alt.hn

5/21/2026 at 2:29:14 PM

Get your passwords out of Bitwarden while you still can

https://www.osnews.com/story/145029/get-your-passwords-out-of-bitwarden-while-you-still-can/

by speckx

5/21/2026 at 4:02:57 PM

This is an incredible overraction over a minor change that did not even happen. You can still find "Always free" in the pricing line of the very same page everyone keeps linking as proof https://bitwarden.com/products/personal/#whats-the-differenc...

Edit: it actually disappeared for some time but they put it back on May 18

snapshot from May 15: https://web.archive.org/web/20260515190646/https://bitwarden...

snapshot from May 18: https://web.archive.org/web/20260518183728/https://bitwarden...

by craigmart

5/21/2026 at 4:09:58 PM

Well it did happen - and then unhappened when people noticed.

by Angostura

5/21/2026 at 5:38:36 PM

There have been plenty of cases like this over time too. Company makes controversial change. Company rolls it back after outrage. Company slowly shifts over time until they've restored what's essentially the original controversial change.

When a company tells you their intention by announcing a change, it's often a good idea to listen. Even if their PR department does some good cleanup work in the aftermath.

by mort96

5/21/2026 at 8:27:54 PM

So what does it matter?

If they are going to make it not free, they can just remove it right before they make it not free.

If it was somehow a binding promise, then it doesn’t matter if they remove it or not, the promise was already made.

If it isn’t a binding promise, then it doesn’t matter if they remove it or not, the promise was not binding anyway.

by cortesoft

5/21/2026 at 4:21:35 PM

I had checked as soon as I found out about the news the other day and it was there. I just checked on wayback machine and you're right, it was removed for some time. However, if they're willing to put back that claim immediately, I doubt that their intention was to drop the free plan anytime soon, but probably it was to incentivize people to use the paid plans. Enshittification must happen sooner or later afterall, but fortunately vaultwarden exists and the export feature is highly unlikely gonna be removed immediately as the free plan disappears, so people could just switch to a third-party or self-hosted backend as soon as that happens.

by craigmart

5/21/2026 at 5:16:36 PM

> Enshittification must happen sooner or later afterall

There are a fair amount of multi-hundred year old companies out there.

by esseph

5/21/2026 at 6:20:49 PM

most of them seem to be falling into the "or later part"

by Meph504

5/21/2026 at 6:38:00 PM

Any out there still doing what they originally were?

by lazide

5/21/2026 at 5:30:19 PM

>Enshittification must happen sooner or later afterall...

No it absolutely must not.

by jjulius

5/21/2026 at 6:07:06 PM

You're right, pardon my cynical remark. I'm just disillusioned by the promises of most tech companies

by craigmart

5/21/2026 at 6:14:17 PM

Pardon my tone, as well - the enshittification is exhausting.

by jjulius

5/21/2026 at 5:20:37 PM

I dont think its an over reaction. It's pretty common to lock in users by removing or imposing cost on exports. Having an export from today is a lot better than having nothing in 5 years when bitwarden disables exports

by halJordan

5/21/2026 at 6:09:21 PM

> in 5 years when bitwarden disables exports

i think this is the overreaction - getting worked up about these sort of risks in general isn’t worth your time.

Otherwise you’d end up self-hosting everything strictly on OSS from maintainers you personally know and trust.

This is like someone saying, “don’t use AWS because they might raise prices some day”

by Esophagus4

5/21/2026 at 6:21:46 PM

I've had the argument so many times with eng managers about how this password manager or that password manager will get hacked or get enshittified and I've been right 100% of the time.

by PaulHoule

5/21/2026 at 6:37:06 PM

With the escalating abusive practices on display, going towards ‘self hosting everything strictly on OSS’ at least is exactly where this is all going.

by lazide

5/21/2026 at 7:57:04 PM

This is like the tech version of being a prepper

by Esophagus4

5/21/2026 at 6:19:24 PM

Can you name a single password vault that has removed the ability to export, I would say it is a bit of wild speculation to assume this would happen. Even more so as there seems to only be anecdotal and speculative evidence this would happen.

Between the law suits, and the brand damage, there is likely very little upside for a company entertaining this idea.

by Meph504

5/21/2026 at 5:43:02 PM

My last job was for a product which launched with a promise of a free tier forever, which they removed a year or two ago.

by mrkeen

5/21/2026 at 4:22:00 PM

I'm not seeing "Always free" on that page browsing from mobile. Also, it breaks my back button. Yeah... I'm going to need to switch.

by daveguy

5/21/2026 at 5:15:07 PM

It is not an overreaction at all to them replacing the principled leader who promised things with the vulture leader whose job and job history is primarily to enshittify things and sell them off.

by anonymousab

5/21/2026 at 5:41:11 PM

How is it an incredible overreaction? It's not like switching password managers is particularly arduous or expensive.

by wat10000

5/21/2026 at 3:09:05 PM

While I'm not _happy_ about the messaging changes, those alone are not enough to do more than start paying closer attention. I highly, highly doubt that vault export would be the first meaningful feature change, and so I think there will be stronger signals of actual issues before then.

As I understand it, so far the only actual change is an announced increase in prices. Obviously, from the consumer perspective, cheaper is better, but this is a product where I think that a subscription plan makes sense (and the free tier, for now, still exists), and so I'm not going to get mad about price changes. Competitors exist and one doesn't think the new price is worth it, then switch to one of them (using the very-much-still-available vault export).

