Skip to main content xkcd__386 (u/xkcd__386) - Reddit
xkcd__386 u/xkcd__386 avatar

xkcd__386

u/xkcd__386

New
Open sort options
Change post view

I have resisted getting on the "passkey" train precisely for this reason. Usual advice is "buy 2 Yubikeys" but (a) it's a pain to keep both of them updated when you add sites and (b) I'm the kind who'd lose both. (So "buy 3"? Where does it end?)

But this has changed now, and I am planning to dip my toes in. My password manager of choice (KeePassXC has supported passkeys for some time, but the Android version (KeePassDX) has not had support... till very recently.

So I may just give it a shot



hope is that whoever you're sending it to is trustworthy

I like your optimism and faith in mankind. It's nice to know there are people like that still around, in this jaded, cynical, suspicious, world :-) God bless you, my son!

/s

Jokes apart, I don't see how something you said in an earlier comment:

full disk encryption only protects your data from someone physically pulling out the drive and reading data off of it

does not fit the desktop repair scenario. To me it's the same thing, so the same precautions should apply.


there are multiple incidents like this

(I skimmed the entire issue at https://github.com/bitwarden/clients/issues/14160, including the resolution.)

This kind of thing is always a "when" not an "if" with cloud based services. Sure the same thing can happen with my choice of pwm (KPXC/KPDX), but at least I have the option of rolling back to a previous version of the software if required. You don't have that option with a cloud service!

PS: unless you self-host, of course, but then that is a whole another set of responsibilities I personally have no time for. Syncthing and KPXC/KPDX works in a "set it up and forget about it" manner



better than yours? In my sleep.

Better than his? Only subjectively (sorry for using big words), because it's essentially the same thing he's doing:

find -maxdepth 1 -type f -printf "mkdir -p %TY-%Tm; mv -v '%p' %TY-%Tm/\n" | bash

PS: I didn't realise I had not blocked you, like I block everyone like you (i.e., based on post/comment karma ratio). I will wait a couple of days for you to see this comment than I will block you. (Or if you reply within those 2 days, which tells me you have seen this).


For a desktop machine it doesn't add anything useful, unless you assume someone's going to break into your house

very useful when you have to give the machine to a repairman (for people like me who are not handy with the tools to pull out the hard disk before giving it to him).

also useful if you want to return the hard disk under warranty and get a replacement



you're arguing with someone apparently uses other comments you made on other threads against you in this thread. It takes a special kind of individual to do that!

and he completely missed the point that they've jumped from "adware" to "nagware", if I may reduce the issue to one-word descriptions. Regardless of whether YT was free when it started or not, this is a clear shift





I check my system out with linpeas occasionally, and -- once you wade through the false positives (carefully!) -- there's not a lot to worry about.

What's more, more priv esc issues seem to come up with these fancy new tools than plain old unix user-to-user separation. I think it's a question of powerful features => more complexity => more chances of something getting messed up.

And it's not that inconvenient -- I just run them simultaneously, hence why I said "modulo X11 security" earlier :-)


you're right, it's not a pretty situation.

My solution -- for several years now -- is to simply use different userIDs for different purposes. I can even run them simultaneously (modulo X11 security).

Just have to watch the usual news channels for privilege escalation bugs that may affect the tool I am using.

My threat model is strictly about local files (i.e., in $HOME). I don't care if the untrusted app can see how many mount points I have, what my IP address is, what services I am running (e.g., via ss -plnt) and any number of other things. As long as said untrusted app cannot see $HOME of any other user, I'm fine.

(Even /tmp is fine -- if you set umask properly then other users can't read each others files, only the existence of the file. Which -- again, I've thought about this carefully -- is not a concern for me.



I'll admit that organisations like Signal do have to consider that the "river may change its course" -- because they are used by at least some people whose very lives may depend on the security. "Out of an abundance of caution" -- as a lawyer might say.

But in reality, I don't think this will happen in my lifetime (I'm past 60).

I'm far from being a physicist, but there seems to be a lot of unjustified optimism going around here. And, I don't have the link handy but have you read the paper by Peter Gutmann that came out earlier this year? (I think "Peter Gutmann stunt cryptography" will get you something.

In the end, this debate can only be ended with time. So maybe I should save this comment and revisit every 3-4 years to assess what current S-O-A is.






yeah this always annoys me.

Whether it's an Android bug or something on Linux or Windows or whatever, the reporting -- unless you look carefully -- makes it sound like everyone is impacted, even people who are sensible in how they manage their systems (in this example, they don't install arbitrary junk).


even if they're all equally trustworthy, security functions should always be handled by a tool whose sole purpose is security.

