Security

Which password manager should you choose?

For most people, a password manager is the biggest security gain per hour. Not because it is exciting, but because reused or browser-stored passwords are still one of the easiest routes into your accounts.

Updated
May 7, 2026
Which password manager should you choose?

Which password manager should you choose?

For most people, a password manager is the biggest security gain per hour. Not because it is exciting, but because reused or browser-stored passwords are still one of the easiest routes into your accounts.

The practical choice is usually simple:

  • Bitwarden if you want something that works across laptop and phone straight away
  • KeePassXC if you deliberately do not want a cloud vault and are willing to handle sync yourself

This guide helps you make that choice without turning a basic security upgrade into a hobby project.

Who this guide is for

This guide is for readers who:

  • do not yet use a password manager
  • currently rely on browser passwords or reused passwords
  • are choosing between Bitwarden and KeePassXC
  • want a realistic migration path instead of a perfect one-night cleanup

This is not a guide for enterprise SSO, privileged access tooling, or fully separated admin vaults. For most PrivacyGear readers, the right first choice is much lower-friction than that.

What this guide does and does not solve

A password manager does solve:

  • reused passwords across multiple accounts
  • weak hand-made passwords
  • account chaos around logins, notes and recovery codes

But it does not automatically solve:

  • phishing if you enter your password on a fake site
  • weak account recovery through insecure email or SMS
  • missing 2FA
  • missing backups or poor device hygiene

Treat a password manager as a foundation layer, not the finish line.

The practical default

For most readers, Bitwarden is the default choice.

Why:

  • works immediately on Windows, macOS, Linux, Android and iPhone
  • syncs across devices without extra setup work
  • has solid browser extensions and a usable mobile app
  • the free tier is enough for most personal use

For a normal user, student, small business owner, or healthcare worker, that is usually the best balance between security and maintenance.

KeePassXC is the stronger fit when you are solving a different problem:

  • you do not want a cloud vault at all, even encrypted
  • you want to manage the database file yourself
  • you already trust your own sync or backup routine
  • you accept that mobile use and synchronisation require more discipline

That is not “better privacy for everyone”. It is a different tradeoff.

Choose Bitwarden if…

  • you are new to password managers
  • you use multiple devices
  • you want iPhone or Android support without extra workarounds
  • you may later want limited sharing with family or colleagues
  • your priority is a route you will actually maintain

Bitwarden is usually the right choice if your passwords currently live in Chrome, Safari, Firefox, iCloud Keychain, or scattered notes and you just want to move to something saner.

Choose KeePassXC if…

  • you deliberately do not want dependency on a cloud service
  • you mostly work on desktop
  • control matters more to you than convenience
  • you want to handle sync yourself via Syncthing, an encrypted cloud folder, or manual copies
  • you understand that mobile use depends on compatible apps, not one unified first-party stack

KeePassXC is strong, but only if you also carry the operational part: where the .kdbx file lives, how it is backed up, and how you prevent version conflicts.

When browser passwords are no longer enough

Browser password storage is better than reusing the same password everywhere, but it has limits:

  • it often works less well outside that one browser
  • export, backup and recovery are less explicit
  • it encourages leaving everything attached to one browser profile
  • it does less to force deliberate account hygiene and migration

If you have relied on browser storage for years, that is not a moral failure. Use it as a stepping stone, not the final state.

How to switch without creating chaos

Step 1: choose one primary route first

Do not adopt three password managers at once. Pick one route:

  • Bitwarden for most readers
  • KeePassXC if you deliberately want local-first control

For most people, running two managers in parallel does not add security. It adds confusion.

Step 2: start with your most important accounts

Do not begin with every forum login from 2014. Start with:

  1. email
  2. banking
  3. government login
  4. cloud storage
  5. social media

These are the accounts attackers can use to cause the most damage or reset the others.

Step 3: create a strong master password

Your master password should be:

  • unique
  • long
  • never reused anywhere else

Practical minimum: a passphrase of 4 to 6 random words, or a long unique sentence you do not use anywhere else.

Write the master password down on paper and store it safely. Not on a sticky note attached to the laptop, but also not only in your head if you know you might lose it.

Step 4: import only if it genuinely helps

Importing from Chrome, Safari or another manager can save time. But do not import everything blindly and call that migration complete.

After import, you still need to:

  • remove duplicates
  • replace old weak passwords
  • check which accounts still matter

Migration is successful when your important accounts are in order, not when you have collected a thousand legacy logins.

Step 5: change passwords as you move them

For important accounts:

  1. open the account
  2. generate a new unique password in your manager
  3. save it immediately
  4. log out and test logging back in

That test matters more than speed. Otherwise you discover much later that one character was stored incorrectly.

Backup and recovery: this is part of the job

A password manager without a recovery routine is only half implemented.

Bitwarden

Minimum:

  • write your master password down on paper
  • enable 2FA on your Bitwarden account
  • store recovery codes somewhere retrievable

Stronger:

  • export an encrypted backup from time to time
  • plan what happens if you lose your phone

KeePassXC

Minimum:

  • back up the .kdbx file
  • document where it lives
  • test that the backup actually opens

Stronger:

  • keep one offline or offsite copy
  • document how sync works if you use multiple devices
  • only add a key file or hardware key if you are sure recovery remains workable

A “stronger” setup that you cannot later unlock is not an upgrade.

When the stronger setup is worth it

For some readers, the extra friction of KeePassXC or a stricter backup routine is justified:

  • you work with confidential files
  • you do not want cloud dependency for your vault
  • you already have a mature local-first routine
  • you accept that this costs more maintenance

But for a normal user, or someone still reusing passwords everywhere, that is often not the best first step. First build a working habit, then add extra control.

Common mistakes

  • trying to migrate every account at once
  • keeping two managers in parallel without a clear primary route
  • forgetting 2FA on the email account and on the password manager itself
  • not storing recovery codes
  • choosing KeePassXC for ideological reasons without a sync or backup plan
  • using Bitwarden premium TOTP without realising that password and second factor then sit in the same vault

Short advice by profile

  • Normal user: start with Bitwarden
  • Student or employee: start with Bitwarden unless you already run a disciplined local-first routine
  • Small business owner: Bitwarden is usually more practical; KeePassXC only if you deliberately want to carry the operational burden
  • Healthcare / confidential roles: choose based on workflow, but take backup, recovery and access discipline more seriously than the average reader

Next step

Choose your route

Finish the account layer

Use it in context