Start protecting your digital assets: Free 30-day trial available today. Download now.

Basics of Crypto Security

What you need to know about Cryptocurrency and Password Managers

Password Manager software helps you to securely choose, store, and maintain your passwords and secrets.


TL;DR

Managing passwords is challenging!

Passwords must be kept secure from prying eyes (but also be readily available to you).

"Secrets" to be stored in password managers may include passwords, PINs, encryption keys, answers to "secret questions," and other sensitive data.

Multi-word passphrases are longer than most passwords ... and can be better because they can be more rememberable.

There are many password manager tools available, and each has functional tradeoffs.

Consider strategies to avoid "putting all your eggs in one basket."

After choosing a password manager, you must carefully consider how to backup the master password to access it!

We all have a lot of passwords

Do you feel overwhelmed by the number of passwords that you have to use? There are passwords for the computer systems that you keep at your home: laptops, mobile phones, wifi passwords, router passwords, and so on. Beyond that set, we take care of many of life's tasks using online accounts:

  • email
  • cloud or iCloud-based services
  • bank, investment, and retirement
  • insurance
  • taxes
  • doctors and medical insurance
  • travel services
  • property registration
  • pet services
  • entertainment
  • social media
  • shopping clubs
  • grocery deliveries, etc.

It is hard to think of anything we do that doesn't have an online "footprint!" But along with this explosion of online accounts, security experts warn "don't re-use your password for multiple accounts," and "make sure your passwords are long and hard to guess." Further, experts recommend changing your passwords regularly even when they are unique and strong. But realistically, how are we supposed to choose, store, and maintain tens if not hundreds of unique passwords?

Cryptocurrency: Passwords, Passphrases, PINs, Keys, and Secrets

There are many choices in how we buy and store cryptocurrency and digital assets, and crypto-related accounts are responsible for just a subset of our entire fleet of passwords. Whether you use hot wallets, cold wallets, web-based exchanges, 2FA token generators, cloud accounts, and/or other mechanisms, you have accumulated at least a handful of passwords and other secrets along the way. You probably have all of the below:
  • Crypto exchange passwords (and 2FA recovery codes)
  • Software and hardware wallet passwords, PINs (and 2FA recovery codes)
  • Wallet Private keys, perhaps in the form of BIP39 passphrases
  • Passwords for email accounts used for crypto activity (transactions, confirmations, or recovery)

In deciding how to store all of your crypto-related passwords and secrets, you have some decisions to make.

This article describes many of the issues involved, which include:

  • Should you store your crypto-related passwords separately from your other passwords?
  • What is the entire set of passwords that a trusted beneficiary would need to know in order to access your crypto accounts?
  • Are your crypto-related passwords strong enough? Should they be longer or more complex?
  • How can you be sure that your crypto-related passwords have not been previously involved in a data breach?
  • How should you choose the right password manager for you?


Passwords are a security protection that we love to hate

No matter how you choose and maintain your account passwords, it is a chore to use them. Not only are there too many passwords for you realistically to remember, it is complicated and error-prone to type them in. Why are passwords so inconvenient? The answer is because it is hard to stay a step ahead of hackers, who are always looking for ways to break into our accounts.

Adding to these challenges, many web sites have a frustrating tendency to automatically log you out after a few minutes of inactivity, forcing you to log in again. (This is a security protection: it makes it less likely that bad actors could gain access to your account by stealing your active user account session.) To make it easier to log in again, some web browsers offer to "remember" web site passwords for you, but that is not the safest way to store them, and many high-security web sites block browsers from even offering you this convenience.

To make your life easier, you may be tempted to take shortcuts: some people resort to choosing the shortest and most easily-remembered passwords they can get away with. Some people reuse the same password for many sites. Some people rely on the "forgot my password" function every time they log in, rather than have to keep track of passwords. Such shortcuts are not a good idea for high-value accounts.

