Let’s say you use a PIN login, but disables the option “Lock with master password on browser restart”. What are the risk exactly?
If you disable lock with master password on browser start, I am assuming that the pin is stored in the vault. If someone gains access to the file system, they can then copy the vault and attack it by bruteforcing the PIN. This would not be an issue if you did not disable “lock with master password on browser start up”
On windows, the file system is not always encrypted. This mean someone could use a Linux USB key to boot off and copy the file off your file system. Even if the file system is encrypted, anyone malware that gain access to the file system would be able to acquire a copy of the vault. This would be less of an issue if Bitwarden uses TPM, but a scan of the documentation does not indicate that Bitwarden does use TPM.
Other than enabling lock with master password on restart, is there other forms of mitigation? On system with biometrics, it would be more secure to use fingerprint and face id because I assume that the key would get store in the secure enclave protected by the biometrics. What about Windows system that does not store TPM, is there a security risk there?
What about the risk on a chromeOS device? PIN would be stored on disk, but since the storage is encrypted, you would need to have the google account credentials to copy it. However, chromeOS malware who gain account access would be able to access the file?
What do you think? I like to not have the user enter the master password because this particular user is not great at typing in password, so I was attempting to evaluate the risk of retaining the pin option would be.