I keep seeing people highly recommend them, but I’ve always thought it wasn’t very secure.
I do SyncThing and KeePass.
Their URLs at time of writing are https://syncthing.net/ and https://keepass.info/
I don’t remember which KeePass UI for Android I use. I think I use Syncthing Fork on Android
That gives me the benefits of a cloud password manager, but the only cloud infrastructure is whatever SyncThing uses to do its peer-to-peer tricks. The password database is encrypted on disk with my root password, and then it’s encrypted end-to-end in transit because every SyncThing node knows the public keys of my other nodes.
I almost never upgrade KeePass because I’m afraid of losing access to my passwords on my phone. SyncThing I do upgrade because that’s easier to fix.
If you upgrade regularly, you’re vulnerable to the project being compromised. If you never upgrade, you’re vulnerable to whatever old code is vulnerable to. Personally I err on the side of not upgrading often.
I also have my own implementation of diceware https://www.eff.org/dice
Can’t believe noone mentioned this yet:
Any good password manager encrypts and decrypts your password file client side. The server should not even have the ability to read your passwords.
Even in the case of a leak of all of the server’s data, as long as your password for the manager was good, you’ve got nothing to worry about.
I’d say pick a PW manager where both client and server are open source. Pick a strong passphrase. Enjoy.
With the arrival of near infinite phonebooks, the drive and know-how to remember 100s of phone numbers is lost to humanity.
Passwords present added complexity to those of phone numbers. On top of a name to number (allowing a few collisions) passwords are required to be of certain length, contain an upper case letter, lower case letter, number, special character, and more importantly, a preset lifetime.
Password managers seem to be a safer and low stress bet for the vast majority. There will always a few exceptions who can do it all in their head. They don’t tend to advertise their presence.
It’s a balance of probabilities, like everything in security. Which is more likely? A. People are careful, using good, strong passwords, and maintain vigilance, but are targetted by an advanced attacker who will hack the protonpass system to get their database and the necessary keys to open it? Or B. People get lazy, use the same password for everything because remembering stuff is hard, and everything they own ends up protected by the modern equivalent of combo 1, 2, 3, 4, 5?
If you are truly capable of generating and memorizing enough good passwords to handle all of your accounts, that is technically more secure, because a password manager can create a single point of failure for all accounts. However, most people aren’t able to do that and will resort to crap passwords or using the same single crap password for every site.
Without password managers: You either have weak passwords, or you constantly forget passwords and get locked out of your accounts.
Or you can remember the password to your email then use that to reset passwords every time and slam your head on the keyboard to generate a random password that you won’t need to remember because you’ll just reset it next time, but then its a hassle and you are relying on one point of failure, and you could get locked out if you email stops working.
So in conclusion: Password Managers
There’s no guarantee anything is “secure,” anymore. Even if you run a self-hosted password manager, it could still be compromised at the package-level or down the road through some exploit. I will say that since I started using Bitwarden as my main password manager, I have had to worry less about company data breaches and stolen passwords. I have no need to reuse passwords for any site or service. I can use the built-in 2FA with sites that require it and don’t have to have multiple apps. I can share passwords with my wife if she needs to access something under my name.
In addition to storing logins, I can store secure notes, even storing login-specific notes within the login details for things like one-time-use passwords, etc. I can store various credit/debit cards and recall them into payment systems whenever I want, without storing them in a browser. When using the phone, I can tie the biometrics to the unlocking of my vault so, with the vault locked, I can easily unlock it to find the login/info I need to submit to an app or website.
Obviously, all this comes with their own risks, but the level of risk of a password management is far lower than the risk of reused passwords and the mismanagement of security at the corporate-level. If you’re really hard-up to keep your stuff offline, other products exist that are locally stored, but you’ll likely miss out on access from outside the home in the event you need that login info somewhere else.
Edit: I’ll also point out that the best passwords are ones that rely on unaffiliated words, with numbers or symbols sprinkled in. If I need to remember the password without my phone/outside help, I’ll rely on a password of 3-4 random words. Many of the password management tools available have some sort of password generation and Bitwarden’s can generate randomized character passwords or randomized word passwords. Once I find a word combo I like and can remember somewhat, I add a capital randomly, a number somewhere, and maybe even a symbol to make a password that would take million of years with current tech to decipher.
As always, you do you, but I find password management tools such as Bitwarden, with a minimal yearly price tag, worth it for the ease of password generation/storage and the ability to access those passwords wherever I need to.
I think they can be much more secure than:
-
remembering your ( probably weak ) passwords
-
writing passwords on paper, which is slow, you can lose paper, break it, or someone can steal it
-
storing passwords in unencrypted text file
-
reusing passwords/password!
I use KeepassXC, which is offline, encrypted password manager. Every password is stored in one file, which to access, I must enter the one password I do remember. I recommend having backups of this file.
It has password generator included, so all my password are long, strong and unique. It also can auto fill password/login which saves time.
To increase security of your account even further you should also use multiple factor authentication, for example app which generates one time codes on your phone offline. It will protect you, even if your password gets leaked, or cracked.
