Tag: trezor

  • Trezor Model T Review: Is It Worth Buying?

    Trezor Model T Review: Is It Worth Buying?

    The Trezor Model T is a cryptocurrency hardware wallet manufactuered by Satoshi Labs. It remains one of most trusted hardware wallets for securing cryptocurrency assets. With support for over 1,500 digital currencies and the latest Trezor Suite v25.6.2 update—including Stellar (XLM) support and WalletConnect integration—it remains a go-to option for secure crypto management. New offerings like Trezor Expert and the launch of the Trezor Safe 5 showcase SatoshiLabs’ ongoing commitment to innovation in crypto self-custody. This Trezor Model T review explores its features, updates, and whether it’s still worth buying in today’s fast-evolving crypto market.

    BUY YOUR TREZOR MODEL T NOW!

    buy now
    Trezor Model T
    Trezor Model T

    If you want to learn how to set-up and install your Trezor Model T, check out our complete Setup Guide here.

    Or check out my video review below.

    Key Features of the Trezor Model T

    1. Screen: Bright color LCD – 240×240 pixels;
    2. Connectivity: USB-C connection with support for Android devices via the Trezor Suite mobile app;
    3. Crypto Compatibility: Supports over 1,500 cryptocurrencies and works with third-party wallets like MetaMask, Exodus, and MyEtherWallet;
    4. Security Enhancements: Features include Shamir Backup, microSD card encryption, wipe code for emergency data deletion, and passphrase protection;
    5. Mobile support: Android support via the Trezor Manager; and
    6. External wallet compatibility: supports MyEtherWallet and a few others.

    Latest Updates: As of Trezor Suite v25.6.2, includes WalletConnect integration and experimental Stellar (XLM) support.

    Trezor Model T inside the box
    Inside the box

    Security Features

    Here are some of the security features of the Trezor Model T:

    • Offline Private Key Storage: The Trezor Model T stores private keys entirely offline within the device, ensuring they are never exposed to internet-connected systems, significantly reducing the risk of remote attacks.
    • Open-Source Firmware: Trezor’s firmware is fully open-source, allowing for community auditing and transparency. Regular updates from SatoshiLabs address emerging threats and maintain device integrity.
    • Shamir Backup (SLIP-0039): Users can split their recovery seed into multiple shares, requiring a threshold number to restore access. This adds resilience against theft or accidental loss.
    • Passphrase Protection: In addition to a PIN, users can enable a passphrase to create hidden wallets. This feature protects against coercion and phishing attempts.
    • MicroSD Card Encryption: When enabled, a randomly generated secret is stored on a microSD card, which must be inserted to unlock the device. This adds an extra layer of protection against physical attacks.
    • Tamper-Evident Design: While the Model T does not use a secure element chip, its hardware is designed to show signs of tampering, and it includes a wipe code feature that erases all data if triggered.
    • Recent Security Updates: In response to phishing threats, Trezor has implemented enhanced safeguards across its communication channels and reaffirmed that it never requests sensitive information via email or support messages.

    Can the Trezor be hacked?

    The Trezor Model T remains vulnerable to certain physical attacks, though SatoshiLabs has taken steps to mitigate risks. The most notable exploit—first demonstrated by Kraken Security Labs—involves voltage glitching to extract the recovery seed from the device’s microcontroller. This attack still requires physical access and specialized equipment, and Trezor has emphasized that enabling the passphrase feature significantly reduces its effectiveness.

    In reply, Trezor noted that the attack cannot work remotely and if users turn on the passphrase feature on the device. Trezor also reassured users that physical access is only a threat to 6-9% of cryptocurrency users.

    However, Trezor has not redesigned the Model T hardware to eliminate this vulnerability, but it has introduced additional safeguards such as microSD card encryption, wipe codes, and firmware-level protections. In 2025, Trezor also responded to a phishing campaign that exploited its support contact form to send fake emails. While no internal systems were breached, the company urged users to remain vigilant and reiterated that it never asks for wallet backups or recovery seeds via email.

    Trezor Model T 2.8.10 firmware update- does it fix the Kraken Security Labs hack?

    The latest firmware version for the Trezor Model T is 2.8.10, released on 21st May 2025. Despite multiple updates since version 2.3.0, the core vulnerability identified by Kraken Security Labs—voltage glitching to extract the recovery seed—has not been fully resolved. This is because the exploit stems from a hardware-level flaw in the device’s microcontroller, which cannot be patched through firmware alone.

