leoLela What do you suggest? Is it enough to have backups of your keepass files, or should we also have a different database format? The second option sounds would be a maintenance nightmare.
A simple and up to date backup of your keyfile in 2 different places should be enough, if your threat model doesn't include protection against targeted attacks from 3 letter agencies that is. Better be safe than sorry though, I have 4 encrypted offline backups in different locations of my recovery files (Bitwarden, Aegis, Crypto Seeds, etc).
Graphite Can you give details pls?
Wish I could point you directly to it. I've heard it on the Michael Bazzell podcast and maybe read it in his book Extreme Privacy 4th edition sometime last year, but I can't find it right now. If I remember correctly, he used KeePassXC on MacOS and after an update his keyfile was irreversibly corrupted, so he lost access to all his passwords. The bug was patched within hours, but hundreds of people were affected. He had a hidden backup at a friends house (hollow coin with micro SD card behind a power outlet) so he could restore them after the patch. Maybe someone else can confirm or link the story, he does delete his old podcast episodes so it might be already gone. Couldn't find specifics about it in the KeePassXC patchnotes either...
Edit: Typos