I don't think the warning is crazy or anything, but in my personal opinion it's a little stronger/earlier than is warranted and the current appropriate response is careful watching.

by MostlyStable

5/21/2026 at 5:33:10 PM

The counterpoint would be that, if you feel like you need to carefully watch something that's supposed to take things off your mind, that's an issue.

by torben-friis

5/21/2026 at 3:43:22 PM

I hear you, but I feel like it's a better safe than sorry situation. Exporting your passwords takes two seconds. I think you can export to an encrypted file, but I just did a plain-text json file and gpg'd it. Can't hurt to play it safe.

by ktm5j

5/21/2026 at 5:19:51 PM

if you have to do the 'encrypt single plaintext file' dance at least use age[0] in 2026

[0] https://age-encryption.org/

by throawayonthe

5/21/2026 at 6:55:44 PM

Okaaay I'll take a look at the newfangled thingy :P

by ktm5j

5/21/2026 at 3:44:23 PM

I've been recommending Bitwarden for a few years now and have also been paying a yearly sub since 2022, as I always thought 10$ was a really good value.

But with all this stuff coming out, I'm holding off on recommending it anymore; at least until everything calms down and the new value proposition is fully laid out.

Like other folks have said, I don't think it's yet time to migrate. That being said, it doesn't hurt to do an encrypted export for backup purposes, start looking at alternatives, and reach out to people I know use Bitwarden to do the same.

Keeping an eye out on how this develops.

by tfarias

5/21/2026 at 3:59:28 PM

Agreed. I will continue using it as it currently fulfills my needs. But I’m not going to shout it at everybody I catch not using a password manager anymore. I’m just not willing to take responsibility for the changes they may make in the near future.

As an aside, since it seems like they’re trying to make money: The aforementioned enthusiasm has gotten it adopted at a workplace of mine. The experience hasn’t been good, so no recommendation here either.

Their moat was being a trusted name in FOSS and it’s a bit sad to see them going in the direction of abandoning it.

But somebody else will probably step up and build on the ruins, like vaultwarden already has. That’s the beauty of choosing FOSS in the first place.

by solarkraft

5/21/2026 at 4:09:13 PM

You should try hosting it yourself in docker. Absurdly easy to do if you get an llm to do it and it works very, very well.

Hope they don't alter self hosting it.

by scrollop

5/21/2026 at 4:29:25 PM

If you're going to the trouble of self-hosting, I'd suggest just running vaultwarden.

https://github.com/dani-garcia/vaultwarden

It's entirely compatible with the clients. It also removes a lot of "rug-pull" potential, and gives you the ability to access all the nice features (ex - multi-org, multi-user, shared vaults, totp, etc...)

Honestly - part of the reason I like Bitwarden is that if they ever go full "enshittification", it's going to be relatively easy and straight-forward to just move entirely off their projects and onto open-source forks.

by horsawlarway

5/21/2026 at 5:05:20 PM

You can get rid of the element of hope by using KeepassXC and syncthing. Bonus is you can use this FOSS stack completely offline.

by arikrahman

5/21/2026 at 5:22:00 PM

And not be able to use it on your phone or share it with people you work with.

Vaultwarden is the way. Easy to host docker. Solid. And if bitwarden blocks the clients there will be a fork.

It's leading to it anyway.

by omnimus

5/21/2026 at 5:38:03 PM

I really hope the community gets together and creates a better browser extension. Vaultwarden + that would be perfect.

by rirze

5/21/2026 at 6:29:40 PM

You can use it on your phone what are you talking about?

by yinksta

5/21/2026 at 4:54:43 PM

It is absurdly easy to fire off the docker container you mean.

Because you need to back up, verify backups, monitor availability, manage updates, manage MFA, and a zillion things.

Don't get me wrong, I work in hardcore, high tech IT for 30 years and I selfhost two dozen or so of services. It is far, very far from "absurdly easy" when you start .

Sure you can run a container on your pc, and hope for the best

by BrandoElFollito

5/21/2026 at 5:55:06 PM

Exactly.

I’ve seen this idea so many times on HN. “Just stand up a docker container and self-host”. Or even worse: “why does anyone need GitHub - just host Bitbucket yourself”

Ok, then what?

by Esophagus4

5/21/2026 at 7:07:57 PM

This seems crazy to me. I have a home server and host lots of my own stuff. But a password manager is tier-0, it cannot fail me.

I need to access my accounts while I'm overseas - in fact I'm prompted for passwords far more often when I cross borders. I need my passwords at urgent moments like when I need to make a large bank transfer. I need passwords unexpectedly at all times when sessions expire or I need a new session for a device I've never logged in with.

If my home server went down for any reason at these critical moments it could be extremely bad. There are some kinds of outages I can't recover from without physically attending my server. And if I'm not very very careful there are some kinds of failures I cannot recover from at all - I have a working backup solution but so did every company that lost customer data before.

And this doesn't even touch on the security risk of hosting a database of credentials on a publicly available endpoint.

I need a trust hosted solution.

by mvdtnz

5/21/2026 at 6:08:58 PM

Cant tell if this is satire. But I'm not self hosting my passwords unless I fully understand exactly what's happening. Trusting that to an LLM without really understanding what's happening seems very risky to me.

by prism56

5/21/2026 at 4:33:11 PM

Serious question - how come free is a requirement for a password manager? Everyone's gotta eat, including the maintainers of password managers.

Tech has generous TC, lots of high-end laptops and phones worth thousands, AI & cloud spend, and yet the only acceptable price for secrets management is $0 it seems at times.

by 9x39

5/21/2026 at 4:42:52 PM

They promised an "always free" option. People committed to the service based on that.