    Trezor has introduced several mitigations over time, such as passphrase protection, microSD card encryption, and wipe codes, which make physical attacks more difficult. However, the fundamental vulnerability remains unless the hardware is redesigned. So while newer firmware versions improve overall security and usability, they do not eliminate the Kraken exploit.

    Security 3/5

    Multi-Currency Support

    The Trezor Model T can hold over 1,500 different cryptocurrencies, including popular ones like Bitcoin, Ethereum, Cardano, Ripple, Litecoin, Stellar, and Dogecoin. In February 2025, Trezor announced it would stop supporting a few lesser-used coins—like Dash, Bitcoin Gold, DigiByte, Namecoin, and Vertcoin—in its Trezor Suite app. After July 2025, you won’t be able to access these coins through the app, but you can still manage them with other trusted wallets.

    A big benefit of the Trezor Model T is that, unlike some other wallets like Ledger, you don’t have to install separate apps for each coin. It works smoothly with services like MetaMask, Exodus, MyEtherWallet, and Electrum, making it easier to handle lots of different assets in one place.

    To check out a comparison list between coins supported by Trezor and Ledger, check out our ultimate list of supported coins table.

    Multi-currency support 3/5

    3rd Party Wallet Support

    The Trezor Model T integrates with a wide range of third-party wallets, including MetaMask, Exodus, Electrum, MyEtherWallet, Rabby, Yoroi, and AdaLite, enabling users to manage assets across multiple blockchains. These integrations allow users to access features not available in Trezor Suite, such as staking, NFT management, and DeFi applications.

    Meanwhile, Trezor Connect ensures secure communication between the hardware wallet and third-party apps, keeping private keys safely stored on the device at all times.

    Hardware Design

    The Trezor Model T has a bright 1.54-inch color touchscreen with a 240×240 pixel resolution, letting users securely enter their PIN and passphrase right on the device. It’s small and lightweight—about the size of a matchbox—and uses a USB-C connection to work with Windows, macOS, Linux, and Android systems (though not iOS). There’s also a microSD card slot that can be used to add extra security by storing a secret code required to unlock the wallet. Inside, the device uses an ARM Cortex-M4 processor, built to safely handle private keys and crypto transactions. While it doesn’t have a secure element chip like some other wallets, the Trezor Model T is open-source, and its design makes it easier to tell if someone has tried to tamper with it.

    However, I find the touch screen is still small and can be hard to use. I eventually settled on pressing the screen with my pinky finger.

    Hardware design 5/5

    Ease of use 4/5

    Trezor Model T thumb for scale
    Thumb for scale

    Mobility

    In 2025, the Trezor Model T offers strong mobile support through the Trezor Suite Lite app, available on the Google Play Store for Android users. With this app, users can manage their crypto holdings, send and receive transactions, and view account details directly from their smartphones. The device connects to both mobile and desktop platforms via a USB-C port, making it compatible with most modern Android phones and computers. While iOS support is still unavailable, users can also connect the Model T to mobile-compatible wallets like Mycelium and MetaMask Mobile using Trezor Connect, expanding its functionality for users on the move.

    Is Trezor Model T worth it in 2023?

    In 2025, the Trezor Model T remains a strong contender in the hardware wallet market, especially for users prioritizing open-source transparency and advanced security features. Priced around $129 to $170 USD, it offers support for over 1,500 cryptocurrencies, a responsive color touchscreen, and features like Shamir Backup, passphrase protection, and microSD card encryption. While the device still lacks a secure element chip and remains vulnerable to certain physical attacks, mitigations like wipe codes and Trezor Suite Lite for Android enhance its usability and protection. For users seeking a balance of security, usability, and broad coin support—without relying on closed-source hardware—the Model T continues to be a worthwhile investment in 2025.

    Verdict

    Trezor Model T verdict
    Trezor Model T

    Deciding whether or not to purchase the Trezor Model T over other available cryptocurrency hardware wallets has a lot to do with what features you are looking for.

    The wallet supports over a thousand cryptocurrencies. Thus, virtually half of the cryptos available in the market can be stored on the device.

