences in the thread model.
Well yea people with the “I don’t care. I just press the button and it always works” model do exist.
Most ppl will just reuse or use very weak passwords when they have to write every password they have to enter.
But browser cookies exist?
I know a lot of services that log you out regularly. Or need a password when you change settings or whatever.
Well yea people with the “I don’t care. I just press the button and it always works” model do exist.
WTF no. Password managers are reasonable secure. That is no i don’t care behavior.
And when you are worried about password managers you should not use cookies. Stealing a cookie is much more simple than stealing and encrypting your password safe.
I know a lot of services that log you out regularly. Or need a password when you change settings or whatever.
Ok that’s true.
Stealing a cookie is much more simple than stealing and encrypting your password safe.
I didn’t mean stealing. I meant losing passwords due to a system malfunction or losing the password for the manager. In that case you lose all your passwords in one moment. That’s scary. Also the manager can become proprietary and leak the data to governments. Though in that case it’s all about your trust to the manager.
That is why you use an open source manager. KeePassXC for example is not owned by a for-profit company.
Losing the container due to corruption disk failure etc can be easily managed with backups.
Losing the password. Yes this is a real valid scenario. I personally have no problem with that i manage fine for years without having to write it out on paper to backup it. A solution would be to actually write that password out somewhere and hide it/ put it into a safe. An attack then needs to attack both, depending if you use disk encryption it is easy to get access to the password safe or not. There are other things to consider, like you could try to hide it in a very long string of characters like 20 pages of random characters, even if you forget it you will be able to find it cause it is very likely that you remember a few characters.
We have USB/NFC hardware security tokens, as well as OS-integrated passkeys