The Best Password Managers For 2020
Index Of The Blog
Best Password Managers For 2020
In today’s digital age, hackers are becoming increasingly sophisticated in their efforts to gain access to your accounts and data. Aside from breaching databases and exploiting software vulnerabilities, another attack vector is your weak password. Best Password Managers.
Basic digital self-defense requires you to be using strong, unique passwords that cannot easily be cracked, for all your accounts. But how can you generate strong passwords while also keeping everything organized and secure across multiple devices? Enter the Best password manager.
In this guide we’re going to dive deep into various aspects of secure password management as well as examining the best password managers.
Why you need a password manager
You may be wondering if you really need a password manager at all. You might be one of those rare folks who uses one simple password for everything and has never had any of their accounts hacked. If so, congratulations. You are one lucky person.
Unfortunately, what worked for us in the past is just not good enough anymore. Let’s talk about why…
You need stronger passwords
There was a time when you could get away with using one simple password on everything. Your dog’s name, your kid’s birthday, something simple like that used to work. But today’s online crooks have upped their game. Today, the hackers who want to break into your accounts:
- Have vastly more powerful computers and faster Internet connections than they used to. This allows them to attack your accounts far faster and harder than in the past (see Brute Force Attacks).
- They are far smarter about the kinds of passwords people use. It is easy to find dictionaries of the most common passwords people use (see Dictionary Attacks).
- They have far more information to work with. Today you can buy huge amounts of information about people on the Dark Web. There is a good chance that the hacker trying to get into your bank account right now already knows your dog’s name. And your kid’s birthday. And the license plate number of your first car. And any other such information about you that might have somehow found its way into a computer.
In other words, unless you are already using strong passwords, the passwords you are using won’t protect you.
Wondering what a “strong password” looks like? I’ll tell you in the next section.
You shouldn’t trust your memory for passwords
The reason you shouldn’t trust your memory is because you need to use strong passwords. While the exact specification for a strong password varies depending on what source you check, and how long ago they specced it out, to be safe in today’s world I define a strong password as:
“A password containing at least 16 random characters. It must include letters, numbers, punctuation, and special characters
Here are some random examples of strong passwords, under 20 characters long:
- _hS6PW8arsgH!N@WP7t&2
- aM!269-9tNYwEU^u>sd
- 7p4NvMgMP_KGupA8R
There are techniques that would let you memorize passwords like these, although it isn’t easy to do.
Security experts have shown that you need a different password for every important account (I’ll explain why in a minute). Now it becomes clear that memorization is simply not an option for numerous, strong, unique passwords.
Why you need a unique and strong password for every important account
Using one strong password for everything is a bad idea. Doing so makes things easier for the people who want to get access to all your accounts. Websites and businesses get hacked all the time.
Billions of records get stolen every year, containing all sorts of information about the victims. Many of those records contain passwords in an unencrypted form. Many people have account passwords stolen, not from their own negligence, but from a data breach – and this is becoming increasingly common.
Now, if you used the same password for all your accounts, and a hacker obtains this password in a data breach (or buys it from someone else), they basically have a master key to get access to your accounts.
So be smart and use a unique and strong password for every important account. This is very easy to do with a good password manager.
Best password managers
Here are the best password managers that we’ve used:
#1. Bitwarden – Best all-around password manager
Bitwarden has been around since 2016 and it is currently my top pick for the best password manager. It is completely open source, has been audited, and offers some great apps and browser extensions.
Bitwarden stores credentials securely in the cloud, but can also be used offline in a read-only state. This functionality offers great cross-platform compatibility, allowing your passwords to be synced and accessed by simply logging in to your account. Encryption is carried out locally, with data stored securely on Bitwarden servers. And if you don’t want to store anything on Bitwarden servers (cloud), you can host your own Bitwarden instance.
The free version should provide ample features and functionality for most users, but you can also upgrade to different paid plans. While we love Bitwarden, 1Password might be a better choice for enterprise clients.
Whichever plan you choose, it is easy to make the move to Bitwarden. That’s because Bitwarden knows how to import your passwords from over 40 password managers, as well as from most web browsers.
1Password – Extra-secure password manager
All the best password managers use strong encryption to keep your data secure. But even the strongest encryption is vulnerable if you choose a weak master password. That’s because your master password is used as the encryption key for your data. And easy to remember master passwords are usually weak master passwords. 1Password solves this problem with an auto-generated Secret Key. The Secret Key is combined with your master password to create an uncrackable encryption key, one much stronger than you could possibly memorize.
1Password securely stores your credentials in the cloud, while maintaining an encrypted copy on your devices for those times when you don’t have an internet connection. Their innovative Travel Mode lets you remove credentials from your device with just a few clicks. This protects your privacy from overly inquisitive border guards or anyone else who might get their hands on your device. It only takes moments to restore the removed credentials once you are somewhere safe.