    Its integration with exchanges such as Bitstamp, Coinmap, and Bitex also makes it a good choice.

    However, one significant downside is that the device does not support IDEX or Switcheo exchanges. The findings from Kraken Security Labs on physical hacks on the device are also extremely concerning.

    Security Rating: 3/5
    Multi-currency Support: 4/5
    Hardware design: 5/5
    Ease of Use: 4/5

    Final score: 4/5

    GET YOUR TREZOR MODEL T!

    buy now

    Trezor Model T Product Specifications (Technical Specifications)

    Processors ARM Cortex-M4 processor @ 168 MHz embedded on STM32 F2 microcontroller
    Compatibility 64-bits desktop computer (Windows 7+, macOS 10.8+, Linux). Compatible with Android smartphones.
    Connector USB type C
    Certification Nil
    Size Size: 64mm x 39mm x 10mm
    Weight: 22g
    Supported Assets 1050+ Supported assets

  • Trezor Safe 3 Review: Secure and Accessible

    Trezor Safe 3 Review: Secure and Accessible

    In the competitive world of hardware wallets, Trezor has earned a reputation for prioritizing open-source transparency and uncompromising Bitcoin security. Trezor supports many coins, but its true strength is securing Bitcoin—earning trust from dedicated Bitcoin users. This review explores the Trezor Safe 3’s features and security to help you decide if it suits your crypto needs.

    buy now

    Trezor Safe 3: Overview and Design

    The Trezor Safe 3, priced at US$79, is a next-generation hardware wallet that combines affordability with robust security features. It includes a Secure Element (EAL6+) chip for enhanced protection, a 0.96″ monochrome OLED screen, and a two-button interface for intuitive on-device confirmation. The wallet supports PIN and passphrase protection, 12-, 20-, and 24-word backups, and is compatible with Trezor Suite and third-party apps for managing thousands of coins and tokens. Its open-source design, USB-C connectivity, and sleek, tamper-evident casing make it a reliable and stylish choice for safeguarding digital assets.

    Security Features

    Trezor Safe 3 emphasizes physical and digital security, making it a dependable option for protecting your crypto assets. At its core is a Secure Element (EAL6+ certified) chip, which provides hardware-level protection against physical attacks and unauthorized access. This chip securely stores sensitive data like private keys, ensuring they never leave the device. This is a significant upgrade from the older Trezor Model One, which does not include a secure element.

    To further enhance security, the Safe 3 supports PIN and passphrase protection, both entered directly on the device to prevent exposure to malware on connected computers. A passphrase adds encryption, creating hidden wallets that stay secure even if the recovery seed is compromised.

    The device also features tamper-evident packaging and a durable, tamper-resistant casing, helping users detect any unauthorized interference before first use. For backup and recovery, the Safe 3 supports 12-, 20-, and 24-word recovery phrases, and is compatible with Shamir Backup for advanced redundancy.

    All Trezor devices, including the Safe 3, are open-source, allowing independent verification of their firmware and security protocols. This transparency reinforces trust and ensures that vulnerabilities can be identified and addressed quickly by the community.

    In short, the Trezor Safe 3 combines modern cryptographic protections with user-controlled security features, offering peace of mind for both new and experienced crypto holders.

    Broad Compatibility and Ecosystem

    Trezor Safe 3 uses USB-C and works with Linux, macOS 11+, and Windows 10 or newer operating systems. It functions seamlessly with the Trezor Suite, providing a comprehensive platform for managing a wide array of cryptocurrencies. While it supports thousands of coins and tokens as a universal wallet, its strong security features and open-source nature make it particularly appling to Bitcoin users. A Bitcoin-only version (also priced at US79) is available for those who prefer a dedicated device for their BTC.

    Click to BUY the Bitcoin-only version of the Trezor Safe 3

    Who Should Consider the Trezor Safe 3?

    The Trezor Safe 3 is an ideal choice for users seeking a highly secure and affordable hardware wallet. Its secure element and low price make it ideal for entry-level users seeking strong protection without overspending. It also suits Trezor users upgrading from Model One or needing a reliable backup hardware wallet. The Safe 3 embodies Trezor’s core values of security and open-source transparency in an accessible package.