Many companies offer a free tier and a paid tier and are willing to incur the cost of users who will never convert. If a company doesn't actually intend to keep it "always free" they shouldn't make the promise in the first place

by culi

5/21/2026 at 5:39:05 PM

I think a company has to be able to change its commitment, but should not screw users at the same time. For example, if they want to remove the free plan, why not, strategy can change with context, the world is moving around the company, so then remove it for new users not existing ones and it's all good.

by gregoriol

5/21/2026 at 7:35:07 PM

Maybe that's fair but that's not what's happening here.

by culi

5/21/2026 at 5:06:03 PM

It’s about the backpedaling. No one says it has to be free, they said that. They just have to keep their promise.

by hnarn

5/21/2026 at 5:12:56 PM

And, honestly, if they came out with a statement that said (effectively), "Look, we're losing money here... we just _can't_ support free going forward. Here's our plan" that would be understandable. Sometimes you have a plan/goal, and you realize later that you were wrong and things need to change. But that's not what they did.

by RHSeeger

5/21/2026 at 7:42:01 PM

I disagree, there is always a way to keep it free, if you care about keeping your promises. Especially in this case where the service is essentially locally encrypted json blob storage. There’s already plenty of premium functionality not included. If you have runaway costs due to abuse, just make up new limits to solve it.

by hnarn

5/21/2026 at 7:18:56 PM

If I had to pay for everything I use.

by nekzn

5/21/2026 at 4:50:02 PM

I’ve been a paying user for years, but the free tier change announcement is a sign of the enshittification to come.

It means the old guard is moving away and potentially starting initiatives not in the best interest of the user. In the worst case scenario they will sell my data or introduce stupid changes that risk security.

by cocoa19

5/21/2026 at 4:51:19 PM

Passwords are critical, losing them because you forget to pay or run out of money would be a disaster. I suspect they would still provide access in read only mode to non-paying users so it wouldn’t be a disaster if they didn’t offer a free version but I think it’s pretty easy to see why someone thinks it should always have a free offering.

by fontain

5/21/2026 at 5:01:04 PM

For me it's not that it has to be free, but that it can't be a subscription service or cloud-hosted-only. It's why I left 1Password. I don't like trusting my password management to the whims of mercurial business decisions. It's only a matter of time until private equity smells blood in the water with this product category and starts "extracting value" through acquisitions and arbitrary price increases.

by AlexandrB

5/21/2026 at 5:47:51 PM

> It's only a matter of time until private equity smells blood in the water with this product category and starts "extracting value" through acquisitions and arbitrary price increases.

My advice would be… If that happens, you can worry about it then.

It seems you could lose a lot of time and sleep protecting yourself against a doomsday scenario that will probably never happen.

by Esophagus4

5/21/2026 at 3:19:37 PM

I store my passwords using this: https://www.passwordstore.org/

It's a shell script that stores passwords in a git repository, containing one file per entry. The files are encrypted using a GPG key. Because it's just a git repository, you can synchronise it between devices using whatever infrastructure you want. I use a FOSS client for it on iOS, and there was one for Android before I got an iPhone.

by cjs_ac

5/21/2026 at 4:01:42 PM

I tried using pass once. I like that it follows the Unix philosophy, and I want to like it, but the fact that all of your account names are visible in the clear is a deal breaker for me.

by n0ot

5/21/2026 at 5:18:47 PM

Thanks for the pointer. I use a similar system, but hadn't thought to put the password directory into a git repo.

by marssaxman

5/21/2026 at 3:53:28 PM

I'm interested in this, what do you use to host the git repo? Just a private repo on something like github or your own server? How do you backup your private key?

by ab71e5

5/21/2026 at 4:18:46 PM

I also use pass. Any forge you feel like is fine (I use gitlab). I backup my gpg key with `gpg —export-owner-trust` and store that backup elsewhere.

Pass has a pretty good ecosystem of plugins/other clients, as well. There are open source iOS/Android clients and browser extensions so once you’re setup the day-to-day experience is not far off from any of the popular hosted password managers.

My only real issue is the dependency on gpg, as it’s pretty long in the tooth and a hassle to operate. (If you are not comfortable using gpg, spend some time learning that before you go all-in on pass!) There’s a fork[1] which swaps gpg for age, but it hasn’t attracted enough attention to get a similar ecosystem of mobile clients/browser extensions, so it’s not a very practical choice IMHO.

[1]: https://github.com/FiloSottile/passage

by wfleming

5/21/2026 at 6:04:01 PM

It's next-to-impossible to implement pass on every device everywhere and have all the same features on each client without reimplementing all of GnuPG. It pushes a lot on to GnuPG.

God help you if you want to use the PGP applet on a Yubikey or smartcard. The pieces all exist, but wiring them all up in a mobile app is hard and the result is janky.

by tadfisher

5/21/2026 at 4:33:22 PM

I don't think Age will catch on as a replacement until it has a gpg-agent equivalent to facilitate access.

by eikenberry

5/21/2026 at 4:06:57 PM

I run Gitea on my own server. (I didn't switch to Forgejo because it's not in the Debian repositories.) I don't have a backup of my private key... I should do that.

by cjs_ac

5/21/2026 at 3:41:19 PM

+1 for pass! I use this on my VPS to store secrets. I love that it syncs with GIT. Good stuff

by Depraved4482

5/21/2026 at 4:07:33 PM

I have used this for almost 10 years now. It's pretty barebones but it seems like the usable lifetime of commercial password managers is 4-5 years before they get enshittified, bought, discontinued, price-jacked, or otherwise made unsuitable for use. "pass" just keeps working.

by jmcphers

5/21/2026 at 2:46:52 PM

I think the caution around Bitwarden is justified; and I think it is good that the message is getting out there. I will say "while you still can" is hyperbole, and will do more to distract from the larger (correct) point about Private Equity.

by Someone1234

5/21/2026 at 5:19:04 PM

The last months didn't make Bitwarden look very good. On the other hand, what about the competition? Sure there's KeePassXC but that's essentially local. Bitwarden even has Send to quickly share with anyone.

