Android-Password-S
DISCONTINUED
pass-tomb
Our great sponsors
Android-Password-S | pass-tomb | |
---|---|---|
9 | 9 | |
- | 366 | |
- | - | |
- | 7.1 | |
- | about 1 month ago | |
Shell | ||
- | GNU General Public License v3.0 only |
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.
Android-Password-S
-
Bitwarden: Free, open-source password manager
There is no "database", it's just a bunch of GPG encrypted files synced with git.
For Android there is https://github.com/android-password-store/Android-Password-S....
For Windows the only thing (Pass4Win) i found is unmaintained.
-
Joplin – open-source note-taking and to-do application with sync
These are the types of applications that I really love. It stores the data in a cloud service that already has enough free capacity for say a notes app. It's like how we can store pass(1) passwords on a git repository (Sync it with Github) and use that as the destination of Android Password Store[1], and you have a easy password manager.
[1] https://github.com/android-password-store/Android-Password-S...
-
Passwordless authentication with FIDO2–beyond just the web
Since I store most of my passwords using https://www.passwordstore.org/, I have used mobile with https://github.com/android-password-store/Android-Password-S.... I'm happy enough with it. Sucks for getting anything into consoles, for obvious reasons.
-
LastPass: Notice of Recent Security Incident
That's the exact setup I use on my main phone. There's also https://github.com/android-password-store/Android-Password-S..., which I use on throwaway phones.
-
Bitwarden Raises $100M
I moved to pass cli (on i3 with a simple rofi selector) and the FOSS android app https://github.com/android-password-store/Android-Password-S... synced over Syncthing and I never look back
-
GitJournal: Mobile first Markdown notes synchronized with Git
For encrypted secrets in git I'd suggest looking at sops and password store:
https://github.com/mozilla/sops
https://github.com/android-password-store/Android-Password-S...
Both are extremely useful secrets oriented git tools with support for things like PGP encryption. Both will encrypt with multiple keys too, making sharing relatively easy. The android pass app even manages SSH keys for pushing and pulling. There may be good inspiration in those repos, or even code you can borrow.
Also, thanks so much for making this: it is elegant and lovely. Keep it up!
-
Ask HN: Why should I trust password managers?
In addition, plasma-pass, qtpass, android password store (https://github.com/android-password-store/Android-Password-S...) are nice as well. Throw in a NFC Yubikey and OpenKeychain on android, then you can lock them with hardware keys. Since pass uses git, syncing can be done to a private repo on your home network or even just a cheap usb stick.
-
Clever uses of pass, the Unix password manager
Oh dammit. I have stopped using Gopass and started rewriting pass just for that reason - missing AGE encryption. At least I have learned something new and I feel better while my fuzzy finder UI instead of their TUI. However, big kudos to Gopass team for awesome work and really useful tool.
Before I start working on next project... Do you recognize any mobile app, which could replace PasswordStore.app for Android but with AGE support?
[0]: https://github.com/android-password-store/Android-Password-S...
-
Pass: The standard Unix password manager
I'm thinking about adding encrypted file support to my pass wrapper, p, but I've not really found a good argument to support breaking mobile apps (such as https://github.com/android-password-store/Android-Password-S...).
You'd have to manually look up the entries in a lookup table to resolve obfuscated names back to readable names... Or upstream support for whatever format is devised. I dunno.
pass-tomb
-
KeePass is the free, open source, light-weight and easy-to-use password manager
By itself, Passwordstore will not encrypt file names or directory names, which might not be a problem if no one else has access to the machine that hosts your git repo, but if that's not the case (even if it's a private repo on whatever platform), you might want to use either Tomb or git-crypt-remote to have full end-to-end encryption. There are even some tools that glue tomb and pass together (https://github.com/roddhjav/pass-tomb for one), though I'm not sure what's the situation is like when it comes to mobile integration with tomb/git-crypt-remote.
- Clever uses of pass, the Unix password manager
-
Any self-hostable password managers worth using?
That can of course be fixed by using pass-tomb, but that isn’t implemented in mobile clients (at least not on iOS).
- Pass: The standard Unix password manager
-
LastPass is finally a no-brainer to ditch: Bitwarden?
A plug-in called pass-tomb exists to fix this, but doesn’t work with mobile apps (a least not iOS)
What are some alternatives?
gopass - The slightly more awesome standard unix password manager for teams
pass-grave - An extension for pass (the standard Unix password manager) to easily hide the metadata of the password store
age - A simple, modern and secure encryption tool (and Go library) with small explicit keys, no config options, and UNIX-style composability.
OpenKeychain - OpenKeychain is an OpenPGP implementation for Android.
passhole - A secure hole for your passwords (KeePass CLI)
Android-Password-Store - Android application compatible with ZX2C4's Pass command line application
pash - 🔒 A simple password manager using GPG written in POSIX sh.
pass-import - A pass extension for importing data from most existing password managers
pass-otp - A pass extension for managing one-time-password (OTP) tokens
fzf-pass - fzf based fuzzy finder password extension for pass(1)
docker-credential-helpers - Programs to keep Docker login credentials safe by storing in platform keystores