    Conclusion

    The Trezor Safe 3 is a highly recommended hardware wallet for users seeking a secure, open-source solution—particularly those focused on protecting Bitcoin. It strikes an excellent balance between affordability and strong security by incorporating a Secure Element chip, while maintaining a simple, user-friendly design. The Trezor Safe 3 offers essential protection against digital threats, making it an ideal entry point for anyone serious about keeping their Bitcoin safe without having to spend a lot of money for a hardware wallet.

    buy now
  • MetaMask Security Guide: Protect Yourself from “Address Poisoning” Scams

    MetaMask Security Guide: Protect Yourself from “Address Poisoning” Scams

    Wallet Address Poisoning Scam: What You Need to Know

    MetaMask warned crypto users of a new scam that is running rampant called “address poisoning”. This scam involves malicious actors copying and pasting wallet addresses in order to steal funds from unsuspecting users. In this article, we will discuss how address poisoning works and what users can do to protect themselves. Also, check out Gemmy’s video for more information on how to secure your MetaMask contacts! (https://prodavinci.com)

    How Does Wallet Address Poisoning Work?

    Address poisoning is a scam that exploits copy-and-paste tendency of most crypto wallet users. Since wallet accounts have cryptographically-generated address with long hexadecimal numbers, users tend to only remember the first and last few characters of their address. As a result, users rely on copying and pasting their addresses to save time. MetaMask addressed this in their blog post, and here’s how it essentially works:

    Attackers usually has softwares that monitor token transfers. If they pick up on your address, they can use vanity address generators to create an address that looks very similar to yours. The attacker then sends you worthless tokens to “poison” your transaction history. If you are not careful, you might copy and paste their address from your transaction history, sending funds to the attacker’s address.

    This method is rather amateurish, compared to other scam types, blockchain attacks, or smart contract exploits. While this would not give the attacker access to user wallets, it relies on user carelessness and haste — something that is common in Web3 when users want to send funds quickly to capitalize on DeFi opportunities.

    The Increasing Cases of Wallet Address Poisoning

    According to an article jointly published by crypto analysts X-explore and Wu Blockchain on 2nd December 2022, over 340,000 addresses have been poisoned on-chain, resulting in $1.64 million stolen from unsuspecting victims. The cases began spiking at the end of November, and is still a prevalent issue now.

    The article suggested that MetaMask should improve its UI features to prevent such attacks from happening, such as letting users identify trusted wallet addresses in transaction history using color markers or other prompts.

    How to Protect Yourself from Address Poisoning

    Metamask recommends users to always double-check the address before sending funds, making sure every single character is correct. As the attacks are still ongoing, users are also advised to avoid copying addresses from transaction histories and block explorers. Users can also add trusted wallet addresses in Settings > Contacts.

    More importantly, it is much safer to use hardware wallets when transferring funds, as users are required to check and confirm any address they are sending funds to before the transaction is authorized. If you are interested in getting a hardware wallet, feel free to check these out:

    Click here to purchase a Ledger wallet!

    buy now

    Or a Trezor wallet!

    buy now
  • 7 Best Crypto Password Managers

    7 Best Crypto Password Managers

    Intro

    Generally speaking, creating strong passwords and protecting those passwords from being found out is a user’s key tenant in their own protection online when using certain services. But creating complex enough passwords that are difficult to guess or hack with a dictionary attack often leaves a bunch of passwords for each service that’s difficult to even remember. 

    You could write it down, but that could be found out. And while browsers like Google Chrome do come with their own password managers, that does leave all your passwords behind one single password that is probably just as vulnerable as any others.  

    Password security is particularly important for crypto enthusiasts and traders, who deal with hackers and infiltrations on a far more regular basis than regular internet users, because there’s literally money to be gained by these bad forces and stolen funds are extremely difficult to recover. There are a lot more hackers out there, and a lot of times where cryptocurrency and other digital assets get stolen.

    So with that in mind, a slew of password managing services have become available in the market over the years to aid users with this specific security issue. Let us look at some of the most popular ones in the market right now. (https://duckysonline.com/)

    1- Yubikey

    Yubikey

    Check out our video: YubiKey Review and Guide for a full look at how to use the YubiKey and all its features. You can also check out our article Yubico’s YubiKey: Review and Guide for a step by step written guide on how to use it. Also, check out our YubiKey Review and Guide for a full look at how to use the YubiKey and all its features:

    YubiKey Review and Guide

    Pros:

    Fundamentally, the YubiKey has the same advantages of having a literal physical key for a physical vault. It’s a physical object, so in order to login and configure the account of an online service, the actual YubiKey must be used to deliver the necessary passwords it provides.

