Is backing up the vault really necessary?

Is there a feature request we can vote for? :laughing:

1 Like

7 and 9
Does this also apply to the competition?
Is this also possible with 1Password or do they work differently?

I am not that familiar with other password manager products, but if it is any service that is based on syncing your data to a server (which I’m fairly sure applies to 1Password and others), then #9 could definitely be an issue for those, as well.

As far as #7, that depends on the service provider’s practices and policies surrounding backup of customer data. The large LastPass breach in 2022 was an theft of vault backup data which was possible because LastPass (at the time) retained long-term retention (LTR) backups of customer data for up to 3 months. For any password management services that maintain LTR backups for longer than 7 days, scenario #7 may not be applicable. Bitwarden does not maintain LTR backups for security reasons, and maintains point-in-time recovery (PITR) logs for only 7 days — PITR logs do not include a full copy of the vault data, but only a list of database transactions that can be reversed to restore the database to a prior state (similar to the “undo” function available in many apps).

1 Like

Which servers does Bitwarden actually use? AWS, Azure?

Azure.

For the technically oriented, I can suggest adding version tracking (e.g., git) to the mix (without a remote). The benefits:

  • Infinite history
  • Backup OCD: You can confirm all the changes since the last commit

Thank you.

Where are the EU Servers located?

Azure has European servers in Austria, France, Germany, Italy, Ireland, Netherland, Norway, Poland, Spain, Sweden, and Switzerland.

1 Like

Ofcouse one should backup their stuff, including whats inside Bitwarden. Here is how I do it:

  1. Export the Bitwarden vault to EFS encrypted folder
  2. Log in to KeePass XC which is inside Veracrypt container
  3. Import the exported vault to Keepass XC database (put a date to it) as a new folder
  4. Save & exit Keepass XC & Veracrypt
  5. Wipe the exported Bitwarden vault from EFS encrypted folder
  6. Every now and then (like every couple months), copy th Veracrypt container to external hdd1 (in a folder with a date), keeping multiple Veracrypt container backups there.
  7. Every now and then (like 1-2 per year), put the hdd1 to storage (outside my home) and pickup the hdd2 from storage and start using it for backups…and vice versa.

Oh, why do I use both Keepass XC & Bitwarden to store my passwords? Because I need to store other data too and storing 2FA:s inside the password manager you use daily is a serious security issue, nullifying the protection that 2FA provide and are for…please check this thread about the subject