KeePassXC password manager: open-source and lock-in free
KeePassXC password manager is a local-first, open-source option that stores every credential in one offline KDBX vault you fully control.
Use it as a Linux password manager on desktop, then unlock the same vault on Android with trusted companions like KeePassDX or KeePass2Android.

Table of Content
Why KeePassXC remains the safest pick
Audit-friendly security
KeePassXC is fully open source, so you can audit the code and avoid hidden telemetry.
Local-first vaults
Your KDBX vault stays offline unless you deliberately sync it on your terms.
Cross-platform access
One portable KDBX database works across Linux, Windows, macOS, and Android.
- Strong cryptography defaults with Argon2id and modern ciphers.
- Hardware token support (YubiKey, Nitrokey) for keyfile or challenge-response.
- No subscriptions or paywalls—security without upsells.
Recommended hardware key for KeePassXC
One portable vault file everywhere
Your KeePass database is a single .kdbx file. Store the KDBX vault on an encrypted USB stick, a private Git repository, or a self-hosted storage share.
Opening it on another device never requires an account—just your master password (and key file, if configured).
Use versioning-friendly sync (Syncthing or Git) to avoid conflicts and keep a read-only backup copy offline. Every decryption happens locally, so your offline password manager never shares secrets with third-party servers.
Official apps and trusted companions
Use these maintained clients that follow the open KeePass standard.
| Platform | Package or source | Notes |
|---|---|---|
| Linux | Distribution repos, Flatpak, AppImage | Prefer distro packages for updates; Flatpak offers sandboxing. |
| Windows | Signed installer, portable build | Enable auto-lock on resume and use Windows Hello only as unlock convenience. |
| Android | KeePassDX (F-Droid) or KeePass2Android | Enable clipboard clearing, biometrics only for local unlock. |
| Browsers | KeePassXC-Browser (Firefox/Chromium) | Uses the running desktop client—no cloud bridge required. |
Setup checklist for a hardened vault
- Create a long, unique master password and optionally add a key file stored offline.
- Use Argon2id with high memory (64–128 MB) and iterations to slow brute-force attempts.
- Group entries, add tags, and store TOTP secrets so you can generate codes offline.
- Enable automatic lock on inactivity, system sleep, or screen lock.
- Back up the .kdbx file plus the key file to an encrypted, offsite location.
Recommended workflows
Linux and Windows desktop
- Run KeePassXC with browser integration enabled only for trusted profiles.
- Use SSH agent forwarding from KeePassXC for Git or server access to avoid storing keys on disk.
- Store secrets for infrastructure (API tokens, database logins) with separate entry groups per project.
Android
- Install from F-Droid to avoid extra trackers and ensure reproducible builds.
- Keep the database in device-encrypted storage; avoid third-party cloud folders.
- Enable quick unlock with biometrics only after the app already asked for the master password once per session.
Sync and backup strategies
Choose a sync model that keeps the KDBX file under your control:
- Syncthing: peer-to-peer, end-to-end encrypted, excellent for family or team sharing.
- Git : version history with signed commits; avoid public remotes and rotate credentials.
- Self-hosted storage: WebDAV or SFTP on a server you own, using key-based auth only.
- Offline rotation: periodic copy to an encrypted drive kept offsite to recover from ransomware.
Apps I do not recommend
These services add friction, keep core features behind paywalls, or have a track record of incidents:
- LastPass: multiple breaches and key features locked behind the Pro tier.
- Dashlane: cloud-only model with limited control over vault storage.
- 1Password: closed-source sync backend and subscription-only access.
- Bitwarden: cloud-only plans: fine for convenience, but self-hosted or KeePassXC offers better ownership.
Frequently asked questions
All answers about KeePassXC, KDBX files, and secure sync.
Further reading and internal resources
Continue strengthening your privacy stack with these guides:
