Go to file
Andrei Jiroh Halili ad861819b0
Updated exported Public Keys
2023-01-26 15:31:30 +00:00
.public-keys Updated exported Public Keys 2023-01-26 15:31:30 +00:00
2fa Reencrypt password store using new GPG id ajhalili2006+not-guildedguy@gmail.com, andreijiroheugeniohalili24680@gmail.com (2fa). 2022-05-28 17:13:35 +08:00
keys Add given password for keys/gpg/pass.key to store. 2022-06-12 10:17:58 +08:00
recovery-phases Reencrypt password store using new GPG id ajhalili2006+not-guildedguy@gmail.com, andreijiroheugeniohalili24680@gmail.com (recovery-phases). 2022-05-28 17:14:01 +08:00
stellapent Reencrypt password store using new GPG id ajhalili2006+not-guildedguy@gmail.com (stellapent). 2021-12-18 00:10:27 +08:00
.gitattributes Configure git repository for gpg file diff. 2021-12-17 23:26:51 +08:00
.gitignore Add gitignore file to ignore swap files and stuff 2022-02-22 23:46:02 +08:00
.gpg-id Set GPG id to ajhalili2006+not-guildedguy@gmail.com, andreijiroheugeniohalili24680@gmail.com. 2022-05-28 17:12:40 +08:00
README.adoc Update asciidoc-formatted README 2022-06-07 11:03:21 +08:00
help.gpg Add given password for help to store. 2022-05-28 17:11:24 +08:00

README.adoc

:source-highlighter: pygments // technically needed for Asciidoc parsers for some code
:gitlab-personal-namespace: https://gitlab.com/ajhalili2006
= Andrei Jiroh's Passowrd Store

This is where I store some of my TOTP secrets and other cursed secrets I need to store in Git and in encrypted manner.
While I can safely store my encrypted secrets here in GPG, some cannot be here such as my SSH and GPG private keys, as they're
stored in {gitlab-personal-namespace}/dotfiles-secrets[an private repository only Andrei Jiroh can access].

== Usage docs

== Setup

[source,bash]
----
# check distro docs for non-Debian/Ubuntu installations.
sudo apt install pass git -y --no-install-recommends
pass git clone https://mau.dev/ajhalili2006/passstore-personal
----

=== Adding new entry

TBD

== Note on whoever manage this repo as noted on my will

You must keep all of my GPG private keys private and hidden from the public eye and its key passwords well-guarded against
hackers and other people trying to get as much as senstive information hidden under encryption.

Technically, DO NOT LEAK ANYTHING UNENCRYPTED, ESPECIALLY FROM THIS REPO.

== FAQs

=== Do this replace your usage of your current password manager (Bitwarden)

Technically no. While I can still access them through the official CLI (himt: `npm i -g @bitwarden/cli`), I do not want
to lose access to the TOTP codes, especially it's always a painful process to do the recovery processes through identity
verification and sometimes, the brute-force hell.

== License

This documentation is licensed under CC BY-SA 4.0 Unported, while the rest are either under the default copyright rules or the MIT license.
Check the headers of each file to avoid possible copyright issues. Stuff that are encrypted through GPG are not covered by MIT license.