I honestly think that Bitwarden should remove the json encrypted account restricted export format.
It has serious limitations that could result in users believing that they are covered by their backups when they are really not.
Let me post here what I just posted on reddit a while ago:
It has a lot more limitations than the DR scenario.
If you lose your master password, the only way to recover your account is to delete it, create a new one and restore a backup on it. An account restricted backup is useless in that case.
Account restricted backups cannot be used to easily recover a single (or several) items. Because you can not import them into a temporary new account, or into anything at all for that matter.
Password encrypted backups can be used for that (by either importing them into a temporary new bitwarden account or into a recent enough version of KeepasXC, for example).
If you have account restricted backups spanning several years in the past. And you, for whatever reason, need to rotate your account encryption key, then all those years of backups (every single one of them) have just become totally useless in an instant.
So, yes, I wish Bitwarden wouldn’t offer that kind of “backup”.
Because having no backups is bad. But believing that you have them and turning out they might not be usable when needed is even worse.
And there is a “funny” situation with those account restricted exports and having to rotate your account encryption key due to a device compromise:
If one of your devices where you have your bitwarden account logged in (locked or unlocked, doesn’t matter) is compromised. Then one of the recommended things to do is to change your master password rotating your account encryption key.
In this case, if you have past account encrypted backups, they have become useless to you but, ironically, keep being useful to the attacker that obtained your encrypted vault from that compromised device.
Because you will probably not have your account encryption key, but the attacker could obtain it if he was able to break your master password (or your unlock pin, if you made the mistake of unchecking the “ask for master password on device restart” option when setting your pin).
And that old account encryption key is all the attacker would need to decrypt the stolen vault from your compromised device or all those past account restricted exports.
One additional reason, IMHO, is the unwillingness from the Bitwarden team to fix reported bugs with that format. Like this one, reported by myself more than one year ago (I just tested a moment ago that it’s still present).
Thanks.