I might self-host something at some point. But even choosing something seems a menial task, not to speak of setting it actually up...

by blablabla123

5/21/2026 at 5:20:03 PM

You can host your keepass db file anywhere you like, whether that’s google drive or on a hard drive.

by aryan14

5/21/2026 at 3:58:40 PM

So I have an admission here: I keep seeing HN stuff about these networked password managers and I don't quite understand the appeal.

Is it because everybody else is swapping between several different computers, and you need the synchronization?

I just have everything in KeepassXC, and the ciphertext is subject to the same kind of backup regime I use for other files, [edit: and also additionally] a copy kept on a USB stick in my pocket.

by Terr_

5/21/2026 at 4:24:57 PM

It’s phones, mainly. People do also have multiple other devices, yes. For me another big pro is having a realtime offsite backup and being able to survive simultaneous loss of all my devices, which is plausible in correlated scenarios like a burglary, fire, mugging, car crash, etc, but I don’t know how much others think of that one.

The people I know who use KeePass live like they’re disabled. You ask them to sign up for something and they need to schedule a half hour for it two weeks out. Ask them to use a website and they need to wait until they’re home because their biweekly manual data transfer was put off because of whatever. And if they ever drop their phone, it’s this totally unforeseeable panic they’re still recovering from two months later. I’m far from convinced it must be like this, but I’m also far from convinced that most KeePass people—or people using any other strategy—have really thought this through.

by kqp

5/21/2026 at 4:47:35 PM

Weird. I keep my KeePass database on NextCloud, and the only difference between home and phone is that on a bad network I may need a few seconds for KeePassDX on the phone to decide to use its cached copy of the database rather than the latest one. It would probably be even smoother if I used Syncthing. I assume non-technical people ought at least be able to put their KeePass files on DropBox?

by NoGravitas

5/21/2026 at 6:01:19 PM

> I assume non-technical people ought at least be able to put their KeePass files on DropBox?

Non-technical people would not do something this complicated. They don’t even have password managers, let alone a setup like this.

Shoot, even a lot of technical people (like me) wouldn’t bother with this. It’s why I pay for a cloud-based password manager.

by Esophagus4

5/21/2026 at 7:00:28 PM

> > I assume non-technical people ought at least be able to put their KeePass files on DropBox?

> Non-technical people would not do something this complicated. They don’t even have password managers, let alone a setup like this.

Google Drive/iCloud/OneDrive/Dropbox are already used by non-technical users - moreso than SaaS password managers.

> Shoot, even a lot of technical people (like me) wouldn’t bother with this. It’s why I pay for a cloud-based password manager.

What do you do for when you want to access some other type of file across devices, like notes or photos? If you have notes.txt on an FTP server or something, just put passwords.kbdx alongside it. If you're subscribing to some new service for each individual filetype you want to sync, with nothing for arbitrary files, that seems like considerably more hassle overall to me.

by Ukv

5/21/2026 at 8:06:25 PM

For other types of files, I have different apps: Obsidian Vaults with Syncthing, but that’s not accessible from the internet. And I like having my passwords across all my devices, updating anywhere I am.

And for me, it’s just not worth the headache (and security risk) of hosting my own password manager.

by Esophagus4

5/21/2026 at 8:31:42 PM

> For other types of files, I have different apps

How many separate services do you have for syncing things, and what do you do for filetypes outside of what they cover?

> And I like having my passwords across all my devices, updating anywhere I am.

That's how it works for me with a passwords.kbdx file on my FTP server (but any cloud storage works). Same for any files you want to access across devices.

> And for me, it’s just not worth the headache (and security risk) of hosting my own password manager.

What's the security risk? If anything, it's SaaS password managers that seem to semi-regularly get hit with breaches (well, mostly LastPass).

You don't need to host anything for KeePass - just plop the file next to your notes/etc.

Headache also seems greater overall if you're juggling a large number of subscriptions, particularly when they start ramping up payment or moving features you rely on to higher tiers.

by Ukv

5/21/2026 at 8:31:13 PM

I use vaultwarden hosted on my own server.

I use it to sync between my phone, tablet, laptop, and two desktops.

I want to be able to add a login from any of those, and have it be updated on all of them.

I might have more machines than most, but everyone has at least a computer and a phone, seems reasonable to want to link those two.

by cortesoft

5/21/2026 at 4:34:15 PM

Multiple devices and family sharing. My wife and I share several accounts, so it's really nice that we can move them between private and shared vaults on 1Password.

by microtonal

5/21/2026 at 4:48:37 PM

I swap between my phone and my computer. Sometimes I need to get an account password on a workstation, and I can just login online rather than typing several lengthy generated passwords.

Most of the workstations I use completely block USB storage devices (but not fido2 keys!)

What would be super nice is to have USB wedge that I can just send my passwords from my phone to any computer like this https://www.inputstick.com/ (Expensive, sold out and also doesn't ship to the USA)

by vablings

5/21/2026 at 4:20:57 PM

> I just have everything in KeepassXC

Me too, but I rarely add/edit anything in .kdbx file, it rarely changes. So I just keep a copy on my phone and use KeePassDroid to open it sometimes.

If you change/edit your passwords all the time, and you like autofill and I assume other features, networked solutions are much better.

by mystifyingpoi

5/21/2026 at 8:33:35 PM

Who doesn’t like autofill? It makes everything SO MUCH easier.

