Experiment in choosing MacOS Password Manager for myself

Good morning Privacy Guides community.

I would be grateful for some insight of those with expertise in the area of security help me understand the answer to a simple equation.

I propose to avoid complex threat models or environmental variables (not digital).

Kindly review the conditions under which the comparisons are made.

*Apple device based on M chip on the latest version of macOS.

*Lockdown mode - ON

*FileVault - ON

*Recommended VPN.

*Standard firewall + proven firewall with notification of any connection.

*Risk of connecting to the workspace physically while we are away is standard.

*Risk of infection of the machine - standard, take into account the openness to the use of software not from the App Store.


Both password managers do not:

use browser addons

synchronize databases with another device or cloud storage

have special sandboxes taht are provided as an option due to the lack of one by default



We have two password managers:

KeePassXC - with its open source code but lack of sandboxing.

Strongbox Zero - with its nativeness and sandboxing.

If you have to choose 1 out of two in a gun to the head mode, life and death(letā€™s add some action) , what will you choose?


Additional questions
  1. Would you store a database in a vault like Cryptomator to provide an unlocked representation of decrypted data before
    starting the database manager?

  2. Will you stick to the ā€œ1 second Benchmarkā€ method for transform rounds or would you prefer to go beyond that?


Quick polling response
  • Strongbox Zero
  • KeePassXC
0 voters

Good morning @MMA-block, welcome to PG :slight_smile:

Im also on macOS + iOS duet and am using Proton Unlimited. It comes with password manager. Excellently done. Its quite pricey, but definitely worth every cent spent.

KeePassXC is audited, battle tested, reliable, and used by many people.

1 Like

Tavis Ormandy (former Google Project Zero member)
The purpose of sandboxing is to isolate potentially compromised components from each other.

How important do you think it is that KeePassXC operates outside the sandbox in the situation presented above?

If you can, please direct me to a place where I can study situations where the absence of sandboxing does not affect password compromise.

Unfortunately my knowledge is not enough to do it myself because I can find answers, but Iā€™m not sure of the authority of the source.

Basically Iā€™d like to model a situation where we choose between sandboxing and not fully open source or no sandboxing, battle tests and open source.
by the way, is strongbox battle tested and audited?
I think they both are.

Ideally everything in a system that can be sandboxed should be sandboxed, but your password manager is one of your most trusted applications anyway. If thereā€™s an application that Iā€™d trust to run unrestricted, it would be the password manager.

I think that you canā€™t really go wrong with either, and since the use the same vault file format what you could do is try out both and see which one you prefer.

Iā€™ve been meaning to revisit Strongbox myself, I might post a review later this week.

1 Like

The good thing about Strongbox is that you can have Latin characters for your password. It makes it even more secure and is definitely overkill but itā€™s cool to have unusual characters in your password.

The sandbox protects other apps and your system from your password manager there. Like in the event of an exploit, it would protect you. It doesnā€™t protect against malicious developers bc they could just turn the sandbox off in a future update. The sandbox doesnā€™t protect the password manager from outside threats, itā€™s only protecting stuff on the outside from whatā€™s inside the sandbox. So in the case of an offline password manager itā€™s not so necessary but also confusing why they donā€™t have it.

The stated threat model is

App Sandbox ā€” a requirement for distributing your app on the App Store ā€” limits the scope for an attacker to abuse platform features via your app.

One nice feature is that a sandboxed app has access to a container that only it has read/write access to, but itā€™s up to the app to use that. Also more important is whether it uses the OS keystore to protect your vault.

Also worth noting that if you install apps from the App Store you get some protection against the devs disabling the sandbox since Apple enforces it.

1 Like