KeePassXC password manager: open-source and lock-in free

Last Update 1/29/2026

KeePassXC password manager is a local-first, open-source option that stores every credential in one offline KDBX vault you fully control.

Use it as a Linux password manager on desktop, then unlock the same vault on Android with trusted companions like KeePassDX or KeePass2Android.

KeePassXC password manager showing an encrypted offline KDBX vault with local-only credential storage
KeePassXC keeps passwords in a locally encrypted vault without cloud lock-in or subscriptions.

Why KeePassXC remains the safest pick

Audit-friendly security

KeePassXC is fully open source, so you can audit the code and avoid hidden telemetry.

Local-first vaults

Your KDBX vault stays offline unless you deliberately sync it on your terms.

Cross-platform access

One portable KDBX database works across Linux, Windows, macOS, and Android.

  • Strong cryptography defaults with Argon2id and modern ciphers.
  • Hardware token support (YubiKey, Nitrokey) for keyfile or challenge-response.
  • No subscriptions or paywalls—security without upsells.

Recommended hardware key for KeePassXC

Nitrokey 3A USB security key
Security pick

Nitrokey 3A USB security key

A hardware key adds an extra layer of protection for your vault and supports offline workflows.

Shop on Amazon

One portable vault file everywhere

Your KeePass database is a single .kdbx file. Store the KDBX vault on an encrypted USB stick, a private Git repository, or a self-hosted storage share.

Opening it on another device never requires an account—just your master password (and key file, if configured).

Use versioning-friendly sync (Syncthing or Git) to avoid conflicts and keep a read-only backup copy offline. Every decryption happens locally, so your offline password manager never shares secrets with third-party servers.

Official apps and trusted companions

Use these maintained clients that follow the open KeePass standard.

Platform Package or source Notes
Linux Distribution repos, Flatpak, AppImage Prefer distro packages for updates; Flatpak offers sandboxing.
Windows Signed installer, portable build Enable auto-lock on resume and use Windows Hello only as unlock convenience.
Android KeePassDX (F-Droid) or KeePass2Android Enable clipboard clearing, biometrics only for local unlock.
Browsers KeePassXC-Browser (Firefox/Chromium) Uses the running desktop client—no cloud bridge required.

Setup checklist for a hardened vault

  1. Create a long, unique master password and optionally add a key file stored offline.
  2. Use Argon2id with high memory (64–128 MB) and iterations to slow brute-force attempts.
  3. Group entries, add tags, and store TOTP secrets so you can generate codes offline.
  4. Enable automatic lock on inactivity, system sleep, or screen lock.
  5. Back up the .kdbx file plus the key file to an encrypted, offsite location.

Recommended workflows

Linux and Windows desktop

  • Run KeePassXC with browser integration enabled only for trusted profiles.
  • Use SSH agent forwarding from KeePassXC for Git or server access to avoid storing keys on disk.
  • Store secrets for infrastructure (API tokens, database logins) with separate entry groups per project.

Android

  • Install from F-Droid to avoid extra trackers and ensure reproducible builds.
  • Keep the database in device-encrypted storage; avoid third-party cloud folders.
  • Enable quick unlock with biometrics only after the app already asked for the master password once per session.

Sync and backup strategies

Choose a sync model that keeps the KDBX file under your control:

  • Syncthing: peer-to-peer, end-to-end encrypted, excellent for family or team sharing.
  • Git : version history with signed commits; avoid public remotes and rotate credentials.
  • Self-hosted storage: WebDAV or SFTP on a server you own, using key-based auth only.
  • Offline rotation: periodic copy to an encrypted drive kept offsite to recover from ransomware.

Frequently asked questions

All answers about KeePassXC, KDBX files, and secure sync.

Further reading and internal resources

Continue strengthening your privacy stack with these guides: