this post was submitted on 13 Oct 2025
127 points (97.7% liked)

Selfhosted

52440 readers
1661 users here now

A place to share alternatives to popular online services that can be self-hosted without giving up privacy or locking you into a service you don't control.

Rules:

  1. Be civil: we're here to support and learn from one another. Insults won't be tolerated. Flame wars are frowned upon.

  2. No spam posting.

  3. Posts have to be centered around self-hosting. There are other communities for discussing hardware or home computing. If it's not obvious why your post topic revolves around selfhosting, please include details to make it clear.

  4. Don't duplicate the full text of your blog or github here. Just post the link for folks to click.

  5. Submission headline should match the article title (don’t cherry-pick information from the title to fit your agenda).

  6. No trolling.

Resources:

Any issues on the community? Report it using the report flag.

Questions? DM the mods!

founded 2 years ago
MODERATORS
 

One more step to unhitching from Google...

Right now the only option I see in F-Droid is Aegis.

I'm not sure what to actually look for side from checking for unexpected permissions and reasonably frequent updates.

Hopefully something I can sync with a GNOME app...

you are viewing a single comment's thread
view the rest of the comments
[–] cmnybo@discuss.tchncs.de 42 points 1 week ago (7 children)

I've been using KeePassXC. I use Syncthing to keep the database synchronized between computers.

[–] synestine@sh.itjust.works 9 points 1 week ago (5 children)

Same here. If it's TOTP based 2fa, you can keep them in entries and use them from there.

[–] 30p87@feddit.org 10 points 1 week ago* (last edited 1 week ago) (4 children)

Tbh, if you're using the same DB for PWs, you've successfully downgraded to 1FA now. Except maybe if you use a seperate KeyStick/Yubikey as secret bearer or smth

I would say it still counts as 2fa just shifting what is verifying you to your password manager and using the site password and 2fa as a way to verify the password manager with the site. If setup right they would have to have the database and your password to decrypt it not just one or the other and for password managers that sync the database it should require your password and 2fa to sync to a new device so it can't just be freely grabbed. If that doesn't count as 2fa then I would like to see an argument about how okta signing you into sites counts as 2fa as it is basically the same thing.

load more comments (3 replies)
load more comments (3 replies)
load more comments (4 replies)