Why you should not re-use passwords

When web sites are hacked, hackers steal a treasure trove of information, which unfortunately sometimes includes usernames and passwords ("credentials"). This information is then often sold on the black market, or just released to the public, depending on whether the hacker is motivated by financial gain, fame, or simple mayhem. As soon as these stolen credentials are released, hackers worldwide immediately start trying to log in to many other web sites with the same or slightly-modified credentials - they use tools to do this with amazing efficiency. For this reason, if you re-use the same username and password for multiple web sites, it is only a matter of time until your accounts are hacked by one of these credential-stuffing attacks.

One of the most-helpful resources to help you see whether a specific email address, phone number, or password has been involved in a data breach is to check the web site https://haveibeenpwned.com, which was developed by security expert Troy Hunt. Quite a few password manager tools integrate with this web site to make sure that your chosen passwords are not recognized as having been involved in a previous data breach (in which case, they will warn you).

Password managers support you by suggesting secure passwords that avoid password reuse, and they encourage you to regularly change your passwords. In these ways, password managers lead you to practice good "digital hygiene."

Why do passwords have to be so complicated?

If hackers don't have a nice convenient list of hacked passwords, they will simply try to guess them - and they are extremely good at guessing. For example, if they know that a certain web site requires passwords that are at least 8 characters long and with at least one special character, they will be sure to guess only valid passwords that meet those criteria. If they know that a web site will lock user accounts out after a certain number of failed login attempts in a certain amount of time, they will program their attempts to avoid that lockout - to "fly under the radar." If they know that your username was associated with a given password on one hacked site, they will try using your username with variations of that password on different sites. If they know things about your life from your social media accounts, like the names of your children or pets, they will try to incorporate those clues into your passwords. Do your best to set truly "unguessable" passwords.

Long, complex, and unique passwords are not very vulnerable to hackers because they are not easily guessable.

Rememberable passphrases versus complex passwords

There is an alternative way to create an extremely hard-to-guess password instead of relying on a long, complex string of random characters. Many experts agree that great passwords can be formed from a series of regular words that you can actually remember: a multi-word passphrase. Some people call these long, multi-word passwords "pass sentences," but in this article we will use the more common and general term "passphrase."

To avoid confusion: You may remember that your BIP-39-compatible crypto wallet has something called a passphrase, too. A BIP-39 passphrase is a specific term for a string that is used as an additional authentication mechanism in cryptocurrency wallets. The BIP39 passphrase could be a password or a multi-word passphrase, but it is a specific case of passphrase use, and in this article, we are discussing passphrases in a more general sense.

In practice, what makes a password or passphrase hard to guess is how long and unpredictable it is. Longer passwords are less-guessable than short passwords because there are more possible combinations of characters - even if they take the form of a series of words with no character complexity. With passphrases, by the way, it is recommended to leave spaces between words, if the system accepts space characters.

However, often you will not be allowed to use a word-based passphrase instead of a complex password ... the system that you are accessing makes the rules for what kind of password or passphrase it will accept, and it may demand upper-case, lower-case, and special characters. But you could come up with a long passphrase that happens to have enough complex characters that it would be both rememberable and complex-enough for the underlying system ... something like "Hammerhead&species&make&quirky&silhouettes." It is still admittedly awkward ... but maybe easier to remember?

Here are some points to consider about the tradeoffs involved:

  • Passwords or passphrases that you have to provide in order to access your password manager(s) are good candidates to be both strong and rememberable - for example, you may first need to log into your primary laptop or workstation (which may have both a full-disk encryption unlock password and an operating system login password), and then you likely need to provide another password or passphrase to access your password manager application.
  • If you access a system every day, it will become easier for you to remember the password. But if you only occasionally access a system, no matter how rememberable the password is, you could still forget it. Be very careful relying on your memory for password storage!
  • Even though it may be easier for you to remember a passphrase of 4 or more words than a string of random characters, it may not be practical for you to remember either, especially when you have multiple of them to remember. So consider: what is the minimum set of passwords that you would need in order to access a password manager that could hold the rest of your passwords? Could at least those be long and rememberable?
  • When deciding whether to rely on your memory for a given password or passphrase, be sure that you have considered how large the consequences would be if you forgot it, or if you became unavailable.
  • Despite popular belief, it is not always a terrible thing to write down your password or passphrase on a physical medium like paper - as long as that medium is kept safe from loss, theft, and threats - for example in a fireproof safe!
  • A conspicuous solution: the Vault12 Digital Vault is an excellent mechanism that can be used to securely back up your most-critical master passwords.

