Next scheduled rescrape ... never
Version 1
Last scraped
Scraped on 28/05/2025, 08:10:57 UTC
Here's some interesting reading material: https://www.cloaked.com/post/the-top-3-worst-password-manager-breaches-and-security-issues-to-date

Password managers have been hacked in the past, and i'm pretty sure others will be hacked in the future.
Even if you use a local keypass, it can theoretically be bruteforced or you can fall victim to a keylogger.

The only safe setup i can imagine right now is a keypass database with a strong password on a removable encrypted medium (maybe a usb key with hardware encryption) that's stored in a secure location and that's only plugged in on offline machines, and it's probably a good idear to copy it on a second encrypted medium for safety. Opsec-wise, i think that setup might even be safer than storing your seed on a piece of paper, as long as the offline machine you plug the thumbdrive into never ever goes online (maybe even has it's network unplugged and it's wifi physically disabled)

It is true, however, that a lot of people store really important data in those password managers, there's no denying that... I'm 100% sure that a password manager is safer than re-using your password. Storing your seed completely offline also has it's attack vectors (like an evil maid, or burglars, or losing your seed), and it's correct that an extended seed with a strong custom password is a good idear.

You are correct. Lastpass was hacked but according to the company the data breach involved
customer names and emails, no passwords were compromised. Which may or may not be true.

I was using Lastpass at the time but after I learned of the hack but afterwards began researching alternatives and went with Bitwarden
which is an open-source PM. I'm surprised to see it on the hacked list but good to know the flaw was caught and corrected before
hackers could exploit it. That is the benefit of being open-source that, anyone can look at the code and there are a large number of  eyes watching for vulnerabilities.
eyes watching for vulnerabilities. So I recommend open-source PMs over closed-source but everyone should do their own research.

Original archived Re: Storing your seed phrase in a password manager? Yes or no?
Scraped on 28/05/2025, 08:05:53 UTC
Here's some interesting reading material: https://www.cloaked.com/post/the-top-3-worst-password-manager-breaches-and-security-issues-to-date

Password managers have been hacked in the past, and i'm pretty sure others will be hacked in the future.
Even if you use a local keypass, it can theoretically be bruteforced or you can fall victim to a keylogger.

The only safe setup i can imagine right now is a keypass database with a strong password on a removable encrypted medium (maybe a usb key with hardware encryption) that's stored in a secure location and that's only plugged in on offline machines, and it's probably a good idear to copy it on a second encrypted medium for safety. Opsec-wise, i think that setup might even be safer than storing your seed on a piece of paper, as long as the offline machine you plug the thumbdrive into never ever goes online (maybe even has it's network unplugged and it's wifi physically disabled)

It is true, however, that a lot of people store really important data in those password managers, there's no denying that... I'm 100% sure that a password manager is safer than re-using your password. Storing your seed completely offline also has it's attack vectors (like an evil maid, or burglars, or losing your seed), and it's correct that an extended seed with a strong custom password is a good idear.

You are correct. Lastpass was hacked but according to the company the data breach involved
customer names and emails, no passwords were compromised. Which may or may not be true.

I was using Lastpass the time but after I learned of the hack began researching alternatives and went with Bitwarden
which is an open-source PM. I'm surprised to see it on the hacked list but good to know the flaw was caught and corrected before
hackers could exploit it. That is the benefit of open-source that there are large number of  eyes watching for vulnerabilities.
So I recommend open-source PMs but everyone should do their own research.