I'm trying to help my Mom restore her 1password vault from a compromised SSD. Situation: the original root volume SSD was compromised by malware. We removed that SSD and installed a fresh one. A clean version of 1Password was installed and a few new passwords have been saved. After waiting on a suitable enclosure for the old SSD, we now have it mounted as an external drive. From the old SSD we have the most recent 1p4_zip backup file. Goal: merge the 100+ old SSD passwords from the 1p4_zip with the newest passwords stored in 1PW on the fresh SSD.
From a previous post, I found these steps to restore a 1p4_zip file.
1. Click on the advanced Tab in the preferences window
2. Click on "allow creation of vaults outside of 1Password.com accounts
3. Click on the newly revealed Backup Tab in the preferences window
4. Click on find backup
5. Choose that 1p4_zip file so that it brings it into the backup tab
6. Select that entry in the list on the backup tab
7. Click Restore
If we do these steps (only), however, I expect we'll have a vault with only the older 100+ (pre-malware) passwords.
So my planned approach...see if this makes sense and will ensure we don't lose any passwords:
1. EXPORT the 15 or so latest (post-malware SSD) passwords saved in 1PW as a .PIF file.
2. Perform a RESTORE using the 1p4_zip file for the 100+ old passwords using the above steps.
3. IMPORT the .PIF file to MERGE in the most recent 15 or so.
Will the 1p4_zip passwords - once restored - be "newer" than the .PIF ones? If so, when I do an import/merge of the .PIF file will they be rejected in favor of the "newer" restored passwords (that are actually older and incorrect)? How do I prevent this?
Is there're an easier way to merge the current 15+ with the older 100+ 1p4_zip ones?
1Password Version: 6.8.9
Extension Version: Not Provided
OS Version: OSX 10.15
Sync Type: Not Provided