Your passwords belong to you

Zero-knowledge password manager with client-side encryption. Your data is encrypted on your device before it ever leaves it. The server never sees your passwords.

AES-256-GCM Encryption
Zero-Knowledge Architecture
Argon2id Key Derivation
Works Everywhere

Built for security, designed for simplicity

Everything you need to manage your passwords securely, with nothing you don't.

True Zero-Knowledge

Your master password never leaves your device. The server stores only encrypted data it cannot read. Even if our database is breached, your passwords remain safe.

Client-Side Encryption

All encryption and decryption happens in your browser using Web Workers. AES-256-GCM with Argon2id key derivation (64MB memory, 3 iterations) ensures military-grade protection.

Organize with Vaults

Create multiple vaults with folders to organize your passwords, TOTP codes, secure notes, files, and website bookmarks. Everything in one place.

Two-Factor Authentication

Protect your account with TOTP authenticator apps, email verification, or hardware security keys via WebAuthn. Multiple layers of defense.

Cross-Platform Sync

Access your vault from any device. Changes sync automatically across browsers and desktop apps. Offline mode keeps you productive without internet.

Local-Only Mode

Don't trust any server? Use local mode. Your encrypted vault lives entirely on your device with zero network requests. Full privacy, zero compromise.

How it works

Security you can understand, not just trust.

1

Create your master password

Your master password is the only key to your vault. It never leaves your device and is never sent to our server in any form.

2

Encryption happens locally

Your master password is used to derive an encryption key via Argon2id (64MB memory cost). All data is encrypted with AES-256-GCM before leaving your browser.

3

Server stores only ciphertext

The server receives and stores only encrypted blobs. It has no way to decrypt your data, verify your master password, or recover your vault.

4

Decryption happens on your device

When you log in, encrypted data is downloaded and decrypted locally using your master password. The process runs in an isolated Web Worker for maximum security.

What if our server is compromised?

Your passwords are safe

An attacker would get AES-256-GCM encrypted blobs. Without your master password, brute-forcing the encryption is computationally infeasible.

No master password hash to crack

Unlike some password managers, we never store any hash of your master password. There is nothing for an attacker to run dictionary attacks against.

Argon2id stops brute force

Each decryption attempt requires 64MB of memory and significant CPU time. Mass brute-forcing is impractical even with specialized hardware.

Get KeyHive

Use it in your browser or download the native app for your platform.