Get a Pentest and security assessment of your IT network.

Cyber Security

Password Managers with Hidden Encryption

TL;DR

Yes, several password managers offer an extra layer of security by allowing you to store your password database within a hidden encrypted drive or container. This adds protection against offline attacks – if someone gets hold of your computer, they’ll need *two* passwords to access your data: the main password manager password and the password/key for the hidden drive.

How it Works

These solutions typically use a container format (like VeraCrypt or similar) that creates an encrypted virtual disk. Your password manager database is then stored *inside* this container. The container appears as a normal file on your computer, but without the correct password/key, its contents are unreadable.

Password Managers Offering Hidden Encryption

  1. VeraCrypt with Password Manager: VeraCrypt isn’t a password manager itself, but it’s a free and open-source disk encryption tool that many people use *with* their favourite password manager. You create an encrypted container file, then store your password manager database within it.
    • Pros: Very secure, flexible (works with any password manager), cross-platform.
    • Cons: Requires more technical setup than dedicated solutions.

    To create a VeraCrypt volume:

    veracrypt -c /path/to/your/container.vc

    (Follow the on-screen prompts to set your password and volume size.)

  2. Bitwarden with Hidden Files: Bitwarden allows you to store your data file in a hidden folder, which can then be encrypted using VeraCrypt or similar. This isn’t *built-in* but is a common practice.
    • Pros: Good balance of security and usability, cross-platform, open source.
    • Cons: Requires manual setup with VeraCrypt.
  3. KeePass/KeePassXC with Hidden Files: Similar to Bitwarden, KeePass and its fork KeePassXC can store the database file in a hidden folder that you encrypt separately.
    • Pros: Free, open source, highly configurable.
    • Cons: Requires manual setup with VeraCrypt or similar; interface can be less user-friendly for beginners.
  4. Password Safe: Password Safe allows you to encrypt the entire password database file and store it as a single file, which you can then further protect using VeraCrypt.
    • Pros: Secure, simple interface.
    • Cons: Windows only; less actively developed than some other options.

Setting Up a Hidden Drive (Example with VeraCrypt and Bitwarden)

  1. Install VeraCrypt: Download and install VeraCrypt from the official website.
  2. Create an Encrypted Container: Launch VeraCrypt and click ‘Create Volume’. Choose a standard volume (not hidden). Select the location and size for your container file.

    Set a strong password for the container – this is *separate* from your Bitwarden master password.

  3. Mount the Container: In VeraCrypt, select an unused drive letter and click ‘Select Volume’. Browse to your container file and mount it. You’ll need to enter the container password.

    The container will appear as a new drive in File Explorer.

  4. Move Bitwarden Data File: Open your Bitwarden settings (usually under ‘Settings’ then ‘Data’). Export your Bitwarden data file (.json). Move this .json file into the mounted VeraCrypt drive.
  5. Configure Bitwarden to Use New Location: In Bitwarden, point the data file location setting to the path within the mounted VeraCrypt drive. (This step varies slightly depending on your Bitwarden client.)
  6. Unmount When Not in Use: When you’re finished using Bitwarden, *always* unmount the VeraCrypt volume by right-clicking it in VeraCrypt and selecting ‘Dismount’. This is crucial for security.

Important Considerations

  • Password Strength: Use strong, unique passwords for both your password manager master password *and* the hidden drive/container password.
  • Backups: Back up both your password manager data file and the VeraCrypt container file securely (e.g., to an encrypted external drive).
  • Key Files: Consider using a key file in addition to a password for extra security with VeraCrypt.
  • Regular Updates: Keep your password manager and VeraCrypt software up-to-date to benefit from the latest security patches.
Related posts
Cyber Security

Zip Codes & PII: Are They Personal Data?

Cyber Security

Zero-Day Vulnerabilities: User Defence Guide

Cyber Security

Zero Knowledge Voting with Trusted Server

Cyber Security

ZeroNet: 51% Attack Risks & Mitigation