And it isn’t about changing/editing passwords all the time, it is about all the new passwords that are constantly being added.

by cortesoft

5/21/2026 at 4:40:51 PM

My KeePassXC database auto-syncs to my Nextcloud instance. Nextcloud client on PCs, Keepass2Android on my phone, and it's the same end result as Bitwarden but without the shenanigans.

by parliament32

5/21/2026 at 4:47:24 PM

Do you have a solution for auto-merging conflicting changes? Because I think that's the real difference, editing on a laptop and on a desktop before the sync can occur, can cause data-loss (for my potentially naive use of keepassxc anyway).

by webstrand

5/21/2026 at 5:02:42 PM

I've never seen this happen, because (as far as I can tell) all KeePassXC clients auto-save the file any time a change is made, and all the Nextcloud clients auto-sync as soon as the file changes. Keepass is also resilient to the underlying file changing while you have, say, the edit password dialog open.

If a conflict did happen though, newer versions of Nextcloud just keep both copies and alert you to resolve it. If I had to resolve this I'd probably try the built-in database merger first: https://keepassxc.org/docs/KeePassXC_UserGuide#_merging_data...

by parliament32

5/21/2026 at 6:38:31 PM

How do you get data loss?keepassXC,DX saves a conflict copy and warns you. Anytime I've seen the warning over ~10 years it's been a non issue. Like I add an entry on PC, walk away from the 'save db' prompt for a day and then update something on my phone so I have 1 new account on both. I see the warning and so I have to hit one button to do the basic merge or whatever and it's done.

What are you guys doing to get real issues?

by yinksta

5/21/2026 at 5:41:48 PM

I second what the other commenters have said.

There are several factors at play making conflicts almost impossible:

- A central device can be immediately synced to. For Nextcloud, it could be a server, for direct synchronization that I use (Syncthing), my phone (almost always online) is the intermediate device for all.

- You are usually online when creating accounts/password, so an sync can happen directly after a change

- And finally: How often do you actually _create_ accounts rather than just read the database? And how often do you do it on two devices in quick succession?

by lexlambda

5/21/2026 at 4:52:03 PM

Merge conflicts on NextCloud are terrible, but for a KeePass file, I don't think this comes up very much. My laptop syncs from Nextcloud whenever it's online, and my phone syncs whenever it opens or modifies the file. Nobody else is using my laptop or phone, and certainly not my keepass vault. I would probably have to go out of my way to use both my laptop and my phone offline and add/change passwords during that time in order to get a merge conflict.

by NoGravitas

5/21/2026 at 4:12:46 PM

Having a password manager synced to phone, desktop, laptop, browsers is handy. I used Keepass 10 years ago but I prefer integrated experiences now, particularly since I often pull them up on mobile.

Also consider teams or multiple teams across an org sharing secrets. Flat files are a tough sell, so these apps eliminate almost all the hassle. We pay for a lot of 1Password accounts, and I couldn’t imagine rolling our own solution.

by 9x39

5/21/2026 at 7:12:58 PM

The Apple Passwords app does all this just fine. The only thing it's missing is secure notes to store my 2FA recovery codes in.

by markdown

5/21/2026 at 8:34:01 PM

That works if all your devices are Apple devices.

by cortesoft

5/21/2026 at 4:16:24 PM

In my case it's exactly that. I have a Linux gaming workstation, a work-issued (and managed) MacOS laptop and a Google-branded (Pixel) Android phone.

Bitwarden just works in all those places and the tech was, by all accounts, rock solid. AND I can pay for it instead of trying to leech off some privacy-ambiguous free tier.

by teach

5/21/2026 at 4:46:12 PM

USB stick in your pocket sounds nice but what happens when you drop your keys and it cracks or you get caught in a rain storm and it gets soaked?

by culi

5/21/2026 at 5:43:02 PM

Then the copies that exist on the USB are fried but the original that live at home on your desktop/laptop are fine?

by dpoloncsak

5/21/2026 at 4:53:48 PM

Someone else made it similar comment, so I clarified the phrasing of my original post. The main backup of allll my decades of digital junk is independent and happens elsewhere.

Even if I had a USB-stick of magical capacity and reliability, I wouldn't want to have to remember to connect and disconnect it constantly.

by Terr_

5/21/2026 at 4:57:04 PM

Syncing is a huge part, UX is another. I was using KeePass on my desktop for several years before I met my wife, and having her use it was a complete failure. She did not like the workflow. Having to open another another tool, login, search for the correct site, and copy/paste the password was too much friction. And that was when things worked.

Syncing was an utter disaster. Inevitably something would cause syncs to be delayed, and then there would be a conflict and one of our changes would be silently lost. We were constantly going to lookup a password we entered, and finding it was not there anymore, at which point I would have to dig through sync conflict backup files and manually reenter the passwords that were lost, or go through the password reset flow for the sites. It was a giant mess, and that was just with two desktops and a laptop. I was using btsync at the time but all the issues I encountered apply to any file based synchronization, like syncthing, nextcloud or dropbox. Performing whole database file synchronization is simply not the right approach for password safe.

I eventually switched over to self-hosted BitWarden with the browser plugin and it has been much smoother.

by pavon

5/21/2026 at 4:23:10 PM

USB sticks are infamously unreliable, not a great backup plan

by smw

5/21/2026 at 4:39:22 PM

I realize the wording in my comment was a little ambiguous, but don't worry, that's in addition to my files in general. (Restic, Backblaze B2, memorized passwords/keys, regular integrity checks of remote data.)

After all, even with godlike storage-media on my keychain, it would still be susceptible to a mugger or falling down a deep hole. Until that happens, it provides redundancy and convenience, provided I can bring it to a trustworthy computer.

by Terr_

5/21/2026 at 5:00:55 PM

I used to use syncthing to solve that problem, until the developer dropped the distribution because of the Google's anti-social behavior.

