this post was submitted on 13 Oct 2025
69 points (96.0% liked)

Selfhosted

52215 readers
785 users here now

A place to share alternatives to popular online services that can be self-hosted without giving up privacy or locking you into a service you don't control.

Rules:

  1. Be civil: we're here to support and learn from one another. Insults won't be tolerated. Flame wars are frowned upon.

  2. No spam posting.

  3. Posts have to be centered around self-hosting. There are other communities for discussing hardware or home computing. If it's not obvious why your post topic revolves around selfhosting, please include details to make it clear.

  4. Don't duplicate the full text of your blog or github here. Just post the link for folks to click.

  5. Submission headline should match the article title (don’t cherry-pick information from the title to fit your agenda).

  6. No trolling.

Resources:

Any issues on the community? Report it using the report flag.

Questions? DM the mods!

founded 2 years ago
MODERATORS
 

One more step to unhitching from Google...

Right now the only option I see in F-Droid is Aegis.

I'm not sure what to actually look for side from checking for unexpected permissions and reasonably frequent updates.

Hopefully something I can sync with a GNOME app...

you are viewing a single comment's thread
view the rest of the comments
[–] synestine@sh.itjust.works 9 points 12 hours ago (1 children)

Same here. If it's TOTP based 2fa, you can keep them in entries and use them from there.

[–] 30p87@feddit.org 9 points 7 hours ago* (last edited 7 hours ago) (2 children)

Tbh, if you're using the same DB for PWs, you've successfully downgraded to 1FA now. Except maybe if you use a seperate KeyStick/Yubikey as secret bearer or smth

[–] N0VERCLOCKER@discuss.tchncs.de 1 points 48 minutes ago

I would say it still counts as 2fa just shifting what is verifying you to your password manager and using the site password and 2fa as a way to verify the password manager with the site. If setup right they would have to have the database and your password to decrypt it not just one or the other and for password managers that sync the database it should require your password and 2fa to sync to a new device so it can't just be freely grabbed. If that doesn't count as 2fa then I would like to see an argument about how okta signing you into sites counts as 2fa as it is basically the same thing.

[–] hikaru755@lemmy.world 11 points 6 hours ago

More like 1.5FA, at least. It still protects against passwords being compromised in any way that doesn't compromise full access to your password database, which is still a lot better than using just passwords without a second factor.