    This already makes the usage of hardware authenticators like YubiKey very hard to hack, which is why Google and Facebook use them to secure employee and user accounts.

    Yubikey, like all hardware authenticators, essentially allow two factor authentication (2FA) to be used safer and more conveniently, because it can produce one time passwords (OTP) you don’t have to create yourself or remember and enter them for you. So not only is it safer, but it’s also very convenient – two advantages that don’t usually coincide. 

    Physical hardware authentication devices are particularly good at avoiding the kind of hacks seen in Coinbase and USD1mil crypto heist last year, where SMS-based 2FA codes were hacked using SIM swapping

    It’s easy to set up as well as use and provides a strong layer of security for the services it protects. Just plug it in, follow the prompts on the service that you’re using (assuming it is supported), press the key and it’s set. 

    For crypto exchanges such as Binance, password keys like the YubiKey can be set to lock withdrawals, logins and password resets individually. What this means is that even if someone were to hack into the account, the individual actions a hacker could do inside is also locked away and needs the YubiKey to access them.

    Cons:

    Its greatest strength is also perhaps its biggest weakness. Physical objects used for security can still be damaged, left behind in a rush by accident or even lost. And losing a YubiKey can involve some incredibly tedious solutions, so be forewarned. On top of that, some might find the need to carry one around a minor inconvenience, particularly if they do exchanges in different locations

    Another issue that needs to be addressed is that some crypto exchanges might not support YubiKey, particularly for mobile users. So it’s important to check for support before purchasing one. For mobile power users, this makes the YubiKey models with USB-C and Lightning connectors somewhat useless, even if USB-C models are still useful on certain laptops like MacBooks. 

    One minor issue was discovered by the people at Zapier who kept triggering their YubiKey’s when accidentally touching them, resulting in a secured code being entered into whatever textbox you have open at the time. It’s happened so often on Slack, that Zapier has decided to run with the joke and made a custom Slack emoji. Most hackers won’t know what to do with this sudden burst of password code getting posted on a chat, but it’s not a habit many would encourage, and they do provide a means to make the press less sensitive.

    And like many password managing solutions, this won’t stop hackers from getting into your account if the exchange itself is not secure. 

    2- Trezor Password Manager

    Trezor

    Check out our video: Trezor Model T Guide and Review and our article which answers the all important question- Trezor Model T Review: Is it Worth Buying?

    Trezor Model T Guide and Review

    Pros:

    Using the Trezor physical wallet as a password manager is somewhat similar to using the YubiKey, but takes the process of securing passwords one level higher. Physical wallets like Trezor and Ledger are cold wallets because they confirm transactions within themselves before they are made, and while you compromise convenience and speed using them, they are by their very nature far more secure. 

    And by virtue of how it works, Trezor can essentially save an unlimited amount of passwords too. 

    One noted advantage The Trezor might have over the YubiKey is that so long as you know your seed key, losing a Trezor and getting a replacement is far more straightforward. It is a series of words between 12 and 24 words long using the BIP39 format, and using it in one physical wallet that supports it basically replicates that wallet in another device, restoring your passwords and addresses.

    Cons:

    It’s important to note that while using a Trezor as a password manager, it’s main focus is as a physical wallet. Getting one as just a password manager is a bit overkill considering the prices they go for. It must also be pointed out that this is still a physical device that can be lost or damaged, and replacing one is still kind of pricey as well. 

    On top of that, the seed key is fundamentally the wallet’s identity and is often targeted by hackers. The same convenience that allows a Trezor to be replaced with a seed key, also means anybody else that has it can replicate yours too and steal your assets, if you’re not careful.  

    It is therefore incredibly risky to keep online, so it must also be written down or inscribed on a physical medium of some kind. Paper is typically not encouraged, but there are metal alternatives that are far more durable and secure. Again, these can be damaged, lost or stolen if you’re not careful too. 

    If you have multiple physical wallets (and some traders do, for diversification and security purposes), you can use a single physical wallet to store the multiple subordinate sed keys, but this can also lead to a recursive rabbit hole of problems, where compromising of the “prime” key jeopardises the other “subordinate” keys, even if the later is now incredibly secure.

