Valtik Studios
Back to blog
Password ManagerinfoUpdated 2026-04-17orig. 2026-03-1213 min

Password Managers 2026: The Honest Comparison After LastPass

LastPass's 2022-2023 breaches cost users an estimated $438M in stolen cryptocurrency. Three years later, which password manager should you actually use? A practical comparison of 1Password, Bitwarden, Dashlane, Proton Pass, Keeper, KeePass, and Apple Passwords. Ranked by threat model, architecture, audit history, and real-world usability.

TT
Tre Trebucchi·Founder, Valtik Studios. Penetration Tester

Founder of Valtik Studios. Pentester. Based in Connecticut, serving US mid-market.

Why this matters more than it did

The LastPass breaches happened and nothing was ever the same.

We're three years past the worst of it and I still have clients who stayed on LastPass out of sheer inertia. Then they call us after getting drained. Crypto wallets. Brokerage accounts. The full haul. Reason is always the same. The 2022-2023 LastPass breaches gave attackers a shopping list they could crack offline for as long as they wanted.

Here's what the attacker walked out with.

  • Customer vault backups (encrypted, but crackable with enough compute for weak master passwords)
  • Customer-facing metadata (URLs, email addresses, timestamps)
  • Partial unencrypted data

Independent analysis by researchers and law enforcement has traced approximately $438 million in stolen cryptocurrency to credential-stuffing and seed-phrase-extraction attacks using the LastPass data. The attack pattern: crack low-entropy master passwords offline, extract crypto wallet credentials and seed phrases, drain the wallets. Losses continue accruing years after the breach because master password cracking is a long-tail activity.

Post-LastPass, the password manager industry matured. Or was supposed to. Customers fled LastPass. Some to 1Password. Some to Bitwarden. Some to Proton Pass. Some to no password manager at all, which is a catastrophic outcome.

Three years later, the question "which password manager should I use?" has nuanced answers depending on your threat model, your operating system preferences, your team size. And your willingness to manage some technical complexity.

This post walks through the current options, their architectures, their histories, and which one makes sense for which user type.

The tier list

Tier 1 (recommended for most users):

  • 1Password. Polished commercial, strong architecture, reasonable ecosystem
  • Bitwarden. Open source, affordable, solid security
  • Proton Pass. Privacy-focused, newer but well-built

Tier 2 (situational):

  • Apple Passwords / iCloud Keychain. Apple ecosystem only, free, convenient
  • KeePass / KeePassXC. Open source, local-only, manual sync, maximum control
  • Dashlane. Commercial, competent but less ideal than Tier 1

Tier 3 (use only if required):

  • Enterprise-specific solutions (CyberArk, Keeper Enterprise, etc.). For specific corporate needs
  • Google Password Manager / Chrome built-in. Better than nothing, worse than any dedicated option

Tier 4 (actively avoid):

  • LastPass. Damaged brand, multiple security incidents, architectural concerns
  • Free password managers tied to ad businesses. The business model conflict is real

Architecture matters

Before comparing products, understand the security architectures. Two dimensions matter most: where the master key lives and what the service can see.

Zero-knowledge architecture

How it works: your master password (or passphrase) is used to derive an encryption key locally on your device. That key never leaves your device. The service stores only encrypted blobs that it can't decrypt. Even if the service is completely breached, the attacker gets encrypted data that's only as strong as your master password.

Zero-knowledge providers: 1Password, Bitwarden, Proton Pass, Dashlane, Keeper, KeePass/KeePassXC (inherently), Apple Passwords (with Advanced Data Protection)

Server-side decryption architecture

How it works: the service holds the encryption key (or an encryption oracle). The service can decrypt your vault on command.

Historical example: early LastPass, to enable some features, held keys server-side. Mostly eliminated now across major providers. Still present in some enterprise products with escrow / recovery features.

Implication: server-side decryption means a service compromise equals full vault access. Never acceptable for personal use. Marginally acceptable for enterprise with strict compliance requirements.

1Password's Secret Key architecture (distinctive)

1Password uses a zero-knowledge model plus an additional Secret Key. A long random value generated at signup, stored only on your devices (never on 1Password servers). Your vault encryption requires both the master password AND the Secret Key.

Why this matters: even if an attacker cracks your master password via brute force, they still can't decrypt your vault without the Secret Key. The Secret Key effectively adds a minimum of ~128 bits of entropy regardless of your master password choice.

1Password's unique architectural advantage. Other providers rely entirely on master password strength.

Provider deep dives

1Password

Company: AgileBits (Toronto, Canada). Founded 2005. Currently $8B+ valuation.

Architecture: Zero-knowledge. Secret Key + master password required for vault decryption.

