Bitwarden is turning 2FA on by default for new devices
New Browser Extension UI & UX Changes
- Many users dislike the new “copy” overflow menu: previously there were one-click buttons for username/password/TOTP; now it often takes two clicks, even when only one field exists.
- Several people only later discovered Appearance/Autofill settings that largely restore old behavior:
- “Show quick copy actions on Vault”
- “Click items to autofill from Vault”
- Compact mode, wider layout, disable animations
- Criticisms:
- Tiny “Fill” button instead of clicking the whole row to autofill; feels like a major UX regression for common workflows (manual login, 2FA codes, credit cards).
- Extra clicks, wasted space, “mobile-style” design on desktop.
- Slower load times, visible lag, sometimes double scrollbars; some report autofill now fails more often or can’t fill password fields reliably.
- Defenses:
- Some find it faster overall and like that it remembers where you were (e.g., stays on search results after refocusing).
- Once muscle memory adjusts and settings are tuned, several describe it as “bearable” to “better.”
- Self‑hosting/vaultwarden:
- New extension initially broke for some self‑hosted instances; warnings about mixing new clients with outdated vaultwarden.
- Suggestions to pin extension versions or use experimental flags.
Default New‑Device Verification / 2FA
- Initial reading of the article looked like mandatory email‑based 2FA for new devices, triggering strong backlash; Bitwarden later updated docs to say it’s on by default but can be opted out in account settings.
- Major concern: circular dependency and lockout risk:
- Many store email passwords and 2FA secrets in Bitwarden; requiring email access to unlock Bitwarden can strand users after device loss.
- Especially problematic for single‑device users, elderly/less technical people, or those who intentionally avoid 2FA due to context (travel, theft risk, medical events).
- Recovery codes, multiple hardware tokens, and offsite storage are seen as too complex or fragile for typical users.
- Supporters argue:
- Password‑only vault access is too weak; providers shoulder loss/liability from account takeovers.
- Once‑per‑device verification is a reasonable security baseline; serious users should maintain backups and multiple factors.
- Critics counter:
- Security friction on a password manager defeats its purpose and can push people back to bad habits.
- 2FA should be offered and gently nudged, not effectively required; Bitwarden “protecting users from themselves” is seen as overreach.
Alternatives, Backups, and Misc
- Several users discuss moving to Enpass, Proton Pass, Apple Passwords, KeePass/KeepassXC, pass/passwordstore, or self‑hosted vaultwarden.
- Strong recommendation across the thread: regularly export and store encrypted offline backups of your vault to guard against service changes or lockouts.