But the interface of every software on a phone is so atrocious that I have never actually seen any benefit from having a password manager there that I could copy stuff from. So now I just don't have it, and haven't seen any loss yet.

That said, I store way more low-value passwords on the Firefox manager (that is synchronized) than high-value ones on the offline manager.

by marcosdumay

5/21/2026 at 4:11:05 PM

Is it because everybody else is swapping between several different computers, and you need the synchronization?

.. and phones, and tablets. Yes

by Angostura

5/21/2026 at 3:46:17 PM

I'm taking a "wait and see" approach with Bitwarden. I've been a paying customer for a while, happy with it, and hoping the leadership changes won't be too user hostile. Still, a major reason I chose Bitwarden to begin with is they have a decent "Export" button, and all of this news reminded me that my offline backup of the vault was a few months old. Regardless of their product roadmap, they could have an incident tomorrow that keeps users away from their passwords -- offline backups are a good idea.

And Vaultwarden is nice. I've used it at work, hosted it myself, and as a user of the password manager I can say it's basically indistinguishable. But I don't really pay Bitwarden for a password manager -- I pay them for a secure sync of a password manager I can share with family members who can't figure out a VPN.

by Humorist2290

5/21/2026 at 7:18:01 PM

I have been paying for Bitwarden (BW) premium since 2019 and earlier this year decided to move away from BW due to the password filling becoming somewhat hit-and-miss (even on a fresh install), along with taking its time to do so.

Had previously used Enpass in the past and was pleased to see how much it had improved since then. Also allows me several choices when it comes to where I store my vaults. And fills passwords quickly and efficiently in comparison to BW.

So I've migrated fully to Enpass - clients everywhere, browser plugins available, and it just works.

With this news, it now looks as though my migration was somewhat prescient.

I also use KeypassXC as a backup on USB should it ever be needed.

by bitlevel

5/21/2026 at 7:21:27 PM

Just to add - in my experience, exporting from Bitwarden loses a bunch of things - attachments, passkeys and a few obtuse items.

This isn't a good - particularly as passkeys are effectively just certs - migrators should be aware of those caveats.

by bitlevel

5/21/2026 at 3:54:45 PM

I only use Vaultwarden, which to my understanding is an open source reimplementation of Bitwarden's API. I personally haven't had any issues with it, not sure if it'll eventually stop being compatible with Bitwarden's official applications however.

by stormed

5/21/2026 at 5:02:17 PM

Just switched to KeepassXC and syncthing. Transferring keyfiles over LocalSend. This has been a great local FOSS way to keep autonomy over secrets, without even needing internet.

by arikrahman

5/21/2026 at 4:29:48 PM

Thats why I use vaultwarden. I also like the fact, that vaultwarden is written in rust and does not consume a lot of resources, which is great for selfhosting.

by fpauser

5/21/2026 at 6:08:58 PM

It’s good to review, but what is the risk if you do become a paying customer?

Paying mean they have revenue, an interest to keep it secure and innovate more.

I recall last pass and the last pass breech and the class action from that but that resulted from improper crypto rollout.

Would the same risk happen with Bitwarden?

by rootsudo

5/21/2026 at 4:01:26 PM

I switched to Apple Passwords this week. Really good passkey support, 2FA support, best iOS integration. You can even share passwords with others. Sadly no first party cli support. If you only use Apple devices, it’s really solid.

by TN1ck

5/21/2026 at 4:06:33 PM

Surely they have their reasons, but if they made Linux support work I suspect a lot of the dev community would jump. This household certainly would.

by fidotron

5/21/2026 at 4:22:43 PM

I only use Apple devices myself normally, but if I'm stranded out in the middle of nowhere and have to borrow someone's Android phone or Windows box in order to connect to important stuff like my bank, I'd really rather not be out of luck. Same reason I don't self-host my vault.

by chuckadams

5/21/2026 at 7:15:11 PM

The only thing it's missing for me is secure notes for me to store my 2FA recovery codes in. So I mainly use Apple Passwords now, but still keep Bitwarden going for secure notes.

by markdown

5/21/2026 at 4:06:04 PM

"If you only use Apple devices, it’s really solid."

It's not a good idea to become dependent on a single corporation's products.

by WolfeReader

5/21/2026 at 4:07:38 PM

You can leave via Strongbox (a KeePassXC client), which supports the new export system that includes Passkeys.

by Shank

5/21/2026 at 3:11:38 PM

I wish companies that offer such a core technology and what not were at times entered into a public trust, similar to how some public lands are managed, that would protect them from private equity takeovers; I know it defeats the purpose of the companies in the first place (making money), and it probably would backfire in myriad worse ways than the problems it might solve... But I do think there are many options for how products, services and what not can be structured that give the people who maintain them what they need to thrive; without mining the users for money.

Overly idealistic thinking, maybe... but still thinking.

by cjwoodall

5/21/2026 at 3:25:12 PM

Public management exists for natural monopolies where no market competition is feasible. The role of the public entities is to protect competition. In this case that would be mandating import/export interoperability.

by throwaway85825

5/21/2026 at 3:09:05 PM

Clients are OSS, I wonder why nobody did a Vaultwarden-style fork of them yet that would watch over upstream changes.

by poisonborz

5/21/2026 at 8:35:49 PM

Probably because there is no need to fork until you have to. Why do it prematurely and have to keep it up to date when you can just do it when it is needed?

by cortesoft

5/21/2026 at 3:44:39 PM

Until Bitwarden screws up it's going to be difficult for any fork to get much attention. If they do, that will the moment to launch a fork.

