Entrance Chat Gallery Guilds Search Everyone Wiki Login Register

Welcome, Guest. Please login or register. - Thinking of joining the forum??
March 26, 2026 - @748.66 (what is this?)
Activity rating: Four Stars Posts & Arts: 50/1k.beats Unread Topics | Unread Replies | My Stuff | Random Topic | Recent Posts Start New Topic  Submit Art
News: :ha: :pc: Hello Melonland! :pc: :happy: Guild Events: There are no events!

+  MelonLand Forum
|-+  World Wild Web
| |-+  ☞ ∙ Life on the Web
| | |-+  Password Managers? 🗝️


« previous next »
Pages: 1 2 [3] Print
Poll
Question: Do you use a password manager?
Yes! I use a 3rd party one like Bitwarden, or 1Pass   -25 (42.4%)
Yes! I self host a password manager like Keepass   -12 (20.3%)
Sorta! I use a built in password saver in Chrome or Firefox   -7 (11.9%)
Nope! But I have a complicated way of remembering passwords or I write them down.   -14 (23.7%)
Nope! I use the same password for everything :3   -1 (1.7%)
Total Members Voted: 57

Author Topic: Password Managers? 🗝️  (Read 5806 times)
Dan Q
Hero Member ⚓︎
*****
View Profile WWWArt


I have no idea what I am doing
⛺︎ My Room
RSS: RSS

Guild Memberships:
« Reply #30 on: March 03, 2026 @716.44 »

I also think the automatic password generators are a big benefit to these kinds of password managers(of course someone who's paranoid about they're passwords getting found out is not gonna use something like that(i don't know if Bitwarden's passwords are generated with pseudo randomness or not))

tl;dr version:

1. The randomness is fine. Don't worry about it.
2. Bitwarden is fine. Don't worry about it.
3. Need "proper random" offline passphrases? Try Diceware!

Whether the randomiser is good is the least of your worries with a cloud-based manager (but cloud-based managers are still fine!)

By the time somebody's using a cloud-based password manager like Bitwarden (which are fine, by the way, but necessarily require a greater degree of trust in a third-party than an offline one), whether or not they trust the randomisation of the password generator is a bit of a moot point! After all; why would an attacker who has the power to make Bitwarden make slightly-more-predictable passwords not instead make Bitwarden leak actual-real-passwords instead?

(I'll stress that this is unlikely. Cloud-based password systems like Bitwarden, 1Password, LastPass etc. are usually zero-knowledge/encrypted-at-rest-and-in-transit solutions, so nobody without your credentials - not even the company - can access the contents of your vault, assuming their systems are properly implemented. Personally, I'm more comfortable with one that's also zero-trust, which in my case means it's open-source and not-cloud-based, but that's probably not necessary for most people!)

Do they use pseudo-randomness? Who cares!

Anyway, your question was: are Bitwarden's passwords generated with pseudo randomness? As opposed to what? True randomness? We can answer that with a little logical deduction. Bitwarden's random password generator works offline (unplug your network cable and you'll see that it still works!); therefore it can only be using the capabilities within your device. Most people's computers are only capable of pseudo-random (PRNG) generation. Therefore, Bitwarden almost certainly uses pseudo-random generation, yes. This isn't a problem: modern (by which I mean: up to about 40 years old!) PRNGs can be made to be sufficiently unpredictable that this should not be your primary concern in a properly-made software system.

A few of us have hardware random number generators (I keep one in my NAS: the attached picture shows it, attached to an internal motherboard USB header - it's the white thing in the centre of the picture). Whether or not these devices count as pseudo-random or true-random is a somewhat philosophical question, which depends on your preferred interpretation of quantum physics, superdeterminism, and the like! But the real test for a machine RNG is whether or not it's externally predictable. Mine's powered by electron avalanche breakdown effects, which is not great (it's theoretically sensitive to electromagnetic noise), but still a better source of entropy than a software PRNG. Anyway, all of this is to say: I don't use it to generate passwords. A software PRNG already carries more than enough entropy to potentially generate, for example, every conceivable password of up to 64 characters and still have more random left in it. A hardware PRNG is mostly a useful source of entropy for split-key cryptography, which depends upon much more entropy and much larger keys than a typical password!

Want cheap, memorable, hardware-randomised passwords? Diceware is your friend!

Aaaanyway... all of which is to say: if you really want "true hardware" random passwords, get yourself five six-sided dice and roll yourself up a 5+ word passphrase using the diceware table!


