I told my wife when I die, she's just going to have to throw it all away and start over.
We have separate email accounts and she knows how to get into my Keepass, so she should be able to get into whatever she needs to. I now have a daughter who is becoming interested in how these things work, so I'm hoping to slowly start training/handing off to her.
The main challenge was Michael’s tech footprint: His Gmail, Twitter, personal domains, rented servers, hosting business, home servers, and a huge collection of Apple tech.
“It was tough for Beth because she got home and she had a brand new phone and couldn’t even get on the Wi-Fi,” Kalat said. “Michael had done everything. Beth is very smart—she’s a scientist—but Michael had handled everything. A friend had to come over to reset the Wi-Fi password.”
The emergency contact can request access to see all the saved passwords. If I don't deny the request then the request is automatically approved after X days.
I feel like this would cover most of the issues in the article.