Built-in password managers in web browsers aren’t as powerful and useful as third-party password managers. They are catching up, but they’re not as good yet. Beyond Just One Browser. Third-party password managers are cross-platform and cross-browser. Built-in browser password managers are limited to that specific browser. SafeInCloud Password Manager allows you to keep your logins, passwords, and other private info safe and secure in an encrypted database. You can synchronize your data with another phone, tablet, Mac or PC via your own cloud account. All Pro features are free for two weeks, then you can unlock the full application functionality with a single in-app purchase. No subscriptions, no monthly fees.
Minitube 3 3 13. 1Password is a password manager that uniquely brings you both security and convenience.It is the only program that provides anti-phishing protection and goes beyond password management by adding Web form filling and automatic strong password generation.
In today’s digital age, hackers are becoming increasingly sophisticated in their efforts to gain access to your accounts and data. Aside from breaching databases and exploiting software vulnerabilities, another attack vector is your weak password.
Editor’s Note:
Guest author Sven Taylor is the editor behind Restore Privacy, a blog dedicated to inform about best online privacy practices, secure your electronic devices, unblock restricted content and defeat censorship.
Basic digital self-defense requires you to be using strong, unique passwords that cannot easily be cracked, for all your accounts. But how can you generate strong passwords while also keeping everything organized and secure across multiple devices? Enter the password manager.
In this guide we’re going to dive deep into various aspects of secure password management as well as examining the best password managers.
You may be wondering if you really need a password manager at all. You might be one of those rare folks who uses one simple password for everything and has never had any of their accounts hacked. If so, congratulations. You are one lucky person.
Unfortunately, what worked for us in the past is just not good enough anymore. Let’s talk about why…
There was a time when you could get away with using one simple password on everything. Your dog’s name, your kid’s birthday, something simple like that used to work. But today’s online crooks have upped their game. Today, the hackers who want to break into your accounts:
In other words, unless you are already using strong passwords, the passwords you are using won’t protect you.
Wondering what a “strong password” looks like? I’ll tell you in the next section.
The reason you shouldn’t trust your memory is because you need to use strong passwords. While the exact specification for a strong password varies depending on what source you check, and how long ago they specced it out, to be safe in today’s world I define a strong password as:
“A password containing at least 16 random characters. It must include letters, numbers, punctuation, and special characters.”
Here are some random examples of strong passwords, under 20 characters long:
There are techniques that would let you memorize passwords like these, although it isn’t easy to do.
Security experts have shown that you need adifferent password for every important account (I’ll explain why in a minute). Now it becomes clear that memorization is simply not an option for numerous, strong, unique passwords.
Using one strong password for everything is a bad idea. Doing so makes things easier for the people who want to get access to all your accounts. Websites and businesses get hacked all the time.
Billions of records get stolen every year, containing all sorts of information about the victims. Many of those records contain passwords in an unencrypted form. Many people have account passwords stolen, not from their own negligence, but from a data breach – and this is becoming increasingly common.
Now, if you used the same password for all your accounts, and a hacker obtains this password in a data breach (or buys it from someone else), they basically have a master key to get access to your accounts.
So be smart and use a unique and strong password for every important account. This is very easy to do with a good password manager.
Here are the best password managers that we’ve used:
Bitwarden has been around since 2016 and it is currently my top pick for the best password manager. It is completely open source, has been audited, and offers some great apps and browser extensions.
Shortcuts:Bitwarden official site | Full Review | Download
Bitwarden stores credentials securely in the cloud, but can also be used offline in a read-only state. This functionality offers great cross-platform compatibility, allowing your passwords to be synced and accessed by simply logging in to your account. Encryption is carried out locally, with data stored securely on Bitwarden servers. And if you don’t want to store anything on Bitwarden servers (cloud), you can host your own Bitwarden instance.
The free version should provide ample features and functionality for most users, but you can also upgrade to different paid plans. While we love Bitwarden, 1Password might be a better choice for enterprise clients.
Whichever plan you choose, it is easy to make the move to Bitwarden. That’s because Bitwarden knows how to import your passwords from over 40 password managers, as well as from most web browsers.
All the best password managers use strong encryption to keep your data secure. But even the strongest encryption is vulnerable if you choose a weak master password. That’s because your master password is used as the encryption key for your data. And easy to remember master passwords are usually weak master passwords. 1Password solves this problem with an auto-generated Secret Key. The Secret Key is combined with your master password to create an uncrackable encryption key, one much stronger than you could possibly memorize.