1Password is not open source, but both the company and the software have gotten good marks in recent independent security audits. 1Password plans has plans for every audience, from individual users to large enterprises.
KeePassXC – Locally-hosted password manager
Unlike Bitwarden, which stores passwords securely in the cloud, KeePassXC stores passwords locally and requires no internet connection. Here’s a brief explanation of KeePassXC from their website: “KeePassXC is a community fork of KeePassX, a native cross-platform port of KeePass Password Safe, with the goal to extend and improve it with new features and bug fixes to provide a feature-rich, fully cross-platform and modern open-source password manager.”
KeePassXC is very powerful and flexible, but it is more geared to engineers, computer professionals, and other technically-inclined people than our other favorites.
The KeePassXC project is open source with regular updates and improvements, which you can follow on their blog.
Why you shouldn’t store passwords in your browser
Most web browsers offer to store your passwords for you. This might seem like an ideal way to keep track of your passwords – but it’s actually a bad idea. Here are some reasons why:
- The password security on browsers isn’t that great – even if you are using a secure browser. Usually, these passwords are stored in plaintext. There are also tools available online that can give hackers access to your computer (either physically or remote access schemes) and view/steal passwords stored in the browser.
- Your browser will only record the username and password you enter into a web page. It won’t help you generate a password, or tell you if the password is strong, or remind you that you already used this same password on 10 other pages.
Here’s how to stop your browser from saving passwords:
- Chrome:
- Click Settings. In the Autofill section of the window that appears, click Passwords. Turn off the Offer to save passwords and Auto Sign-In options. If you have any entries in the Saved Passwords section of this page, remove them.
- Firefox:
- Click Preferences. In the menu on the left side of the browser window, select Privacy & Security. Clear the Ask to save logins and passwords for websites option. Click the Saved Logins button. In the dialog box that appears, click the Remove All button.
- Brave:
- Click Settings. On the page that appears, select Additional Settings. In the menu that appears, select Privacy and security. In the Autofill section, click Passwords. Turn off the Offer to save passwords and Auto Sign-In options. If you have any entries in the Saved Passwords section of this page, remove them.
How password managers work
At their most basic, password managers take the form of a browser plug-in, extension, or dedicated app on your operating system. Whenever you fill in a username and password, they offer to record that information, along with the page you entered them on. From then on, whenever you visit that webpage, the password manager will offer to fill in the username and password for you.
Any good password manager will store this information secured away in an encrypted archive, using strong encryption that isn’t vulnerable to the kinds of attacks that browsers suffer. Beyond this, there are a range of additional feats your password manager might perform for you. Here are the core features/characteristics you should look for in any password manager.
Ease of use
If your password manager isn’t easy to use, you aren’t going to use it. Here are some key usability features to look for:
Auto capture
Auto capture is the ability of a password manager to record the login information you enter into a page. Most any password manager can do this, since most login pages are designed with Username and Password fields that the manager can recognize.
But some pages use non-standard data entry fields, or otherwise make it difficult for a password manager to record the data properly. For example, one of my banks does something weird that results in password managers failing to properly record my password. Once a manager fills in the login form, I need to manually edit the Password field with the correct data.
Once the information is captured, the app should be able to Autofill the information the next time you visit that page.
Autofill
Autofill is the ability to fill in the user information on a login screen or other security-type page. If you have more than one user account associated with the page, instead of Autofilling the page, the password manager should give you some way to choose which user account you want it to use when filling in the data.
Auto-login
This is the ability to enter user information and actually log into a site automatically. As with Autofill, Auto-Login should give you some way to select between user accounts when there is more than one associated with a particular page.
Password generation
While the point of a password manager is to remember the strong passwords you create for online use, humans usually aren’t good at generating strong passwords. That means for the best security, you need some way to create really strong passwords.
There are sites online that can help you do this (see: How to Create a Really Strong Password) – but your password generator can also help. In the image below, I’m using Bitwarden to generate a strong, unique password that includes characters, numbers, and upper and lowercase letters.
How to create a really strong password
Creating a really secure password isn’t hard. One of the most widely recommended techniques is to use a passphrase instead of a password. A passphrase is a long string of random words, instead of a long string of random characters. For example, like this: portfolio owned confident some
Optionally, you could eliminate the spaces between the words, add numbers or special characters, and so on. Because they are composed of random words instead of random characters, you can memorize a long passphrase much easier than an equivalent-length password.
It might look like using passphrases would eliminate the need to use a password manager. But the situation is similar to that for passwords. Memorizing one secure password is doable. Memorizing the 5, 10, 20 or more secure passphrases you are going to need is a whole different project. Letting a password manager create and manage secure passwords for you is a lot easier.
But don’t rule out passphrases entirely. As you’ll see shortly, there is one place where using a passphrase is a perfect choice.
It makes a lot more sense to let your password manager create strong passwords for you. You are already going to have to trust the manager, and doing it this way means that the password gets generated on your device, and doesn’t have to get shipped to you across the Internet.