A browser is a massive piece of software with a huge attack surface. Why would you want to risk tying your passwords directly into it?

Use a dedicated tool.

(Personally, I don't trust cloud, and I don't want to self-host -- that has its own problems and effort managing your server and keeping it secure. So I use KeePassXC on laptop, KeePassDX on Android, synced with syncthing).



Apologies for not answering your question, but hardware encryption is not a good choice.

At the moment I can only find https://www.kb.cert.org/vuls/id/395981/ (and others talking about the same research), but over the years I seem to recall at least a couple of others like this...

Use software encryption -- several tools exist, on all OSs (though accessing the same encrypted partition from multiple OSs may be a challenge, I will admit).




yup; among these tools only Markor renders

lorem
ipsem

as "lorem ipsem". But remember until less than 3 years ago, I was all "vim only" (using pandoc to render to HTML or PDF or DOCX or whatever), so I'm used to that.

Also, I have started to write whole paragraphs as single lines, because it really helps when searching multiple words (e.g., "phone" and "battery" mentioned in the same paragraph) using fzf or grep, or indeed any line-oriented search tool.




So your current solution is mostly silverbullet, markor and a self hosted server ?

No self-hosted server. Silverbullet is running on 127.0.0.1 on both my laptops -- no access from outside.

Editing: 80% on VIM on laptop, 15% on Silverbullet , rest on Markor
Viewing/searching: 40% SB, 40% Markor, the rest (which don't have images/etc inlined) on VIM.

Tip: use foo syntax instead of [[bar.png | foo]] for maximum compatibility :-)


scams as India is the scam capital of the world

I started to look into this, in a totally unstuctured way (i.e., not real "research"). As far as I can tell, this is happening at the individual level (i.e., each scam involves a 1-to-1 thing with someone who's not tech-literate or whatever).

In terms of amounts of money involved, Russia and NK lead the pack -- they don't (seem to) go after individuals


commented

yeah I've never done a bootloader unlock. I assumes it's done when you want to install a different ROM, right? But what ROMs work with arbitrary Samsung phones? Is there a definitive list somewhere? My phone is a Samsung "F15", whatever the hell that means.


I'd love to go back to single files basis though, so it doesn’t mess up with my local folder structure. What I found about PKM tools is that it makes me make a folder structure twice : one for text files and one for work files (3D files and images in my case). It was inefficient for me.

Interesting. I'm the opposite I absolutely want all my files as individual MD files at the OS level -- because bulk of the time I'm in VIM, so "single file" (i.e., SQLite or similar) won't do.

Oh and Silverbullet has a vim mode also :-)

Quick question, I just discovered that I can’t open a file synced with syncthing with markor, it tells me it doesn’t want to open synced files. Did you have the same experience ?

oh wow, no! Works fine here. I'm not an android expert, but depending on Android version you may need "permission for all files" to Markor? Or maybe permission for a specific folder, and then that folder be part of syncthing update?


Disclaimer: not sure if this goes against the spirit of "self-hosted" but here goes...

I discovered Silverbullet only recently, so I don't have the v1-vs-v2 issues you spoke of. To your other point about sync, I do use it on multiple machines, but there is no single server -- each machine runs its own local silverbullet. The data (markdown files, and attachments) are actually synced using syncthing.

On mobile I edit the same files using Markor.

Not sure if it actually helps you, so I'm throwing it in as food for thought



I agree about the live render.

In my case (not sure if it applies to you) the bulk of my editing is done on the laptop; the mobile is mostly viewing. Editing on mobile is only occasional so this did not bother me.

Plus, I have been using VIM since 1995 (yeah I'm old!) so there's that.

But Silverbullet renders how you described Obsidian -- only the current line is markdown. You could also try QOwnNotes -- another nice product that I have used briefly in the past



I wouldn't use obsidian anyway since I have disabled play store and only f-droid on my main phone.

Try Markor, seriously. Especially in light of you saying "files changed in formatting", I can tell you that between Markor on Android, Vim on Linux, and Silverbullet on Linux, there is NO change in file format or any other side-effect. I use all three seamlessly (Silverbullet only recently though).

The round-tripping is excellent.

What do you use on laptop?





syncthing is actually what I use.

  • app launch on laptop: I've installed it both on Linux (all my machines) and Windows (for a friend), and it has always worked. There may be a subreddit that is more suitable to ask -- and you should because that's not normal.