If you write it on paper, include the same short word on the end of all your passwords that you don’t write down. Password is Hunter2duck but you only write down Hunter2.
*Actually this might be a good idea for password managers too. Brb. **I wonder if hackers thought of this too. If so this could be easy to crack if they get past the password manager. Maybe inserting a letter into the password after the nth character would work better.
I write my passwords on paper in code, like my dad taught me to do.
However, just a personal anectdote, my uncle passed suddenly and he had written all his passwords (not in code) on a spreadsheet with each account, which he then printed. I promise you, this single piece of paper was one of the most helpful things I could’ve asked for in sorting out all of his assets. It was a genuine lifesaver. Now I often think that maybe I should be sharing my password with an S.O. or someone else close to me just to make their life easier if I were to die tomorrow.
All I see is *******
I just see
*******duck
This is just a hack. If you use encryption to store passwords, that becomes just a nuisance.
Unfortunately I see headlines every now and then that whatever password manager was compromised.
I mean… Can’t happen if you keep your stuff encrypted like with KeePassXC. Even if someone gets my password database, it’s useless for them since they don’t know how to decrypt it. That’s why I don’t use some online service, though using one of the online services is certainly better than reusing a weak remembered password.
Hopefully passwords are encrypted so the hackers get useless data
-
It’s more secure than not using one (if it’s open source and offline), so just do it.
Remembering (and inevitably) forgetting passwords for all your different accounts is inconvenient, frustrating, and arguably less secure than a randomly generated password unique to each account.
Additionally, it can be tempting to reuse passwords for multiple accounts, which is trouble when a less-than-reputable service that you used that password on is breached, since that password wasn’t unique.
If you use an open-source, tried and true password manager (Bitwarden, Vaultwarden, KeePassXC) and keep a passphrase unique to that password manager only, you avoid the problems above which are way more likely to occur than Bitwarden passwords getting breached in plaintext, or a security vulnerability to the KeePass database.
Plus, most password managers offer support for passkeys, which are easier to register/use than passwords. They usually only require a “verify with passkey” button on a given website.
Bottom line, password managers are probably (definitely) more secure than any other reasonable solution that anyone has come up with.
To oversimplify:
Very secure, unique passwords written on paper and stored safely > Local password manager using secure passwords > cloud/synced password manager with secure passwords > anything with insecure passwords.
The trick is, will you actually maintian these security practices or will you start getting lazy if its too inconvenient (such as using a long password, and having to manually type it out).
There are weaknesses and attack vectors, but they are in my opinion more secure than almost all realistic alternatives. If you think you’ve come up with a better system, by all means, implement it. I commend your skepticism of following the herd and may it serve you well. But beware of pursuing security through obscurity. People recommend password managers because they are one of the best solutions available for navigating this complex threat environment we live in and they are appropriate for most people’s situations.
I use a Keepass database that I save on my nas so I can access it from any device.
Explain to me this nas. I also use Keepass and currently I manually copy my DB file between devices
You should look into syncthing. It can be used to run in the background and sync files super easily and it’s peer to peer so it’s free
Seconded. I use synching to sync my KeePass db between phone and PC and it’s great. You just need to start the app regularly to keep them in harmony.
Most NAS (network attached storage device) have cloud capabilities. Its kinda like one drive only you host it yourself. Synology has Drive for example and even has apps for android and iOS.
You can just save anything to it. A keepass file I just an encrypted database file. If you save it on a NAS then you can access it anywhere.
Obviously you can also use One drive or google drive (or whatever its called nowadays). But I don’t trust Microsoft or Google with my data.
Risk assessment is a big part of this. Risk when reusing passwords is very high. Risk of forgetting passwords or using weaker/guessable passwords when they’re unique, is high. Password manager mitigates these risks. A good one will also bark at you when you try to use a password in a website that isn’t the one you saved it in (ie phishing warning)
The risk of your PW manager somehow leaking passwords is worth considering. So we ask: How are the passwords stored? Where are they stored? How are they accessed? Different tools work differently; some keep the storage local but others sync in the cloud. Local storage can also mean “in my Dropbox folder”. If it’s a secure format with a strong password (or perhaps Yubikey), that’s fine, but if it’s an excel sheet, you’re leaking to Dropbox. But is that really a problem for you? Think of the steps between an adversary and your password file.
1Password has some white papers published about how they secure the data you entrust them with.
It is my strong opinion, and that of most security experts, that using a password manager to create unique, long, and secure passwords is a lot better than the alternative. It’s usually the opinion that a password notebook in a reasonably secure location (in your desk at home) is better than recycling weak passwords.
I think your question has been answered by other pretty well but I’ll add: If you decide a password manager is overall beneficial and choose one that looks secure, don’t assume it will stay that way. LastPass taught us that a couple decisions that are valid one day can turn into huge liabilities in a few years as threats escalate. You to have to periodically check in on what secops pros are saying about your manager and make sure they haven’t been resting on their laurels. Security is a job we all have.
It’s better than using the same few passwords everywhere. Passwords are being phased out though. The future is passkeys.