Shortcuts:1Password official site | Full Review | Download
1Password securely stores your credentials in the cloud, while maintaining an encrypted copy on your devices for those times when you don’t have an internet connection. Their innovative Travel Mode lets you remove credentials from your device with just a few clicks. This protects your privacy from overly inquisitive border guards or anyone else who might get their hands on your device. It only takes moments to restore the removed credentials once you are somewhere safe.
1Password is not open source, but both the company and the software have gotten good marks in recent independent security audits. 1Password plans has plans for every audience, from individual users to large enterprises.
Unlike Bitwarden, which stores passwords securely in the cloud, KeePassXC stores passwords locally and requires no internet connection. Here’s a brief explanation of KeePassXC from their website: 'KeePassXC is a community fork of KeePassX, a native cross-platform port of KeePass Password Safe, with the goal to extend and improve it with new features and bug fixes to provide a feature-rich, fully cross-platform and modern open-source password manager.'
Shortcuts:KeePassXC official site | Download
KeePassXC is very powerful and flexible, but it is more geared to engineers, computer professionals, and other technically-inclined people than our other favorites.
The KeePassXC project is open source with regular updates and improvements, which you can follow on their blog.
Most web browsers offer to store your passwords for you. This might seem like an ideal way to keep track of your passwords – but it’s actually a bad idea. Here are some reasons why:
Here’s how to stop your browser from saving passwords:
At their most basic, password managers take the form of a browser plug-in, extension, or dedicated app on your operating system. Whenever you fill in a username and password, they offer to record that information, along with the page you entered them on. From then on, whenever you visit that webpage, the password manager will offer to fill in the username and password for you.
Any good password manager will store this information secured away in an encrypted archive, using strong encryption that isn’t vulnerable to the kinds of attacks that browsers suffer. Beyond this, there are a range of additional feats your password manager might perform for you. Here are the core features/characteristics you should look for in any password manager.
If your password manager isn’t easy to use, you aren’t going to use it. Here are some key usability features to look for:
Auto capture is the ability of a password manager to record the login information you enter into a page. Most any password manager can do this, since most login pages are designed with Username and Password fields that the manager can recognize.
But some pages use non-standard data entry fields, or otherwise make it difficult for a password manager to record the data properly. For example, one of my banks does something weird that results in password managers failing to properly record my password. Once a manager fills in the login form, I need to manually edit the Password field with the correct data.
Once the information is captured, the app should be able to Autofill the information the next time you visit that page.
Autofill is the ability to fill in the user information on a login screen or other security-type page. If you have more than one user account associated with the page, instead of Autofilling the page, the password manager should give you some way to choose which user account you want it to use when filling in the data.
This is the ability to enter user information and actually log into a site automatically. As with Autofill, Auto-Login should give you some way to select between user accounts when there is more than one associated with a particular page.
While the point of a password manager is to remember the strong passwords you create for online use, humans usually aren’t good at generating strong passwords. That means for the best security, you need some way to create really strong passwords.
There are sites online that can help you do this (see: How to Create a Really Strong Password) – but your password generator can also help. In the image below, I’m using Bitwarden to generate a strong, unique password that includes characters, numbers, and upper and lowercase letters.
But you can also create your own.
Creating a really secure password isn’t hard. One of the most widely recommended techniques is to use a passphrase instead of a password. A passphrase is a long string of random words, instead of a long string of random characters. For example, like this: portfolio owned confident some
Optionally, you could eliminate the spaces between the words, add numbers or special characters, and so on. Because they are composed of random words instead of random characters, you can memorize a long passphrase much easier than an equivalent-length password.
It might look like using passphrases would eliminate the need to use a password manager. But the situation is similar to that for passwords. Memorizing one secure password is doable. Memorizing the 5, 10, 20 or more secure passphrases you are going to need is a whole different project. Letting a password manager create and manage secure passwords for you is a lot easier.
But don’t rule out passphrases entirely. As you’ll see shortly, there is one place where using a passphrase is a perfect choice.
It makes a lot more sense to let your password manager create strong passwords for you. You are already going to have to trust the manager, and doing it this way means that the password gets generated on your device, and doesn’t have to get shipped to you across the Internet.
Letting your password manager generates strong passwords for you right on your device is the safest way to go.
While it isn’t a great idea, storing the passwords for sites in your browser is better than nothing. But now that you are going to start using a password manager, you’ll need a way to move all those passwords from your browser into the manager. That could be a real headache if you had to do it manually.
