

Master password for Bitwarden, passwords for Backblaze and Apple ID, passcode for backup usb stick. Printed out and hidden away at home and work: On my backup usb stick I have the installers for Veracrypt and MacFUSE Mac is backed up to Backblaze which has 2FA enabled USB stick with a copy of this container hidden at work. Password for this container is a short passcode plus the long press static password from any of my Yubikeys (all set the same)

Veracrypt container on Mac ext HDD with monthly Bitwarden JSON exports and copies of every 2FA QR code plus all account recovery codes. Theoretically even with my passwords nobody could gain access to my Apple ID without one of my Yubikeys. Bitwarden, the leading open source password manager trusted by millions, today launched the open beta of Bitwarden Secrets Manager, designed to centrally secure and manage highly. Yubikeys are used for 2FA or FIDO on every site that supports it plus BW.Īpple’s Advanced Data protection is switched on and loaded with my Yubikeys, the same with Google’s Advanced Data Protection feature. Yubikey on car keyring plus two spares, one at home and one hidden at work. The database is written in T-SQL/SQL Server. The server project is written in C using.

I tried using six words and it was just too much for me. The Bitwarden Server project contains the APIs, database, and other core infrastructure items needed for the 'backend' of all bitwarden client applications. Here is my current setup:īitwarden: unique email address, a five word diceware password.