  • notification: yeah that's a pain, but I asked the dev and he said there's no way around it. (Frankly, his explanation did not make sense to me, and I had counter-examples of other apps that don't have such a need, but whatever; I'm not an Android expert so who knows.

Out of curiosity, what actual software are you using to edit these files? I use vim on linux, and Markor on Android. I've also started playing with Silverbullet -- it's literally the only one I found that uses your existing markdown files as is, without (like Joplin or other tools) "importing" them into their (SQLite) database or whatever. I'm a hardcore "vim" guy, so being able to do anything I want on the content directly is very important to me, but that's just me.


ok I simplified things too much; I do actually use multiple user ids, but didn't want to sound crazy.

I have not properly digested what bubblewrap and similar tools do, but the classic Unix separation between userids is much more fundamental to every Unix. (I.e, this would work on any other Unix also). Maybe you have a link to something that'll explain bubblewrap to someone who's not exactly young any more?

Also, what are the downsides of bubblewrap compared to multiple userids?

Edit: forget all that, I just (re-)read the README at https://github.com/containers/bubblewrap and I'm not sold. Specifically,

The maintainers of this tool believe that it does not, even when used in combination with typical software installed on that distribution, allow privilege escalation

I'm sure they're only being ultra cautious, as any good open source developer should be, and I'm also sure that's a very long shot. But the long shot is privilege escalation. I'll take normal Unix user-to-user and user-to-system separation over that.



curiously, normal people here don't even know this happens. Even the occasional arrests (Delhi Police have a decent track record AFAIK, not sure about other cities), don't really hit the headlines. Like in many places, our politicians take most of the mind share!


wow.

I wouldn't IP block the whole of China -- it's not as simple as that. And if someone wants to visit my blog (under my real name, not this xkcd386 handle), etc., that's fine.

Just out of curiosity, what do you host that is "at risk"? I'll admit I have nothing that could be hacked remotely -- the only thing I have is a blog which is statically generated on my laptop and pushed so it's not as if there's PHP or something even! Everything else I have is on github and similar.

All my other "self-hosting" is literally on my laptop, and I don't really need "access from anywhere", so it's fine to have it on LAN. I'll probably use tailscale if I ever need that. I don't see a risk from China for that, even if I start using it, so I'm curious...


xz style hacks are always a risk with open source, but if it's Chinese, the chances are probably way way higher. China has laws that enforce compliance to CCPs orders, so even if the developer is honest he may not have a chance.

PS: I'm an Indian living in India, and have a huge anti-China bias


I don't use play store -- F-Droid only for me (1), so I can't try this.

What I've been using for "need to transfer files between devices on the same network" (as OP says) is:

  • syncthing to constantly keep a particular folder updated between all my devices (2 phones, a tab, and 2 laptops right now)

  • kdeconnect for ad hoc transfer between previously "paired" devices (laptops or phones)

  • localsend for ad hoc transfer with other devices.

All work fine; specifically the 4 limitations OP posted aren't a problem with any of these solutions.


(1) well google is preparing to take away f-droid and almost all independent software but that's next year...






I'm writing an article on this topic

I hope you include the fact that you can simply create another userid for untrusted apps, and run them from there.

(Edited to add: I keep a second terminal session logged into this userid, so I can start anything from there when needed. This is similar to one of the protections in Android, as you pointed out in one of your other comments in this thread).

This protects from all sorts of nasties, in fact pretty much everything except: (1) exploits that include privilege escalation -- which is not common but could happen, and (2) X11 related stuff (e.g., spying on the clipboard).

I've been using it for years now, so I'd be especially interested if you see any downsides to this other than those two. Even more interested if those downsides have already been exploited in the wild.








not only do I have them on the same device, I have them on the same app -- all my TOTP codes are in my KeePassXC KDBX file.

I used to say this is bad and wrong and what not. But the threat model for 2FA is a remote hacker knowing your password for some website, either through a password dump from an insecure site or some sort of phishing (1). It is not the situation where he has gained access to your laptop/phone and/or your KDBX file, and knows the master passphrase for the password file.

(This is subtly different for online password managers, where you have to prove yourself to the online service, but I don't do cloud stuff so shrug).


I expect heavy downvotes from FFS fans, but what the heck...

FFS is certainly open source by a strict definition of the term, but a sync tool is a "critical" tool in my book. For critical tools, I would prefer the available source code to be not just a snapshot of the entire code at each release -- I'd like to see/follow development.