    But to be fair, if you do trade large amounts of capital and you are concerned about hackers, then maybe getting a physical wallet like the Trezor is not a bad investment, and if they are valuable, most people know to treat them as such and secure them well. Plus you get to reap the perk of having a physical authentication device that supports far more kinds of cryptocurrency than the YubiKey. 

    3- LastPass

    lastpass

    Pros:

    Lauched in 2008, LastPass is well-known among cyber-experts and is among the most feature-rich password protectors available. It has multi factor authentication as well as  browsers and is easy to use. The free version is also pretty decent but has its own limitations as we’ll get to below. 

    LastPass also uses 256-bit AES encryption to scramble your passwords, allowing a zero-knowledge policy within the company. It also allows users to use it in an offline mode, which is a rare trait in online password managers. 

    The product is also very highly rated across the board for its incredibly feature rich paid-version and is generally considered affordable for what it can do, with Forbes, CNET and many other tech sites

    Cons:

    There have been potential security risk discoveries in 2021, 2019, 2018, 2017 (and again in the same year), 2016, 2015 and 2011 where vulnerabilities were discovered and then patched, but the password vaults themselves were secure. Lack of open source code aside, they have also never been vetted by a third-party auditor to test their product.

    One the one hand, this could be a little worrying. Even if no passwords seemed to be compromised, the idea that they could have been is a little nerve-racking. But on the other hand, LastPass seems to be on the ball with regards to making sure users are well-informed and that their product is constantly patched and reinforced. 

    LastPass will also lock you into the country that you’re in, but you can add more countries into your permissions as needed. Or you could get around that issue and use a VPN

    LastPass’ free version has seen what might be seen as a huge downgrade as of last year after it was limited to only one device per user. People already on LastPass’ free version before found this change worth swapping to another manager altogether. For newer users looking to just secure one device, this isn’t really an issue but most password manager users would rather their manager work across several platforms.   

    4- KeePass

    keepass

    Pros:

    At first glance, this doesn’t look like a very impressive password manager. The installation is a bit confusing and the application itself isn’t very stylish or intuitive.

    It is however open-source and free (barring the modest demand for donations), and while the former seems frivolous to the end user and the later not all that important to crypto-enthusiasts who are looking to protect fairly large amounts of capital from hackers, they matter for two crucial reasons

    Firstly, its open-source nature allows anyone to create a startling myriad of plug-ins and customisations. This almost DIY nature of KeePass allows a savvy-enough user to modify KeePass in almost whatever way they want. On top of that, it could be argued that open-source software allows more experts to scrutinise it and its flaws (assuming a sizable-enough enthusiast community, which KeePass has). 

    Secondly, that it is free makes it an incredible password management solution for tech-savvy individuals, tech businesses or organisations that are cash-strapped but have the skills to utilise KeePass to its fullest potential. Staying free factor turned out to be quite an important factor, as LastPass’ changing its terms on its free users showed. 

    On top of that, various versions of KeePass (that was originally meant to run on desktops and laptops) have come about to provide for platforms it wasn’t originally designed for, such as for iPhone and Android.     

    Cons:

    KeyPass’ incredibly customisable, almost DIY nature also reflects the fact that on its own, it is a very bare password manager and probably alienating to a user who isn’t particularly tech-savvy or wants to do the extensive customization to provide features its other rivals have out of the box. 

    The necessity for its over 100 plugins to provide the convenience most other solutions have right out the box is going to turn off people who want to simply get the solutions over and done with. Its interface is not intuitive and there is no official tech-support. 

    On top of that, you must choose which database to store your encrypted passwords, because it does not have cloud-based storage for them built in. It is possible to have KeePass store it on detachable storage, such as a thumbdrive, but again, that must be opted. This does make it more secure, but if the storage device is stolen, you lose access to all your devices. 

    5- BitWarden

    bitwarden

    Pros:

    In many reviews either about, including or just mentioning Bitwarden, the positives of its free version are often contrasted to LastPass’ own ever since the later changed its free version’s service terms to only sync between either personal computers or mobile devices, almost to suggest that Bitwarden has dethroned LastPass among free app users. 

    And it’s hard to deny that it has earned its reputation as one of the best open-source free password managers out there.