Pricing:

  • Individual: $3/month
  • Families: $5/month for 5 members
  • Teams: $8/user/month
  • Business: $16/user/month (with advanced features)

Strengths:

  • Secret Key architecture substantially mitigates brute-force attacks against master password
  • Polished UX across platforms (Mac, Windows, Linux, iOS, Android, web, browser extensions)
  • Watchtower feature that monitors for known breaches and flags compromised passwords
  • Travel Mode that hides specific vaults during border crossings
  • Developer features (CLI, SSH key management, Secrets Automation)
  • Team management is well-designed
  • SOC 2 Type 2 certified
  • Bug bounty program with meaningful payouts

Concerns:

  • Proprietary closed-source. Auditable only via third-party assessments
  • Higher price than open-source alternatives
  • Single company dependency. If AgileBits has issues, users are affected

Who should use it: most users who can afford it. Families. Teams with non-technical members. Anyone who values polished UX over deep technical control.

Breach history: no major vault-data breaches. Some limited issues historically but nothing approaching LastPass-scale.

Bitwarden

Company: Bitwarden, Inc. (US). Founded 2015.

Architecture: Zero-knowledge. Master password required. No additional factor like 1Password's Secret Key by default (but you can add 2FA).

Pricing:

  • Free tier: unlimited passwords, unlimited devices (genuinely functional)
  • Premium: $1/month
  • Families: $4/month
  • Teams: $3/user/month
  • Enterprise: $6/user/month

Strengths:

  • Open source. The entire codebase is on GitHub, independently auditable
  • Genuinely useful free tier. Most people can use Bitwarden forever without paying
  • Self-hostable. You can run your own Bitwarden server
  • Excellent platform coverage. Mobile apps, browser extensions, desktop apps on all major platforms
  • SOC 2 Type 2 certified
  • Regular third-party audits with published results

Concerns:

  • UX is less polished than 1Password. Functional but rougher
  • Advanced features (reports, enterprise SSO integration) require higher tiers
  • Phishing-resistant MFA support exists but isn't as prominent as 1Password
  • Slower feature velocity than commercial competitors

Who should use it: technical users, privacy-focused users, anyone who values open source, teams with technical members, anyone on a budget.

Breach history: no major breaches.

Proton Pass

Company: Proton AG (Switzerland). Launched password manager in 2023 after Proton Mail, Proton Drive, Proton VPN.

Architecture: Zero-knowledge. Master password required. Integrates with Proton Mail for email aliases.

Pricing:

  • Free tier: unlimited passwords, 1 device, limited features
  • Pass Plus: $5/month or bundled with Proton Unlimited ($10/month for full Proton suite)

Strengths:

  • Swiss jurisdiction. Strong privacy protections
  • Integrated with Proton ecosystem. Mail, Drive, VPN, Calendar all in one subscription
  • Email alias generation via Proton Mail's hide-my-email-alias feature
  • Open source. Apps and protocols published for audit
  • Younger product. Some modern design choices from starting fresh

Concerns:

  • Newer product. Less battle-testing than 1Password or Bitwarden
  • Ecosystem lock-in. Most valuable if you're fully in Proton's ecosystem
  • Feature set still catching up with mature competitors
  • Team features are newer and less mature

Who should use it: users who want a privacy-focused provider with strong jurisdictional protections, users already in Proton's ecosystem for Mail/VPN.

Breach history: no breaches reported.

Dashlane

Company: Dashlane (France/US). Founded 2009.

Architecture: Zero-knowledge. Master password required.

Pricing:

  • Free tier: 25 passwords, 1 device
  • Premium: $5/month
  • Friends & Family: $7.49/month

Strengths:

  • Polished UX
  • Dark Web Monitoring included
  • VPN included with premium tier (though the VPN itself isn't a top-tier standalone offering)
  • Well-established brand

Concerns:

  • Less open than competitors. Partial open source but not all components
  • Free tier is limited. Only 25 passwords, not usable as a primary manager
  • Middle-of-the-pack pricing. Pricier than Bitwarden, less value than 1Password
  • Fewer advanced features for developers

Who should use it: general users who prefer Dashlane's UX. Not actively bad. Not the top option in any specific category.

Breach history: no major vault breaches.

Keeper

Company: Keeper Security (US). Founded 2011.

Architecture: Zero-knowledge. Master password required.

Pricing:

  • Personal: $3.75/month
  • Family: $7/month for 5 users
  • Business: varies

Strengths:

  • Enterprise features (PAM-adjacent, secure file sharing, compliance reporting)
  • Good certifications (SOC 2, FedRAMP authorized for some tiers)
  • Government-ready. Used by government agencies

Concerns:

  • Less popular with individuals. More enterprise-focused
  • Pricing is confusing with many add-on features

Who should use it: enterprise users with specific compliance needs. Less compelling for individuals.

