I have thought about this on and off for quite a few years now, and I was just wondering what people here have done while maintaining account / device security.

I hope people don’t mind this rather morbid conversation, but how have people here planned for what will happen with their accounts, computers, self hosted things etc. in the event of their deaths? I am particularly interested in what people have planned for if they are the person in their household who is self hosting things for the household. I’m not in a living situation that allows me to self host much but it is one of the questions I’ve had for myself when I decide to move in with my significant other and self host more things. I don’t think they could manage much of the self hosted stuff and I also don’t think they can remember all of the credentials for accounts etc., is the best way of going about it sharing a keepass database or bitwarden account with them?

In regards to my accounts, I am not expecting most of my accounts to transfer, if anything I’d much rather them be deleted (and I have enabled this feature where possible). There are a few however, that I wouldn’t mind leaving to someone after my passing. Is there a privacy and security preserving way of setting this up?

I guess I have just been struggling with how to do this, ideally I would want a way for accounts to transfer to someone listed in my will, but I don’t think it’s a good idea to give ~2-3 people a copy of my keepass databse while I am still living.

I am looking forward to hearing what people’s thoughts are on this matter, and I apologize again for such a morbid topic.

In my filing cabinet that contains my will and other emergency documents I have a printout of the emergency backup codes for my password manager and my google account. That should be enough for my heirs to get whatever they need and want.

@BeatTakeshi@lemmy.world
link
fedilink
English
4
edit-2
7M

Isn’t Google forcing your accounts to be linked to a safe device nowadays (which in turn is probably linked to biometry or other identity proof). I say this because recently I changed smartphone after 6 years, and it was hell to even connect to my gmail for some accounts that I had not added as phone account to the previous device. Since they didn’t have a phone number attached to them, even if I knew the passwords as well as the security question answer, I still could not retrieve 2 out of 5. I am moving away from Google for many reasons, but this one pissed me off

Nope. They do require some form of 2FA, but that can be any of: phone number, security key, authentication app, or a secure device. They also support one time use backup codes that you print out and keep secure. Personally, I use security keys for day to day and keep the printed out backup codes with my will.

Create a post

In the digital age, protecting your personal information might seem like an impossible task. We’re here to help.

This is a community for sharing news about privacy, posting information about cool privacy tools and services, and getting advice about your privacy journey.


You can subscribe to this community from any Kbin or Lemmy instance:

Learn more…


Check out our website at privacyguides.org before asking your questions here. We’ve tried answering the common questions and recommendations there!

Want to get involved? The website is open-source on GitHub, and your help would be appreciated!


This community is the “official” Privacy Guides community on Lemmy, which can be verified here. Other “Privacy Guides” communities on other Lemmy servers are not moderated by this team or associated with the website.


Moderation Rules:

  1. We prefer posting about open-source software whenever possible.
  2. This is not the place for self-promotion if you are not listed on privacyguides.org. If you want to be listed, make a suggestion on our forum first.
  3. No soliciting engagement: Don’t ask for upvotes, follows, etc.
  4. Surveys, Fundraising, and Petitions must be pre-approved by the mod team.
  5. Be civil, no violence, hate speech. Assume people here are posting in good faith.
  6. Don’t repost topics which have already been covered here.
  7. News posts must be related to privacy and security, and your post title must match the article headline exactly. Do not editorialize titles, you can post your opinions in the post body or a comment.
  8. Memes/images/video posts that could be summarized as text explanations should not be posted. Infographics and conference talks from reputable sources are acceptable.
  9. No help vampires: This is not a tech support subreddit, don’t abuse our community’s willingness to help. Questions related to privacy, security or privacy/security related software and their configurations are acceptable.
  10. No misinformation: Extraordinary claims must be matched with evidence.
  11. Do not post about VPNs or cryptocurrencies which are not listed on privacyguides.org. See Rule 2 for info on adding new recommendations to the website.
  12. General guides or software lists are not permitted. Original sources and research about specific topics are allowed as long as they are high quality and factual. We are not providing a platform for poorly-vetted, out-of-date or conflicting recommendations.

Additional Resources:

  • 1 user online
  • 12 users / day
  • 35 users / week
  • 77 users / month
  • 417 users / 6 months
  • 1 subscriber
  • 679 Posts
  • 11.2K Comments
  • Modlog