    Bitwarden provides multi-factor authentication via authenticator apps, and is secured with AES-256 encryption, which is then hashed with SHA-256. You can even host all your passwords on your own server for added security. Bitwarden also allows you to create and share passwords and audit password usage. It also auto-fills passwords and their credentials in one go, though this can malfunction on certain sites. And all synch via an unlimited amount of devices

    That’s not to say that it’s affordable paid version doesn’t get much better, with support added for YubiKey, U2F, and Duo, 1GB encrypted data vault storage, vault health reports, a time-based OTP authenticator and generator and even priority customer support.

    Its creators too have had a sterling reputation for transparency, having gone through a third-party audit by Insight Risk Consulting as well as German cybersecurity team Cure53, while its source code is available for anyone on Github to examine. It has even a bug-bounty on vulnerability coordination platform Hackerone

    Cons:

    Like its open-source counterpart KeePass to an extent, Bitwarden does suffer from a lack of an intuitive interface and its true capability requires some expertise to extract via plugins. But generally speaking, it’s an incredibly difficult password manager to fault for most reasonably experienced users. 

    6- Keeper

    keeper

    Pros:

    Its introduction is fairly intuitive and quite helpful, walking you through the setup process step-by-step from a warning about browser-based password managers to password imports, and then an installation of web plugins, a tour of its features and the introduction of multi-factor authentication. 

    Keeper can be used via a web-app, but the actual desktop app allows for biometric logins and an offline mode. Keeper also has a series of other add-on features that you can pay for (or opt out from), such as encrypted file storage, secure messaging and dark web monitoring. Overall, it’s a well-priced, intuitive and easy to use password manager with rather good support for businesses

    In terms of security, Keeper is quite strong, having third party audits, compliance with ISO 27001 information security management system standards, the US Department of Commerce and the European Commission’s Privacy Shield framework and even has an internal bug-bounty programme.

    Keeper is priced somewhat similar to LastPass for its first package tier, but offers a wide variety of packages to suit various sorts of needs for families, business and whole enterprises, and offers a 50 percent discount if you are a student. 

    Cons:

    The most glaring drawback to Keeper is that its free version, while reasonably capable, can only do those things on one mobile device. There won’t be any auto-fill for passwords. Also, Keeper’s free version may be terminated within 12 months of inactivity and take your passwords and files with it. Finally, Keeper’s support is also not as good with personal users.

    One possible vulnerability is that Keeper doesn’t fully automate password updates. When it detects a password-change page, it offers to update and save a stronger password. Your passwords exist for a certain time on Keeper’s company servers – unconducive to the zero-knowledge test.

    7- 1Password

    1password

    Pros:

    It’s one of the best password managers available on the market right now, priced similarly to LastPass for its standard version, which allows unlimited passwords across unlimited devices, and is offered in a variety of packages suited for their intended demographics too. This allows 

    It has the sort of features you expect from a good password manager of this range, such as 256-AES encryption, a zero-knowledge policy, two factor authentication, password strengthening and good browser extensions.On top of that, it has straight-forward security recommendations and an easy to use interface.

    However, it stands out with some interesting features that make it particularly useful. 

    One is being able to make multiple password vaults that you can organise for different purposes. On family and business plans, you can set up sharing settings with other users that are unique to each vault. On business plans specifically, administrators can remotely configure these settings for team members.

    When in travel mode, it hides all password vaults and only shows the ones deemed safe for travel, and gives no indication that the mode is on, which is good if someone wants to keep sensitive information secret, particularly if a device is stolen. Such vault information might include form fills, passwords, secure documents and credit card information.

    It will also tell you if your passwords are weak, or if you’ve been reusing them for different services, and has a simple-to-use feature that wipes clipboards to remove sensitive data after a timer is set. 

    1Passworld can also create an Emergency Kit – a PDF with your account email, Secret Key, and a place for you to write down your master password. It offers peace of mind in case you lose some valuable bit of data and can’t gain access to your passwords.

    Cons:

    There are some minor concerns, though. 1Password’s browser extensions can’t be used to add passwords or edit them, and while it will tell you if your passwords are weak, it won’t insist they get stronger with special characters, which is odd.

    Also, if you’re moving from a different password manager, you must export your passwords via a CSV file, which seems less secure. 

    It also has no free version.