How to choose strong passphrases

Most password managers offer users the ability to generate strong, complex passwords from randomized characters, and this greatly streamlines the process of coming up with them yourself. But what if you would like to try to create strong passphrases, instead of or in addition to passwords?

An important characteristic of strong passphrases is that the more randomized the words are, the stronger the passphrase. A conventional passphrase that you simply make up from common words (e.g., "I like to eat bacon and eggs") may be quite guessable despite its 7 words and 29-character length. There is a famous cartoon strip from xkcd that popularized "correct horse battery staple" as a secure and easy-to-remember passphrase. This passphrase has become popularized to the degree that it often is used as a starting point in analyses of the concept of passphrase security in vendor guidance and academic studies.

If you would like to further explore how to create secure passphrases, there is a word dictionary and more-detailed advice about how to create a strong passphrase using dice at the Electronic Frontier Foundation (EFF).

Multi-Factor Authentication adds security to passwords

With all of these password-guessing risks, why are passwords still used to authenticate us to our accounts? Even with their limitations, passwords are simple to implement, and - if they are well-chosen - they can be very strong. But because of the inherent risks of various forms of password-hacking, password protection by itself is not sufficient for high-security accounts. This is why 2-factor Authentication (2FA) or multi-factor Authentication (MFA) frequently is used along with passwords or passphrases to achieve higher security for important accounts. If you want to know more, here is another article offering practical details about 2FA.

Ultimately, multi-factor authentication is more than just a convenience feature for a password manager - it is a core function. 2FA or MFA should be required when you log in to the application, and also when you reset your password (password recovery). When you choose and set up your password manager, ensure that it offers you the ability to use authentication mechanisms that are secure. Password managers vary in the authentication options that they offer, and they do not force users to choose only the most-secure options. Ensure that you choose the strongest multi-factor options that you can for your password manager - do not, for example, rely solely on confirming an SMS message to reset your password manager password! See the Vault12 article about 2FA if you need more details about these risks and how to make strong choices for 2FA. Consider incorporating biometric authentication as one of your factors if possible.

Should you have multiple password managers to avoid a Single Point of Failure? 

But is it sensible to keep all of your passwords and secrets in one place? It is logical to worry about "keeping all of your eggs in one basket," or having a single point of failure. On the other hand, who wants to individually set up and protect many different baskets? As you consider how to organize your passwords in a password manager, you may want to consider keeping two or even more password managers. There is no single best organizational strategy for how many password managers to keep, and as you might expect, there are several factors to consider:

  • It is generally safe to use password managers, but they are a juicy target. The more frequently you use a given password manager, the greater the chance that someone will somehow learn that you use it, and it could become more of a target for hacking. There is always a greater risk of exploitation of any software that is installed on a frequently-used, sloppily-patched, internet-connected computer relative to software that is stored on a limited-use, carefully-protected computer. You want to protect your password manager - so don't keep a password manager with your important secrets installed on the same machine that you let your kids use for playing games and general browsing.
  • Many experts recommend that you keep all crypto-related account information and secrets separate from those that you use for your "regular" personal tasks. This advice may lead you to maintain a dedicated password manager for just your crypto-related secrets, and one password manager for "everything else," especially if you have a sizable investment in cryptocurrency.
  • Also, it would reduce risk to store your 2FA recovery codes separately from your passwords. Plenty of people keep them together - but effectively, keeping them together turns two-factor authentication back into single-factor authentication, since if your password manager were ever hacked, the combined set would become just one "something that you know" factor - and the hacker would know both.