* 20260303_155726.jpg (124.81 kB, 800x450 - viewed 5 times.)
Logged


Artifact Swap: PolyamorousI met Dan Q on Melonland!Joined 2025!Lurby
sunnyp4rk
Jr. Member ⚓︎
**
View Profile WWW


⛺︎ My Room

Guild Memberships:
Artifacts:
Joined 2026!
« Reply #31 on: March 03, 2026 @724.90 »

I use Keepass. I don't trust online password managers tbh. Keepass is nice and simple to use, and it's easy to organize as well. I use Android so there's an app that syncs with my database for phone use.
Logged

lakes
Sr. Member ⚓︎
****
View Profile WWW


⛺︎ My Room
Matrix: Chat!
XMPP: Chat!

Guild Memberships:
Artifacts:
Joined 2025!
« Reply #32 on: March 04, 2026 @97.41 »

i personally switch between bitwarden and keepassxc depending on what the password is for
if it's something online that i want synced, then i use bitwarden
if it is offline or that i don't need password syncing for, i use keepassxc
Logged




Mytten
Newbie ⚓︎
*
View Profile WWW


⛺︎ My Room

Guild Memberships:
Artifacts:
Joined 2026!
« Reply #33 on: March 04, 2026 @927.81 »

I use LastPass, though after reading a few of the posts I might switch to something else. It would be difficult though as there is just so much info there that I would likely need to manually paste over, which would have to be done overtime.
I do like it though as it auto fills the correct boxes most of the time. And as far as I know (which is not much tbh) LastPass seems pretty secure.:sleep:
Logged

M2N:sleep:
lakes
Sr. Member ⚓︎
****
View Profile WWW


⛺︎ My Room
Matrix: Chat!
XMPP: Chat!

Guild Memberships:
Artifacts:
Joined 2025!
« Reply #34 on: March 05, 2026 @169.70 »

I use LastPass, though after reading a few of the posts I might switch to something else. It would be difficult though as there is just so much info there that I would likely need to manually paste over, which would have to be done overtime.
I do like it though as it auto fills the correct boxes most of the time. And as far as I know (which is not much tbh) LastPass seems pretty secure.:sleep:

yeah i heard lastpass is not reliable nor open source & they had at least 2 data breaches already (2022, 2024)
if you want autofill, bitwarden's browser extension & mobile app have autofill enabled
there's also proton pass but i never tried it
granted offline password managers are less likely to get hacked
so if you want secure, you could always go with keepass
« Last Edit: March 05, 2026 @676.24 by lakes » Logged




Dan Q
Hero Member ⚓︎
*****
View Profile WWWArt


I have no idea what I am doing
⛺︎ My Room
RSS: RSS

Guild Memberships:
« Reply #35 on: March 05, 2026 @673.03 »

As far as the big cloud password managers are concerned (the likes of LastPass, BitWarden, 1Password, Dashlane, Proton Pass etc.)... LastPass is the one I'd be least-likely to recommend to a friend who needed a cloud-based password manager!

Aeons ago, I used to use them, and recommend them. But (long after I stopped using them, mind) they've had multiple breaches, and that suggests they're doing something wrong.

So yeah: perhaps consider a different provider! Exporting and importing is reasonably easy, though, with most of them. Just be sure to have your "old" provider delete everything after you've finished migrating elsewhere (or, better yet, change all your passwords!).
Logged


Artifact Swap: PolyamorousI met Dan Q on Melonland!Joined 2025!Lurby
XxCat
Newbie ⚓︎
*
View Profile WWWArt


wazzzaaauurrppp
⛺︎ My Room
SpaceHey: Friend Me!

Guild Memberships:
Artifacts:
Joined 2026!
« Reply #36 on: March 06, 2026 @86.56 »

I've started writing down important passwords in a notebook, but yeah most of them are in my browser :innocent:
Logged

pepper
Full Member ⚓︎
***
View Profile WWWArt


she/her 🐾 local furry punk
⛺︎ My Room
SpaceHey: Friend Me!
StatusCafe: mildlypepper

Guild Memberships:
Artifacts:
Joined 2025!
« Reply #37 on: March 06, 2026 @955.50 »

Like others here, I use Bitwarden. I also pay for their upgraded personal plan and use it alongside a yubikey. Almost all my passwords are stored on Bitwarden, and I have my Bitwarden, Proton, Google, and Discord recovery codes written down in a safe place along with the other documents I would grab if evacuating my home. So, if my Bitwarden were somehow lost, corrupt, or otherwise unrecoverable, I can still access my email using recovery codes, and with that I can still access everything else by using password resets everywhere.

