The problem for me with completely self hosting it is that it’ll be relatively hard to get my backup, availability and sync requirements satisfied without a lot of effort.
Whereas I trust encryption in theory enough to hand my encrypted data to anyone. If the implementation is properly audited then I also trust that.
Most of my passwords are for accounts with 2fa anyway so even if both the storage leak and the encryption turn out to be subpar my threatmodel is still not violated.
What is your threatmodel here?
The problem for me with completely self hosting it is that it’ll be relatively hard to get my backup, availability and sync requirements satisfied without a lot of effort.
Whereas I trust encryption in theory enough to hand my encrypted data to anyone. If the implementation is properly audited then I also trust that.
Most of my passwords are for accounts with 2fa anyway so even if both the storage leak and the encryption turn out to be subpar my threatmodel is still not violated.