Locally-installed versus online password managers

Many password managers are kept online, in Cloud services, but some password managers can be kept on a local computer. If your password manager can be stored locally, it can be available to you for offline use, which may be handy. Which is more secure - online or offline? It depends on how good you are at keeping your own computers secure and backed up. Cloud providers have professionally-configured, regularly-patched machines, with constantly-monitored security protections - can you match that level of care? On the other hand, if you know how to secure and maintain a limited-exposure home computer, and you maintain regular, secure backups to recover from in case of disk failure, you could safely keep a secure password manager on just your local machines. Many people walk a middle path by using a locally-installed password manager that backs itself up (in encrypted form) to the Cloud.

Open-source versus commercial password managers

Open-source software was once a niche choice, but today, even the largest organizations use free and open-source software. At the same time, there are plenty of commercial software development companies that produce software that is sold for a licensing fee. Which is better for a password manager?

Let's consider the general advantages and disadvantages:


  • Open-source software offers complete code transparency - any programmer in the world can review the code, and submit bug reports and security concerns. For projects that have many people involved, this process yields extremely high-quality, high-security code.
  • However, some open-source software projects lose participatory momentum over time, lose "eyeballs" and users, and as a result, become less secure. There is no institutional body that labels open source projects as "active" or "inactive," although there are signs of activity if you understand what to look for (such as activity levels of the code repository).
  • Open-source software generally does not offer technical support outside of FAQs and blog-like forums. However, commercial companies often offer little more support than that. If you purchase technical support from a commercial company, there is at least some committed level of customized help and response time.
  • Usually commercial software has integrations that work smoothly with other software that the same company produces - so if you are using other software products from the same vendor, and it integrates with their password manager, it might make sense to go with that company for the full suite.

Vulnerabilities in password managers

No software is immune from code vulnerabilities. Both open source and commercial password managers have had vulnerabilities, and just like any other software, after they come to light, there is a flurry of activity to fix them and to inform users and the rest of the industry about what happened. Just because you may have used one of the password managers mentioned below does not necessarily mean that your passwords could have been stolen - some of these vulnerabilities were identified and fixed before they were known to be exploited, and some would have affected only users who were lured into falling for phishing attacks, or who had other malware installed already.

Some past vulnerabilities that have affected 1Password, LastPass, and KeePass are described here. And a recent one that affected Kaspersky is described here.

You should ensure that your password manager (as well as your other software) is configured to frequently check for and apply security updates.

How to choose the right password manager for you

Your choice of password manager will largely depend on which features you want, and how much you want to spend. You should also consider the reputation of the organization that produces and maintains the software. Below are some of the features that vary between password managers, and some comparative reviews of the most popular ones.

Many free versions limit cross-device synching, number of passwords stored, and other features. Check out the comparisons linked below to understand more about limitations to the features that are most important to you.

Common password manager features
  • cross-platform support (with cross-device syncing)
  • online versus local password storage / offline availability
  • web form-filling
  • password and/or passphrase creation
  • detect weak or duplicate passwords
  • 2FA authentication options

There is also an advanced feature called "plausible deniability" that several password managers are in the process of considering for implementation. With plausible deniability, a user can set up one password that appears to give access to the entire set of stored passwords, but actually only allows access to a subset of less-important passwords. The user can also configure a second password, which if used instead, would reveal the more high-value passwords. Plausible deniability is already implemented by some crypto hardware wallets, but as a tricky and advanced feature, it is not yet common in popular software-based password managers.

Password Manager links and reviews

Below is a list of direct links to popular password managers:

Here are some recent comparative reviews that may help you choose from among them:

Back up your password manager's master password securely to Vault12

To make your password management easier and more secure, we suggest that you use your Vault12 Digital Vault to store your password manager's master password, and any other passwords needed to access your password manager. Safely in your Digital Vault, they act as fallback protection in case, despite your best efforts, you forget them. Your Vault12 Digital Vault is not a full-featured password manager, but it is a perfect repository where you can safely keep your "master" passwords that guard access to your password manager. Just remember to update them in your Digital Vault when you change them.

Basics of Crypto Security

What you need to know about Cryptocurrency and Password Managers

Password Manager software helps you to securely choose, store, and maintain your passwords and secrets.