No idea why they don't do that, but it is what it is.

Also, my answer is actually rsync and rclone for CLI, syncthing for stable, permanent, syncing.

(PS: rclone bisync subcommand has matured quite a bit. For CLI use where I explicitly want to invoke the sync it's often as good as syncthing).




Yet another proof that post-karma / comment-karma ratio is an excellent indicator of trolls, shills, and other mala fide users.

This <insert swear word> has 2.7K post karma, 157 comment karma -- a huge ratio (nearly 18)


Simplest and sanest is to use git-config. Even though this has nothing to do with git, it's a great way to edit and parse such stuff, and almost everyone already has git.

Create the config file like this: (I'll explain "exclude" line later):

[drive "drive-A"]
    dir = /d1
    dir = /d2
    dir = /d3
    exclude = /d1/timeshift
[drive "drive-B"]
    dir = /d4
    dir = /d5
    dir = /d6

Say the file is called "my-backups.conf", then this works:

LIST=$(git config -f my-backups.conf --get-all drive."drive-A".dir)

Best if the directory names you supply to the git config file have no spaces in them!

How I use the "exclude" is I massage that list into a set of "--exclude" options for my backup tool (restic). I leave that as an exercise for you :-)



OP has post karma 7.0k, comment karma 2.0k. Anytime the ratio is that high I block and move on...

Honestly, reddit needs an option to help us make this automatic (with our choice of threshold ratio)


a bit shallow

you'd think so, but you'd be surprised how often it turns out to be useful. I routinely block people with high ratios on tech subs.

I have no idea why I started a conversation with you; must have been bored. I'll block you now to save myself having to see your self-promotional crap again (which means you won't see this message, but people like you have multiple userids so you probably will...)


people like you, who just post endless streams of URLs and don't actually participate in discussions enough to get comment karma, are... well in the interest of being polite I won't say what I'm really thinking.

I've found that post/comment karma ratio is a really good indicator of quality.

Mind blowing insight for you right there, kiddo



wow. You're either a very clever scammer or dangerously naive about security. Over in the other thread at https://old.reddit.com/user/Srivari1969/comments/1mv5vws/vaultpassorg_a_simple_site_for_storing_complex/n9tibf5/ the conversation reveals that the password used to access the service is also the password used to decrypt the data, which means your server has access to all the data.

And then your response to the person who laboriously explained why this is bad is classic Indian-style righteous indignation. I'm tempted to say "nice try, <swear word>".

(For others reading, don't worry I'm an Indian living in India, this is not a knock on Indians, it's just ... well you read https://old.reddit.com/user/Srivari1969/comments/1mv5vws/vaultpassorg_a_simple_site_for_storing_complex/n9ulv65/ -- and if you're an Indian you'll get it, otherwise don't worry about it.

Edit: I just read https://old.reddit.com/r/Passwords/comments/1mv5xp5/vaultpassorg_a_simple_site_for_storing_complex/n9t125x/ -- "I'm giving back to society". What sanctimonious drivel, but again -- classic Indian response, including the namaste icon.

If you want to give back to society you would open source it.




looking at your responses to some of the other comments, I take it you haven't discovered a neat little trick called "shell scripts" to encapsulate rsync or cp to your "just a wee bit different, to prove I did something" specifications.

And FFS don't reply in that overly polite manner. You sound like you're using an LLM to at least polish your responses. This is f-ing reddit, no need to be formal and overly polite.



I have a lot of it but it's unfairly earned, because the people I lord it over are students :-)

I go to a local college a few days a month to help the students with their projects, and almost all of them use some IDE (even on Linux). I'll freely admit my vim is not as tricked out as it could be, but I still manage to navigate the source code much faster than they can :-)


Edit: apparently this was too "friendly", and some brainiac thought it was generated by an LLM. JFTR, no, it's not. It's an edited version of a bunch of entries in my personal wiki (edited because I have lot more data than this, including logs of my experiences, some benchmarks, bits of shell script, options to watch out for, and god only knows what else, interspersed with the bullets you see below).


Hi u/Schorre -- here's a breakdown of common, open source, command line only, tools for you, in decreasing order of (my) preference.

  1. restic: multiple versions, space efficient, encrypted, chunk-based de-duplicated, can use almost any cloud or sftp backends. Can delete arbitrary older versions when you feel they've aged enough, and this can be automated also, with suitable parameters to the prune subcommand. Multi-threaded, and with an rclone-backend (which is also multi-threaded), it's very fast.