KeePass / KeePassXC

Project: KeePass is a Windows-focused open-source tool. KeePassXC is a cross-platform fork that most users prefer.

Architecture: Zero-knowledge. Vault is a local encrypted database file. Sync is DIY (Dropbox, Syncthing, Nextcloud, etc.).

Pricing: Free, open source.

Strengths:

  • Fully local. No cloud service involved unless you configure one
  • Complete control. Vault file on your hardware
  • Transparent. Open source, auditable by anyone
  • Flexible sync. Use whatever cloud provider you trust
  • Plugins for extensibility

Concerns:

  • DIY sync. You handle cross-device synchronization yourself
  • Rougher UX than commercial alternatives
  • No automatic cross-device updates. Have to manage conflicts manually
  • Weaker mobile experience than commercial options
  • No family / team management features

Who should use it: technical users who want maximum control, users with specific threat models avoiding any cloud dependency, enthusiasts.

Breach history: not a cloud service, so "breach" is different. Software vulnerabilities are possible, but fixes roll out via open source.

Apple Passwords / iCloud Keychain

Operated by: Apple.

Architecture: Zero-knowledge when Advanced Data Protection is enabled. Without ADP, Apple holds a key and can provide to law enforcement under warrant.

Pricing: Free with Apple device.

Strengths:

  • Free
  • Seamless within Apple ecosystem
  • Passkey-ready. Strong support for passkeys
  • Zero-knowledge with ADP. Apple can't access
  • Simple for non-technical users

Concerns:

  • Apple ecosystem only. No Windows/Linux/Android official apps (limited Windows iCloud for Windows support)
  • Limited sharing features
  • No team / enterprise functionality
  • Proprietary. Closed source

Who should use it: Apple-only users, particularly non-technical family members. Consider this the default for anyone in the Apple ecosystem.

Google Password Manager

Operated by: Google.

Architecture: Tied to your Google account. Not zero-knowledge by default. "On-device encryption" option available but limited.

Pricing: Free with Google account.

Strengths:

  • Convenient. Already there for Chrome and Android users
  • Better than nothing if users don't use a dedicated password manager

Concerns:

  • Not zero-knowledge by default
  • Tied to Google account. Account compromise = password exposure
  • No cross-browser sync (Chrome-specific)
  • Google can access passwords (not privacy-respecting)

Who should use it: only as a stepping stone. Get to a dedicated password manager as soon as practical.

Microsoft Authenticator (passwords)

Similar to Google Password Manager. A default-ish option that's less capable than dedicated password managers. Use if you're heavily in the Microsoft ecosystem, but dedicated options are better.

The master password problem

Every password manager's security depends critically on your master password. If your master password is weak, even a zero-knowledge service compromise exposes your vault.

LastPass taught this lesson. Users with 8-character master passwords had their vaults cracked by attackers within months. Users with 20+ character passphrases were safe.

Master password rules:

  • Minimum 20 characters for non-technical users
  • Minimum 25 characters for high-value targets (crypto holders, executives, journalists, activists)
  • Passphrase format preferred over random characters. Easier to remember, same strength per character: "correct horse battery staple" style, modern version: "Remember Paris Trip April 2024 Amazing!". 40+ characters, memorable
  • Unique to the password manager. Never a password used anywhere else
  • Never written down digitally. If you need a physical backup, write it on paper in a safe place

Your master password is the single most important credential in your digital life. It deserves more thought than any other password.

Two-factor authentication on the password manager

Every password manager supports 2FA on the manager account itself. This is critical and often overlooked.

Recommended 2FA setup:

  • Hardware security key (YubiKey, Titan, Nitrokey). Gold standard
  • Authenticator app (Aegis, Raivo, 1Password's built-in, Bitwarden's, Ente). Second-best
  • SMS. Never use for password manager 2FA, SIM swap vulnerability

All Tier 1 password managers support hardware keys. 1Password has arguably the smoothest hardware-key experience.

Migration and export

If you're switching password managers (especially from LastPass), the migration process:

  1. Export from old manager. All password managers support CSV or encrypted export
  2. Review the export. This is a cleartext dump of your credentials. Treat carefully.
  3. Import to new manager. All major managers have import tools
  4. Verify in new manager. Spot-check important accounts work
  5. Change critical passwords. Especially any that might have been exposed
  6. Delete old export files. Securely
  7. Delete from old manager. Only after confirming new manager is working

During migration:

  • Don't mix accounts between managers (causes confusion, defeats security)
  • Don't leave the export file accessible after migration
  • Use the migration as an opportunity to review and update weak passwords

What to pay attention to

Breach notification

Your password manager should notify you about breaches at third-party sites where you had credentials. 1Password Watchtower, Bitwarden data breach reports, Dashlane dark web monitoring, Proton Pass alerts all do this.