It's Bitwarden's game to lose. Forking is easy enough that there's no great need to pre-emptively fork.

by jerf

5/21/2026 at 3:14:31 PM

Vaultwarden is a very lean implementation of Bitwarden but if you want to look into an alternative to the Bitwarden ecosystem, I recommend - AliasVault https://github.com/aliasvault/aliasvault - check it out!

by subhobroto

5/21/2026 at 3:06:37 PM

Sometimes I think when a startup announces that they are being acquired their competitors have a meeting that morning and announce that they're going to start dialing for dollars. Since acquisitions almost always hurt customers I wonder if we can start creating "poison pills" that deter them.

by PaulHoule

5/21/2026 at 5:55:24 PM

Since Bitwarden is open source, can't somebody create a community-driven fork? Maybe a self hosted option?

by nullbyte

5/21/2026 at 8:36:21 PM

Someone can, and did

by cortesoft

5/21/2026 at 3:33:42 PM

This is getting so tiring. What are the other options out there now?

by bilal4hmed

5/21/2026 at 4:53:30 PM

https://alternativeto.net/software/bitwarden--free-password-...

Honestly after years of resistance I've finally partially embraced Apple's solution and have to admit it works great. I love that Hide My Email is integrated into it so well too

Vaultwarden looks neat:

> Lightweight, self-hosted server written in Rust, fully compatible with Bitwarden clients, implements the Bitwarden server API, supports organizations, attachments, web interface, website icon API, YubiKey, Duo, and multiple two-factor authentication options.

by culi

5/21/2026 at 3:36:00 PM

ProtonPass

by skarz

5/21/2026 at 4:45:33 PM

KeePassXC has always been the one true path.

by parliament32

5/21/2026 at 4:50:51 PM

What is the option for people who want access to their passwords on their phones and don't wanna set up a complex or fragile sync regime

(I do use KeePassXC btw. I just think this is what GP's real question was)

by culi

5/21/2026 at 5:08:16 PM

Ultimately, you have to store the file somewhere and sync it to all the places you want it. The magic here is that it decouples the "password manager" and the "file syncer" so you can (and should) use whatever you're already using. Greenfield, Nextcloud is the cleanest if you want FOSS and self-hosting (and they have clients for basically every platform under the sun), otherwise pick your poison between google drive, dropbox, icloud, onedrive, etc.

by parliament32

5/21/2026 at 3:47:33 PM

vaultwarden (self hosted)

by undeveloper

5/21/2026 at 4:16:34 PM

My company just finished switching from LastPass to Bitwarden. Just in time for that to become terrible too it looks like lol

by ranger207

5/21/2026 at 4:49:58 PM

My old company switched through 4 different managers in the span of 3 months. They switched to LastPass just before all the seemingly endless breaches started. I think they were willing to weather it at first but things just got worse and worse. I think they also ended up with Bitwarden

by culi

5/21/2026 at 4:17:43 PM

I've been using LastPass for years. I really like it. Why did you switch away?

by abfan1127

5/21/2026 at 4:19:38 PM

Lastpass has had multiple large breaches, especially after LogMeIn bought them out

by nacs

5/21/2026 at 3:16:26 PM

I'm a huge fan of AliasVault https://github.com/aliasvault/aliasvault - the author is responsive, receptive. The whole ecosystem is opensource.

Bitwarden/Vaultwarden had a good run but if someone's going to self-host Vaultwarden, I would encourage people to look into AliasVault instead. It's a complete opensource ecosystem.

by subhobroto

5/21/2026 at 4:02:23 PM

We were just about to go to BitWarden from KeePass.

by sys32768

5/21/2026 at 3:57:17 PM

KeepassXC

by HeartStrings

5/21/2026 at 4:08:46 PM

Yes, there are signs of an oncoming enshitification, and these types of articles gaining traction is good because it sends a signal to the company of potential consequences....but at the same time, the evidence supporting Bitwarden enshitification is pretty weak at this point. There are degrees here, not just either/or, on/off, good/shit.

by SubiculumCode

5/21/2026 at 3:57:11 PM

The original creator of Bitwarden still works there as a CTO. I am curious whether he has any failsafes/poison pills in his contract when he took VC money that allows him to fork the product and start over in the event that they decide they want to lock everything down.

Or did he sign all of those rights away when he took the $100M "fuck you" VC funding in 2022.

by AdmiralAsshat

5/21/2026 at 8:36:59 PM

Do you need a contract like that when the product is open source? The only thing he couldn’t keep would be the name.

by cortesoft

5/21/2026 at 8:39:14 PM

There would be nothing preventing him in the source license, but I'm saying he may be prevented as part of the contract he signed when he sold the company.

by AdmiralAsshat

5/21/2026 at 3:11:28 PM

WOW. Quietly editing the 4-year-old blog post is super slimy, holy crap. Also seems like since this story was published, they edited the 4-year-old blog post again. The story points out

>But the explanatory paragraph at the bottom of the same post still says the old ones: Inclusion and Transparency. Crandell’s name is still on it. The post now contradicts itself, and nobody wrote a new one.

Looking at the post right now, they've corrected it to Innovation and Trust.

by pattilupone

5/21/2026 at 4:36:08 PM

Nothing says Trust like quietly and retroactively editing old blog posts. We have always been at war with EastAsia.

by chuckadams

5/21/2026 at 5:09:09 PM

All these companies are being bought by PE right? So what's a safe vendor to use?

by SilverElfin

5/21/2026 at 4:42:08 PM

I knew when I started hearing ads for BitWarden on NPR that the good times were over.

by colordrops

5/21/2026 at 3:26:24 PM

Third-party password management as an isolated paid service (i.e. you don't get password management unless you pay specifically for the password management) is just a terribly bad idea all around.