As a quick check, one of my backups has 140+ snapshots over the past 2 years, the total size without dedup would be 960 GB, with dedup it is 45 GB.

2. borg: almost same as restic, but no multi-threading, and borg is required on the server (so no backing up to an arbitrary cloud server -- it has to support borg). See this comment for other reasons why I switched from borg to restic

3. rdiff-backup: multiple versions, but you have to plan ahead which one will be a full backup and which ones will be incremental -- you can't arbitrarily delete an older version. Also no encryption. Space efficiency uses rsync-s delta mechanism. It's not as efficient as chunk-based dedup. (Might sound like a corner case, but if you cycle a large file between two different versions across, say, 10 backups (i.e., version A today, B tomorrow, A again the day after, etc), restic and borg won't take up any extra space except metadata, but rdiff-backup will keep producing reverse diffs A/B then B/A then A/B again. On the plus side, the latest version can be read off from the disk directly -- no special software needed.

4. rsnapshot: multiple versions, but deduplication is only at the file level using hard links when the content does not change. Will definitely take more space for a given number of backups, than rdiff-backup. Has the same A/B/A/B/... problem. Plus point is ALL the versions can be read off from disk directly, not just the latest version like rdiff-backup.

5. tar: individual tar files like you're doing, have absolutely no deduplication. You're wasting space.

Hope this helps. (I ignored many other tools, some of which have some nice properties... like dar, 7zip, zpaq and so on)






https://www.data.gov.in/resource/stateut-wise-cases-registeredcr-under-dowry-deaths-2017-2021 (from https://www.data.gov.in/keywords/Dowry)

row 39 (total for India) shows a 9.55% drop in 4 years. Unfortunately this does not really differentiate between urban and rural, and I stand by what I said -- it has come down a lot in urban India.

don't throw around words like "ignorant"; it doesn't help make your case

Edit: I just realised, while it does not account for urban vs rural, it also does not account for population -- they're absolute numbers. But we can fix that.

Taking the numbers for 2017 and 2021 from https://en.wikipedia.org/wiki/Demographics_of_India#UN_estimates into account, the dowry death numbers effectively drop 13.07% (not 9.55%).

That's a far cry from "1-5%".



The bigger, or at least more visible, reason boys were favoured was not that they would financially take care of the parents. It was because of this horrendous practice called dowry. In certain communities the amounts involved were mind-boggling, and in many cases would put a serious dent in any father's life savings. To the point that if they had daughters they'd better start saving right now.

Thankfully this is (I believe or at least it seems so) largely gone, and even when practiced, in many cases it is merely symbolic.

(Like gender-determination, it is of course illegal, but that doesn't mean much in practice.)

I think what has reduced it a fair bit is better education, especially for girls, and a more urban population (more people moving to cities from villages, which has its own problems but let's not go there) leading to much more cultural diversity and awareness (neighbours in city apartment could well be from different parts of the country; this would not happen in villages), and so on.


all good points

but a lot of it gets mitigated heavily if you

  • use, say, thunderbird for email

  • never log on to that account on a laptop/desktop except in the rare occasion you need to do something with settings (e.g., setup a mail rule)

  • never log on to google on Android, and disable playstore, play services

    • (the price I pay for this is that, I maintain a second phone for the rare occasion I need google maps. It's not a huge price in money terms; it's just my previous phone before I upgraded)

TLDR: never stay logged in (whether that is phone or laptop browser).

Note that my main email is actually fastmail, I do agree with the idea of reducing gmail, but it can't be totally avoided, as OP said


I was a long time borg user but switched to restic about 2+ years ago. My reasons were mainly that it is much faster (multi-threaded, and so is rclone so if you use that as a backend you can really see the difference), can backup multiple sources to the same repo (borg has warnings about that), and of course the fact that you can backup to pretty much anything that rclone supports.

In particular, I hated borg's constant whining about "this repository was previously located at /blah/more/blah/whatever.borg; are you sure you want to use it?". That and the limitations on backing up multiple sources to one repo seemed to imply a potential security problem if you did that (this is from memory, don't shoot me if it's not true. And in fact it may not be true now).

The fact that restic is a single static binary is a bonus; I can install it on all my devices without any version dependency issues common to python tools.


yeah but you should instantly fix that. Go and reformat all your disks, reinstall if you have to.

/s of course

Sarcasm apart, I hate the knee jerk reaction on this and other subs to devolve to zfs, as if changing the file system is ever a solution when someone asks a question of this nature.


or you could stop using a cloud-based service and use a local-file password manager -- anything from the keepass family.

