Bitwarden Authenticator

Backup, cloud security, and threat models

  • Initial Bitwarden Authenticator release stores secrets locally and relies on iOS/Android backup services, not Bitwarden’s own cloud.
  • Several comments are unclear how well iCloud/Android backups protect these secrets:
    • iCloud: end‑to‑end encrypted only if Advanced Data Protection is enabled (not available everywhere, and off by default).
    • Android: disagreement whether backups are fully E2EE or only “some” data is; behavior is described as fiddly and poorly documented.
  • Some see OS‑level, E2EE backups as an acceptable usability–security tradeoff; others argue that if 2FA is recoverable via a cloud account, security collapses to that account’s strength.
  • Threat models differ: some worry about governments and cloud providers; others just want protection from basic credential reuse, accepting cloud‑backed 2FA.

Syncing, desktop support, and lockout risk

  • Bitwarden Authenticator currently lacks multi‑device sync; roadmap mentions syncing to Bitwarden accounts, push 2FA, and recovery.
  • Lack of sync is a deal‑breaker for users afraid of losing a phone and being locked out; others argue non‑syncable OTP secrets bound to one device are closer to “real” 2FA.
  • Debate over desktop authenticators:
    • Pro: redundancy if a phone is lost, convenience when working on laptops.
    • Con: storing passwords and OTPs on the same computer undermines 2FA.
  • Some prefer separate, backup‑friendly TOTP solutions (e.g., KeePassXC, Aegis, Ente Auth, 2FAS); Authy is heavily criticized for vendor lock‑in and export limitations.

Bitwarden ecosystem, separation of factors, and trust

  • Built‑in Bitwarden TOTP is a paid feature and syncs via Bitwarden’s servers; the new app is free, account‑optional, and local/OS‑backup only.
  • Many don’t like storing TOTP in the same vault as passwords or even with the same vendor, citing “single point of failure” and potential for compromised updates.
  • Others accept this for convenience, especially when their Bitwarden account itself uses stronger MFA (e.g., hardware keys, separate TOTP).
  • Self‑hosting (Bitwarden server or Vaultwarden) is popular to reduce vendor/VC risk, referencing LastPass as a cautionary tale and concerns about future Bitwarden direction, outages, and past database‑corruption issues.

UI/UX and alternative approaches

  • Multiple complaints about recent Bitwarden UI changes (extra clicks, confusing defaults, inconsistent behavior on Android and extensions), though some workarounds via settings are shared.
  • Several users prefer FOSS or cross‑platform alternatives (Aegis, Ente Auth, 2FAS) that support encrypted backups and exports.
  • A minority argues TOTP itself is outdated and phishable, advocating WebAuthn/security keys instead, but most note that TOTP remains far more widely supported in practice.