How to Choose a Secure Password Manager?

A password manager is an excellent way to protect multiple accounts with
robust passwords. With a password manager, you can create unique, complex
passwords for an unlimited number of accounts while only needing to remember a
single master password.

However, when it comes to picking a password manager it is
important to bear some important considerations in mind
. Failure to do so could mean you end up with a password manager that
isn’t completely trustworthy.
How are passwords
Password managers come in two distinct varieties. The first kind are
services where the user retains full control over the encryption of their
passwords. With this kind of password manager, it is impossible to recover the
account if you lose your master password. This is because the service has no
control over the passwords and has no ability to access them under any
The second kind of password manager allows consumers to entrust the
service to encrypt their passwords on their behalf. This means that the third
party holds the key used to encrypt and decrypt the user’s passwords. In this
kind of system, it is possible for consumers to recover their account and set
up a new master password if they should happen to forget it. However, this kind
of password manager does not provide end to end encryption and is therefore not
as secure.
The first kind – in which only the consumer can access his or her
password – is by far the most secure. This is because the key for accessing the
password is never stored on company servers and is therefore never vulnerable
to hackers.
Open source Vs Closed

In addition to selecting a password manager where only the user can
encrypt and decrypt passwords, it is important to consider whether a password
manager is closed or open source.
Closed source password managers (also known as proprietary software) is
locked so that nobody can analyze or audit the code. This makes it impossible
to verify any claims made by the password manager’s developer.
A closed source password manager may claim to use end to end encryption
to secure passwords. It could also claim that passwords are only ever stored
locally rather than being transmitted to company servers. However, despite
these claims, if the source code for the software is closed source – it is
absolutely impossible to verify those claims.
It is for this reason that many privacy and security advocates refuse to
use any privacy software that isn’t open source. When a password manager is
open source – or has at least had its source code made available – it is
possible for anybody to look at the code to ensure that it doesn’t have any
mistakes, vulnerabilities, or deliberate backdoors.
Admittedly, some (or all) of the closed source password managers on the
market could be telling the truth about the level of protection that they
provide. And there is not necessarily any proof currently circulating – that
those firms are collecting everyone’s passwords on behalf of the NSA or some
other nefarious group, for example.
However, the fact remains that if a password manager is closed source it
is impossible to verify what it is doing. This means that it can never be
considered as secure as an open source competitor.
Depending on your personal needs you may decide to use a closed source
service due to the ease of use, or because the account can be recovered. The
choice is yours, and it really does depend on your personal threat model, but,
when it comes to privacy and security; open source is always better than


Irfan Shakeel
irfan shakeel, the founder of ehacking project, he also hosts classes at eh academy. he has found many vulnerabilities in the world’s known platforms, he has been providing it security training since 2010. you might have read his articles and opinion on ibm developers, infosec institute, alienvault, eh academy and other known blogs. follow him on twitter, linkedin and quora.

Most Popular

How to Install Kali Linux on VirtualBox [Windows Host] in 2020

Kali Linux is a Debian based Linux distribution, released on the 13th March 2013 as a complete rebuild of BackTrack Linux. It is one of...

Acunetix v13 Release Introduces Groundbreaking Innovations

The newest release of the Acunetix Web Vulnerability Scanner further improves performance and premieres best-of-breed technologies London, United Kingdom – February 5, 2019 – Acunetix,...

What is Ethical Hacking, how to be an Ethical Hacker

Hacking is the process of discovering vulnerabilities in a system and using these found vulnerabilities by gaining unauthorized access into the system to perform...

Basic steps to ensure security Online!

Security concerns are growing day by day due to the growing interconnectivity and technology. Drastic things can happen if you be a little careless...