I have everything (even TOTP) in one KDBX file with a pretty long master passphrase. I send a copy of that file to my wife and kids every time there's a significant change to an important password. Sometimes I send it to a buddy. (Family knows the master passphrase -- blame covid for that precaution; buddy doesn't).

Covers for all sorts of availability issues.

cue downvotes from bw fans :-)


Keeping the TOTP separate does not make any sense; that is not the threat model that TOTP is meant for

TOTP is for "some hacker on the internet got my password", not "someone got both my KDBX file and my master passphrase". If that ever happened you can bet he has your other two KDBX files and their passwords also.

Stop overengineering things.



some of my favourite quotes on btrfs:



transnational repression from India on the Sikh communities in Canada

Disclaimer: I'm an Indian living in India.

Please don't make it sound so one-sided.

I don't like our "four-letter word PM" much myself, and I have no opinion on whether he did or did not instigate anything, but if these "Sikh communities" stayed "in Canada" without interfering in India (i.e., Khalistan separatism), I doubt there'd be anything to discuss.


ranger's bulkrename is a joke.

Try a swap (a <-> b), or worse, a circular rename (e.g., a -> b, b -> c, c -> a) -- it'll make it your problem to do the required intermediate steps.

Vifm just does it -- no fuss no muss. (Only tool even better at bulk rename is vidir from the moreutils package)


vim like -- best one is vifm. It's so vim like the config syntax uses the same keywords -- as much as they can apply to a file manager. You can even do things like :%s/foo/bar/ to rename files :-)

As for ranger, I was a big fan for some years, but eventually realised I don't need a tool whose configuration requires 4 different files in 3 different languages.

Or, consider how ranger does the simple task of "mkdir + cd". In ranger this is https://github.com/ranger/ranger/wiki/Custom-Commands#mkcd-mkdir--cd -- 20 lines of python.

In vifm it is

command! Mkcd :mkdir! %a | cd %a

(by the way, note the vim syntax, except for the %a which is specific to vifm).


just a side note: for directory comparisons, nothing beats vifm.

(Actually, I don't think mc can compare recursively at all -- at least I never figured it out. Would be great if you could tell me how, if you know!)

This is a pet need of mine, so I've compared all the file managers I was willing to use long term (mc is second on my fav list), as well as several tools, both gui (meld, kdiff3), and tui (vim'd DirDiff plugin), custom scripts built off of other tools (like hashdeep, or even rsync with --dryrun --info=progress2) and many more I can't recall.

Vifm has consistently beaten all of them for my needs. Most of them fall apart when files on one side have been renamed or directories have been juggled -- something that's not unusual when people curate their files occasionally -- so you want to know what new content is on each side. In vifm, that is the groupids option to the compare command -- where the listings on both sides line up according to matching content, not matching filename.

I could go on, but I'll stop here.


no I agree with u/GigaChav -- please never work in cybersecurity. You made an over-engineered, needlessly complex tool which has no real security -- for example anyone who knows the root password or somehow get root can access it, and at the end of the day the content is not even encrypted. A lot of it assumes the people who borrow your computer are not tech savvy -- which may be true in your case but not always.

It's fine to say "I'm learning bash" or whatever, but publishing this for others to use is crossing a line.

The correct solution is, as u/wolfegothmog said, to use gocryptfs and simply umount that dir when handing off the PC to someone else.

I have a similar problem. My laptop has all my financial/medical docs in one folder. I travel a lot, plus I teach occasionally at a nearby uni. When I go to the college I may not always be able to keep an eye on the laptop (I mean it won't get outright stolen but kids are kids!). So the financial and medical documents folder goes in gocryptfs, and I open it only for the short duration I actually need to work on those docs, and close it immediately.





yes and no. Yes you are missing something, but no you're not the only one :-)

  • I use keepassxc, so no biometrics. (Anyway I am an Indian living in India, so all that 5th amendment stuff does not apply, but you may find it worth considering)

  • passkey implementations are still very hard to migrate from one system to another (as far as I understand them)

  • that said, I only tested passkeys on a throwaway account; I'm not going to move just yet because I don't see the need

    • I do all the "best practices" for passwords and using KeePassXC properly is already pretty good at preventing phishing (it simply won't offer the password if the site URL does not match, though this is not as fool-proof as what passkeys does)

(Other reason I don't move is the android version of my password manager (KeePassDX) and the android version of my browser (firefox) don't support it yet)