The Yubikey is nice because I can use it as OTP for 2FA whenever a new device is signing into my Bitwarden account. It's a little annoying when I'm setting up a new Linux install for instance (ran into this a lot lately) and I need to get up and grab my car keys where I keep my Yubikey, but it's a nice peace of mind knowing that to access literally my entire collection of digital access to my accounts, one needs physical things that I control. Someone needs to really want to steal my logins to get access, and I don't think I'm a target of enough interest by any organization or government to steal my physical login key to get access to my accounts LOL.

Anyways, moral of the post here is: look into a Yubikey or other OTP physical key! They are pretty nifty  :unite:
Logged

  :dog:  I'm verbose. Sorry! (not sorry)

         
ocean
Newbie ⚓︎
*
View Profile WWW


they/them
⛺︎ My Room

Guild Memberships:
Artifacts:
Joined 2026!
« Reply #38 on: March 24, 2026 @13.78 »

I've been using Apple's built in Password manager for ages now, since it just works and autofills everything. While this is nice, I feel like passwords are still kind of less than ideal. I really like the idea of Passkeys; while the concept probably does need a bit of work, I think this is the kind of thing we should be moving to.

Passwords are a huge attack vector, and making it harder for the common folks/casual computer users to be hacked is always a good thing.
Logged

zekromaster
Newbie ⚓︎
*
View Profile WWW

Never be cruel, never be cowardly
⛺︎ My Room
SpaceHey: Friend Me!
Matrix: Chat!
XMPP: Chat!

Guild Memberships:
Artifacts:
Joined 2026!
« Reply #39 on: March 24, 2026 @45.44 »

Pass user here. I use GNU+Linux on all my machines so I always have a decent terminal available, and everything is encrypted with PGP so I could hypothetically host them online with no real risk (anyone who can steal my PGP keys from me has access to an unencrypted drive with my encryption key on it, which means they are in my house, which means they can beat me up until I give them the password they want anyways).

Not that I would host the passwords somewhere else, I keep a git repo on my main PC and just pull and push from/to it when I'm home.
Logged

Check out my gemini capsule at gemini://zekromaster.net

Clickable pets:
Spoiler

[close]
haumeaGeth
Full Member ⚓︎
***
View Profile WWW


I'm hungry, can we go get pho?
⛺︎ My Room
StatusCafe: stupidwittlebaby
iMood: batbrainbat
XMPP: Chat!

Guild Memberships:
Artifacts:
A Jiggly Egg !Joined 2025!
« Reply #40 on: March 24, 2026 @73.66 »

At the moment, I just write down all of my passwords. However, I've been slowly learning Ruby in bits and pieces, and while learning about hashes, I immediately had an idea for a little terminal program I could write to save time looking through my huge list of passwords, so I'll swap over to that method once I've finished it!

I don't really trust third party password programs. I don't know how they work, so I don't know how secure they are. My current method works fine, so I haven't had motivation to even look into them either. ¯\_(ツ)_/¯
Logged

noahie
Jr. Member ⚓︎
**
View Profile WWW


Writer
⛺︎ My Room
XMPP: Chat!
RSS: RSS

Guild Memberships:
Artifacts:
Joined 2025!
« Reply #41 on: March 25, 2026 @652.30 »


These days I use the keepassxc-cli package to grab passwords and just use the keepassxc GUI to make new entries. To clip passwords to my keyboard, I made a function and several aliases in my zshconfig file so that it's easy grab-and-go. The function and alias for Melonland looks like this:


Code
kp() {
    keepassxc-cli clip ~/Keepass/Safe.kdbx "Accounts/$1"
}

alias kpm="kp melonland"


So whenever I want to login to Melonland, I just type 'kpm' in my terminal, put in my master password, and the password gets clipped. The workflow is super fast, efficient, and secure.

A while back, I also made my own password manager and put it on Github. Obviously, it's not a very sophisticated one, but it's also mine and totally free, so that's a plus.
Logged

"Your worst sin is that you betrayed and destroyed yourself for nothing"
Pages: 1 2 [3] Print 
« previous next »
 

Melonking.Net © Always and ever was! SMF 2.0.19 | SMF © 2021 | Privacy Notice | ~ Send Feedback ~ Forum Guide | Rules | RSS | WAP | Mobile


MelonLand Badges and Other Melon Sites!

MelonLand Project! Visit the MelonLand Forum! Support the Forum
Visit Melonking.Net! Visit the Gif Gallery! Pixel Sea TamaNOTchi