It helps if you choose a password manager that can import passwords from your browser. You may need to do some cleanup work once you import the passwords (deleting accounts you don’t use anymore, or giving accounts stronger passwords). Regardless, your data will be more secure if you import it from the browser to your password manager, then delete all the saved passwords from the browser.
Using a password manager is definitely the way to go. Of course, with all your passwords and other data stored in it, you had better be sure that your password manager is secure and private. While it is impossible to guarantee any software is 100% secure and private, here are some characteristics to look for.
You should be required to log into your password manager before you can use it. That’s a given. And considering that all your secrets (or at least your passwords) will be accessible to anyone who can log in to your password manager, you will want to use a really secure password.
Tip: Create a long passphrase to use to log into your password manager for extra protection.
Two-factor authentication (2FA) may be a good feature for some users. And for those new to the term, here’s a quick definition:
Two-factor authentication (2FA) is a second layer of security to protect an account or system. Users must go through two layers of security before being granted access to an account or system. 2FA increases the safety of online accounts by requiring two types of information from the user, such as a password or PIN, an email account, an ATM card or fingerprint, before the user can log in. The first factor is the password; the second factor is the additional item.
As you saw, there are various things that can be used to provide the second factor. In general, the strongest second factors are physical devices like YubiKeys or FIDO U2F security keys. While having to connect a physical device to your smartphone or laptop in order to access your passwords is a hassle, it forces someone who wants to steal your data to physically get their hands on that security key to do so. While this is more secure than using a phone number or email address as a second factor, it can create problems if you lose access to the physical device (breaks, gets lost, etc. and is not backed up properly).
Your password manager will eventually hold a vast amount of important personal information in a database that resides on your device, in the cloud, or more likely, in both places. That means it should use secure, end-to-end encryption.
Here’s one example with Bitwarden:
Bitwarden uses AES 256 bit encryption as well as PBKDF2 to secure your data.
AES is a standard in cryptography and used by the US government and other government agencies around the world for protecting top-secret data. With proper implementation and a strong encryption key (your master password), AES is considered unbreakable.
PBKDF2 SHA-256 is used to derive the encryption key from your master password. This key is then salted and hashed. The default iteration count used with PBKDF2 is 100,001 iterations on the client (this client-side iteration count is configurable from your account settings), and then an additional 100,000 iterations when stored on our servers (for a total of 200,001 iterations by default).
Verify that your password manager is using strong encryption standards.
Open source code is code that can be viewed and used by anyone. The advantage of open source code is that people can and do examine the code, looking for hidden backdoors or other problems that could compromise the security of the product (the password manager in this case).
While open source does not necessarily mean secure, it is considered to be more secure than proprietary software, where outsiders are prevented from seeing what’s going on behind the scenes.
Seeing all the security and encryption that a software developer puts into their password manager is reassuring. But to really know if a password manager is secure, you will want to see a security audit of that product.
A security audit entails an outside company doing things like trying to hack into a product, auditing the source code for problems, and analyzing how encryption protocols are used in the product.
If a company conducts regular security audits of their password manager, it will likely be more secure than a product that isn’t constantly being tested in this manner. Here’s a security audit from Bitwarden, for example.
One more thing to check is whether a password manager has a history of security or privacy issues. While virtually no piece of software is immune to attacks, you may want to consider previous issues. For example, a recent report found a vulnerability that affected several major password managers (1Password, Dashlane, KeePass and LastPass), potentially leaving your master password exposed in clear text in computer memory.
While under certain circumstances, this kind of problem could give a hacker complete access to all the data stored in your password manager, using a password manager is still a safer approach than storing your passwords in your browser or using insecure passwords.
A password manager is of little use if you can’t use it across all your devices (mobile, desktop, tablets, etc.). When looking for a password manager, make sure it supports all the devices, operating systems, and web browsers you use.
The best password managers generally offer:
Bitwarden supports these browsers
As with most things, price matters. You’ll want to choose one that is priced so that you can use it everywhere you need it without going broke. Beyond that, you will probably want to choose one that offers a free or trial version.
Since you will be interacting with your new password manager constantly, it makes sense to give it a test drive before you make a permanent commitment. If possible, test drive a free or trial version of any password manager you are interested in.
Beyond their core features, password managers try to stand out from the crowd by adding additional features. This is a place to take care, because some products offer free or low-priced versions with all the basic features, and premium versions with cool features that you might never use.