Waiting for people to get this.

by jrm4

5/21/2026 at 3:32:04 PM

A bad idea for you. My non-technical family members can barely use 1Password and it is the easiest of the lot. The idea you promote is just not realistic.

by e40

5/21/2026 at 3:35:57 PM

Not really. That something is convenient doesn't mean that it's a good idea. It's always a matter of convenience vs security.

by baal80spam

5/21/2026 at 6:01:59 PM

When people had to rotate passwords every month and choose a new one according to insane complex rules and dictionary tests, well, that was not convenient. You would probably say it's good.

Reality: people started writing their passwords on sticky notes by their computer. Possibly the worst outcome.

Convenience is part of good security.

by tensor

5/21/2026 at 4:25:08 PM

The inverse also doesn’t mean convenience is a bad idea, just happens 1Password has a strong security model and is convenient.

I end up helping a lot of older people for a variety of reasons with tech - 60s to 90s, family, neighbors, coworkers.

They’re not invalids and have a right to participate in the digital world, even if security requirements have exploded.

Anchoring the trust in stuff like 1Password where we setup domains, their account info, their OTP codes means they get to go to their bookmarked site, FaceID to unlock the PW manager, get automatically logged in, and do what they need.

Being able to let them navigate this world without always having to hand over the paper secrets notebook to random helpers, or lose sheets of paper with passwords, or get caught up in tracking down an SMS code is better for them. Their password manager with the autofill helps somewhat deter phishing links since relying on autofill usually signals something is off, and they call someone they trust.

My point, I guess, was that convenience is basic access for some subset of vulnerable groups of people.

by 9x39

5/21/2026 at 3:59:34 PM

Its a catch 22, with password requirements getting crazy its hard to remember them. At the same time storing the passwords with a password manager means you are entrusting them for your identity. For the first party sites the passwords are hashed, however for these password manager sites they are at the most encrypted with the encryption keys that the third party already has. This essentially means a rouge password manager or rouge individual in password manager service can run away with your plaintext passwords on scale

by sandeepkd

5/21/2026 at 3:59:35 PM

This frames the only options as mediocre and better, when the reality is likely the third, most common, and worst option: nothing.

by starkparker

5/21/2026 at 4:16:47 PM

"This way your passwords are truly yours"

They were never yours, and zillions of people you don't know have access to them.

by VLM

5/21/2026 at 3:46:14 PM

This is a whole lot of FUD.

by steviedotboston

5/21/2026 at 2:54:38 PM

A tale as old as time, enshitification.

by avgDev

5/21/2026 at 2:46:19 PM

I think this is a little hyperbolic. The product may drop features, increase prices, and squeeze its free tier users. Everything enshittifies. But the idea that password export might disappear or be degraded? Nah. You'll be able to jump ship any time you want.

by eleventen

5/21/2026 at 2:57:15 PM

>You'll be able to jump ship any time you want.

Famous last words...

by vallassy

5/21/2026 at 3:34:52 PM

I mean, LastPass was a train wreck after their breach, but they didn't go as far as trying to stop me from exporting my vault when I switched to BW.

The idea of BW doing a rug pull and suddenly removing the ability to export your vault I think would trigger a class-action lawsuit.

by AdmiralAsshat

5/21/2026 at 3:33:55 PM

I don't know why this is framed as "jumping ship" ... of course you can stop using it any time (and use your periodic export to go elsewhere).

The real issue is potential data loss. Remember LastPass? Bought by someone and downhill it went, with multiple security incidents.

by e40

5/21/2026 at 2:54:28 PM

Never underestimate the lengths companies will go to, to enshittify their product to squeeze customers for money.

by tremarley

5/21/2026 at 2:59:39 PM

Name one major password manager that blocks or paywalls export.

by eleventen

5/21/2026 at 5:12:20 PM

Usually when this type of thing happens, all the major players decide to do it at the same time.

by ptrl600

5/21/2026 at 4:40:56 PM

The iOS "passwords" app didn't support exporting for a while, though they eventually added it.

by gruez

5/21/2026 at 3:03:56 PM

- Authy

- Google Authenticator

by kpozin

5/21/2026 at 3:15:49 PM

Not password managers of course, but thanks for reminding me that I should figure out how to ditch Authy.

https://github.com/BrenoFariasdaSilva/Authy-iOS-MiTM is going to be my project for the afternoon.

by eleventen

5/21/2026 at 4:52:27 PM

I had to migrate from Authy because it doesn't work on Graphene OS. Migrated to Ente Auth and couldn't be happier.

by MrDisposable

5/21/2026 at 3:36:51 PM

Ente Auth

is a good alter. Works perfect for me.

by Ringz

5/21/2026 at 4:34:56 PM

[dead]

by pablopr3

5/21/2026 at 3:12:37 PM

Google Authenticator has an export-as-QR-code function that several other authenticator apps can parse. Is it the best/most convenient implementation? Obviously not, but you can absolutely export the codes.

by MostlyStable

5/21/2026 at 3:07:50 PM

Notably not password managers.

by Someone1234

5/21/2026 at 4:21:58 PM

Anyone not already using KeePass (or KeePassXC) has been doing it wrong for at least a decade.

KeePass2Android Offline and KeePassium on mobile.

by nickburns

5/21/2026 at 4:23:11 PM

For TRUE offline password storage use "Off The Grid". A cryptographically secure paper based password generator created by Steve Gibson from he Security Now podcast.

https://www.grc.com/offthegrid.htm

by normalaccess