2019

It's okay user, I'm pretty sure whatever you've got could be treated with CBT.

pass + yubikey master race

>steals your yubikey
Wot nao?

history | grep su
Your secret user is secret no more

>Secrets stored in memory
It's no better than any other password management setup.

Nobody is getting in then since you can put a pin on a Yubikey.

Lastpass can't access your passwords since your master password is never sent to their servers and they keep it encrypted on their side, so I don't see how it's garbage.

I don't recall remembering if it was encrypted already or not aside from just the master password. I mostly just couldn't think of a way to keep the database synced across my devices, but I'm aware I can do it now that I have my own Nextcloud instance using that.

I'm the guy. Basically what said is how my setup works. The only downside is that you can't really set up pubkey authentication in the Android client when using a U2F device. That is, the private key needs to be stored on the device and the app needs to be told about it at the time of configuration, then you can delete it. I used to have this, where even if I wanted to sync with Git my SSH private key resided on my U2F device and I'd need that in order to sync as well, but I don't have my SSH private key anymore - it's only on my U2F device. Instead, I just created a different keypair only for using with the Pass Android client. I will probably submit a pull request for this.

You are a dumb nigger. Use Argon2 or bcrypt you fucking idiot

If I die why the fuck should I care about the living?