Phishing-resistant authentication

Your password manager should:

  • Support FIDO2/WebAuthn for login to itself
  • Offer passkey management for your accounts
  • Support secure fill that's resistant to phishing (e.g., fills only on the domain that matches)

Sharing

If you share accounts (families, teams), the sharing mechanism should:

  • Be zero-knowledge (sharing doesn't expose the password to the provider)
  • Be granular (specific accounts, not entire vaults)
  • Be revocable
  • Log access

1Password and Bitwarden both have well-designed sharing.

Recovery

Account recovery is the tension point between security and usability. Too easy = security risk. Too hard = users lose access and abandon.

Current best practices:

  • 1Password: Emergency Kit (printable document with account details + Secret Key) for personal recovery. Family Organizer for family account recovery. No support-mediated recovery (security benefit).
  • Bitwarden: you're responsible for your master password. No recovery mechanism that doesn't require you to know the master password. Emergency access via designated contacts.
  • Apple Passwords: Apple ID account recovery applies (including Recovery Contacts and Recovery Key for ADP users).

Know the recovery path for your manager before you need it. Test it (if safely possible).

For specific scenarios

Individuals in high-risk situations

Journalists, activists, executives, crypto holders, domestic abuse survivors:

  • 1Password or Bitwarden with strong master password (25+ characters)
  • Hardware key 2FA (YubiKey)
  • Passkey adoption for critical accounts (banking, email, crypto exchanges)
  • Separate account for highest-value credentials (possibly KeePassXC with offline sync for the most sensitive)

Families

  • 1Password Families ($5/month for 5 people). Best all-around experience
  • Bitwarden Families ($4/month). Similar capability at lower price, rougher UX
  • Apple Passwords if everyone's on Apple. Free, works

Small businesses

  • 1Password Teams ($8/user/month). Polished
  • Bitwarden Teams ($3/user/month). Budget-friendly, open source
  • Consider whether you need SSO (adds complexity + cost but is worth it past ~25 users)

Enterprises

  • 1Password Business or Enterprise. Depends on scale
  • Bitwarden Enterprise. Strong value proposition
  • Keeper Enterprise. If specific compliance requirements push you there
  • CyberArk or Thycotic. For privileged access management layered on top
  • Must integrate with SSO (Okta, Azure AD, etc.)

Crypto holders

  • Hardware wallet for crypto assets (Ledger, Trezor). Your password manager shouldn't hold seed phrases
  • Password manager for exchange credentials, 2FA backup codes
  • Offline paper backup for critical seed phrases and recovery info

If your password manager holds crypto credentials, the security posture should reflect that: 25+ character master password, hardware key 2FA, regular vault review.

What to avoid

  • Storing master password anywhere except your head and a secure physical backup
  • Reusing your master password on any other service
  • Sharing your master password with anyone
  • Using password hints that are guessable from your public information
  • Leaving old exports on your filesystem after migration
  • Using browser-only password management as your primary mechanism

For Valtik clients

Valtik provides password-manager deployment consulting for small teams, incident-response engagements for suspected compromise. And individual consultations for high-risk users. Reach out via https://valtikstudios.com.

The honest summary

Your password manager is the most important security tool in your digital life. Get it right:

  • Most users: 1Password or Bitwarden
  • Apple ecosystem: Apple Passwords with Advanced Data Protection
  • Technical / privacy-focused: Bitwarden or Proton Pass
  • Maximum control: KeePassXC with manual sync

Whichever you pick:

  • 20-25+ character master password
  • Hardware key 2FA on the manager
  • Regular vault review
  • Migration away from any provider you don't trust (LastPass, any non-zero-knowledge option)

The LastPass lesson wasn't "all password managers are risky." It was "the specific design and operational choices of a password manager matter enormously." The alternatives that post-date LastPass know this. The remaining question is which one fits your specific situation.

Sources

  1. LastPass Data Breach Analysis. Krebs on Security
  2. LastPass Breach Impact Tracking. ZachXBT
  3. 1Password Security Design
  4. Bitwarden Security Documentation
  5. Proton Pass Security Model
  6. Dashlane Security Whitepaper
  7. KeePassXC Documentation
  8. Apple Platform Security Guide
  9. Password Manager Comparison. PCMag
  10. Independent Password Manager Audits
password manager1passwordbitwardendashlaneproton passlastpassdata privacyconsumer cybersecurityidentity securityresearch

Want us to check your Password Manager setup?

Our scanner detects this exact misconfiguration. plus dozens more across 38 platforms. Free website check available, no commitment required.

Get new research in your inbox
No spam. No newsletter filler. Only new posts as they publish.