Here are several additional features you might want to look for. Since only you can know their relative importance for your particular situation, I’ve listed them in alphabetical order:
While most password managers only fill in passwords and other user information on web pages, some of them take it one step further. These products can actually enter your login data into an application running on your device. For example, while most any password manager can enter your user data on, say, the Gmail sign-in page, some can enter your credentials into desktop apps, like GoToMeeting, or your favorite game.
Here is a twist on 2FA. Some password managers, once you are logged in to them, can function as the second factor in the 2FA of other products. I’m not sure how practical this would be in regular use, particularly if you are already using a physical 2FA key on this device.
What happens if you die and you have important information stored in your password manager? How would your heirs get access to this information? It turns out that many of the current generation password managers have some sort of digital legacy features built into them to make it easier for your heirs to get access to your stuff.
It is possible that you will want to switch password managers someday. If this seems like a good possibility to you, you may want to investigate whether your password manager can export data in a form that other password managers can import.
Look at the export option in your password manager. The more file formats it can use to export data, the better.
Many password managers have added some form of encrypted file storage to their product. This allows you to store entire documents in the manager’s database, not just user credentials. In some cases, this feature is built-in to the product, while in others, it is an optional addon.
Being able to generate strong secure passwords is great. But once you shift over to a new password manager, you will likely find that you have a lot of not-so-strong, not-so-secure passwords mixed in with the good ones.
Bitwarden has a cool feature that will check your password against a database of exposed passwords from data breaches. You’ll be alerted if you are using one of these passwords:
Some products can analyze the strength of all the passwords in the database and automatically generate better passwords for them. Some will even help you with the update process.
In general, it is not a good idea to share your password manager with anyone. However, there are situations where you may want to share access to part or all of your password database, such as in a business or team setting.
Some password managers offer a structured capability to do this (instead of simply telling someone your master password). You can find everything from family plans with a limited number of users, up to corporate scale plans with lots of flexibility, and a sharing dashboard that allows you to control everyone’s access easily and efficiently.
As an international traveler, I find managing the passwords on the devices I travel with to be tricky. I don’t want some border guard to have access to all my passwords, but getting the passwords I want safe from this off my travel devices (and back on later) is a real headache.
Some products have a travel mode, which allows you to designate which passwords remain on your devices when you travel, and which should be automatically removed before the trip and restored after.
Taking advantage of Travel Mode takes some setting up, but if you travel a lot, this could turn out to be a real time saving, privacy enhancing option.
Many password managers go one step beyond filling in your username and password to filling out entire web forms. They may be able to automatically enter your mailing address, phone number, credit card number, etc. into the proper field on a form.
While the most secure approach to entering this kind of information is to do so by hand whenever necessary, this can be slow and mistake-prone.
Many sites and services offer to store the data they require in their own database and pre-fill fields for you. That is surely the fastest and easiest way to go. But when you look at the number of personal data records that get stolen or leaked or otherwise exposed every year (billions of such records every year), it becomes clear that this isn’t such a great idea.
The best balance of speed, accuracy, convenience, and security could well be to feed all this data into your password manager and let it fill out the web forms for you.
This wraps up the Restore Privacy password manager guide. We’ll do our best to keep this guide updated with new and relevant information, along with the best password managers as we review all the options.
A password manager is one of many critical privacy tools you should be using in the digital age – but it’s not everything. Also important is a secure browser to block tracking and a good VPN service to hide your IP address and location.
Whatever your password management needs, there is a password manager out there to get the job done.
According to a survey, the average user has at least 90 online accounts and that is a heavy load. With each new account comes another password to remember, it’s very tempting to use only a single password for everything because it can avoid the fear and frustration associated with forgetting usernames and passwords and also save us the stress of coming up with a new password every time we need to open an account on another website. But, here comes the question, is it bad to use the same password for everything? In fact, reusing passwords is a horrible idea, and it is dangerous and insecure. Hacker loves it when you use the same password on multiple account. Once they get a hold of your password on one site, they could easily use the information they obtained to log in to your account on another sites. That’s why you see many stories of data breaches and web security pitfalls in recent years, which have left millions of confidential personal details, credit card and account numbers, and corporate systems exposed to theft. Under no circumstance should you use the same password for all of your online accounts, or you will significantly increase the risk of your accounts being compromised or set yourself or your company up for trouble in the event of a data breach. For the safety, you need to use a different password for every login and make sure your passwords should be unique, long, complex, and hard to guess.