Letting your password manager generates strong passwords for you right on your device is the safest way to go.
Importing passwords from your browser
While it isn’t a great idea, storing the passwords for sites in your browser is better than nothing. But now that you are going to start using a password manager, you’ll need a way to move all those passwords from your browser into the manager. That could be a real headache if you had to do it manually.
It helps if you choose a password manager that can import passwords from your browser. You may need to do some cleanup work once you import the passwords (deleting accounts you don’t use anymore, or giving accounts stronger passwords). Regardless, your data will be more secure if you import it from the browser to your password manager, then delete all the saved passwords from the browser.
Security and privacy with password managers
Using a password manager is definitely the way to go. Of course, with all your passwords and other data stored in it, you had better be sure that your password manager is secure and private. While it is impossible to guarantee any software is 100% secure and private, here are some characteristics to look for.
Secure access to the password manager
You should be required to log into your password manager before you can use it. That’s a given. And considering that all your secrets (or at least your passwords) will be accessible to anyone who can log in to your password manager, you will want to use a really secure password.
Tip: Create a long passphrase to use to log into your password manager for extra protection.
Two-factor authentication
Two-factor authentication (2FA) may be a good feature for some users. And for those new to the term, here’s a quick definition:
Two-factor authentication (2FA) is a second layer of security to protect an account or system. Users must go through two layers of security before being granted access to an account or system. 2FA increases the safety of online accounts by requiring two types of information from the user, such as a password or PIN, an email account, an ATM card or fingerprint, before the user can log in. The first factor is the password; the second factor is the additional item.
As you saw, there are various things that can be used to provide the second factor. In general, the strongest second factors are physical devices like YubiKeys or FIDO U2F security keys. While having to connect a physical device to your smartphone or laptop in order to access your passwords is a hassle, it forces someone who wants to steal your data to physically get their hands on that security key to do so.
While this is more secure than using a phone number or email address as a second factor, it can create problems if you lose access to the physical device (breaks, gets lost, etc. and is not backed up properly).
Strong encryption
Your password manager will eventually hold a vast amount of important personal information in a database that resides on your device, in the cloud, or more likely, in both places. That means it should use secure, end-to-end encryption.
Here’s one example with Bitwarden:
Bitwarden uses AES 256 bit encryption as well as PBKDF2 to secure your data.
AES is a standard in cryptography and used by the US government and other government agencies around the world for protecting top-secret data. With proper implementation and a strong encryption key (your master password), AES is considered unbreakable.
PBKDF2 SHA-256 is used to derive the encryption key from your master password. This key is then salted and hashed. The default iteration count used with PBKDF2 is 100,001 iterations on the client (this client-side iteration count is configurable from your account settings), and then an additional 100,000 iterations when stored on our servers (for a total of 200,001 iterations by default).
Verify that your password manager is using strong encryption standards.
Open source code
Open source code is code that can be viewed and used by anyone. The advantage of open source code is that people can and do examine the code, looking for hidden backdoors or other problems that could compromise the security of the product (the password manager in this case).
While open source does not necessarily mean secure, it is considered to be more secure than proprietary software, where outsiders are prevented from seeing what’s going on behind the scenes.
Security audits
Seeing all the security and encryption that a software developer puts into their password manager is reassuring. But to really know if a password manager is secure, you will want to see a security audit of that product.
A security audit entails an outside company doing things like trying to hack into a product, auditing the source code for problems, and analyzing how encryption protocols are used in the product.
If a company conducts regular security audits of their password manager, it will likely be more secure than a product that isn’t constantly being tested in this manner. Here’s a security audit from Bitwarden, for example.
History of security or privacy issues
One more thing to check is whether a password manager has a history of security or privacy issues. While virtually no piece of software is immune to attacks, you may want to consider previous issues. For example, a recent report found a vulnerability that affected several major password managers (1Password, Dashlane, KeePass and LastPass), potentially leaving your master password exposed in clear text in computer memory.
While under certain circumstances, this kind of problem could give a hacker complete access to all the data stored in your password manager, using a password manager is still a safer approach than storing your passwords in your browser or using insecure passwords.
Supported platforms and browsers
A password manager is of little use if you can’t use it across all your devices (mobile, desktop, tablets, etc.). When looking for a password manager, make sure it supports all the devices, operating systems, and web browsers you use.
The best password managers generally offer:
- Native desktop applications for Windows, Mac OS, and Linux
- Mobile apps for Android and iOS
- Web browser extensions (for the most popular browsers)
Conclusion
This wraps up the Restore Privacy password manager guide. We’ll do our best to keep this guide updated with new and relevant information, along with the best password managers as we review all the options.
A password manager is one of many critical privacy tools you should be using in the digital age – but it’s not everything. Also important is a secure browser to block tracking and a good VPN service to hide your IP address and location.
Whatever your password management needs, there is a password manager out there to get the job done.