Passary Logo
Passary
Zero-knowledge password manager

Passary, built for privacy

A zero-knowledge password manager that keeps your passwords private by design.

100% local operation
No accounts
No tracking
Encrypted vaults
mypasswords.passaryvault
Passary Dashboard

What actually happens when you use Passary

Understanding the lifecycle of your data is key to trusting the system.

Vault Creation

Your vault is created locally on your device. A random salt is generated.

Key Derivation

Your master password is processed through Argon2id in your browser to derive the encryption key.

Encryption

Your data is encrypted using AES-256-GCM. The key never leaves the ephemeral memory state.

Storage

The encrypted file is saved to your local storage. Passary has zero knowledge of its contents.

Built for security. Designed for privacy.

Every feature designed with zero-knowledge architecture in mind

Local-Only Storage

Your encrypted vault never leaves your device. No cloud, no servers, no sync. Complete custody.

Military-Grade Encryption

Argon2id + AES-256-GCM. The same cryptography protecting classified government data.

Zero Knowledge

We never see your password or data. Even if we wanted to, we mathematically cannot.

How Passary Compares

Security is about trade-offs. We chose isolation over convenience.

Vault Storage
Passary
Local File (Encrypted)
Cloud
Vendor's Cloud
Browser
Local DB / Cloud Sync
Access Without Internet
Passary
Full Access (Always)
Cloud
Cached Mode (Risk of Sync Issues)
Browser
Yes
Breach Risk
Passary
Isolated to Your Device
Cloud
Centralized Target
Browser
Malware / Browser Exploits
Algorithms
Passary
Argon2id + AES-256-GCM
Cloud
Varies (Often Legacy PBKDF2)
Browser
OS Dependent
Account Requirement
Passary
None
Cloud
Mandatory
Browser
Google/Apple ID

Vs KeePass?

Passary is spiritually similar to KeePass but built for the modern web. We use standard web crypto (Argon2id) and provide a polished, zero-setup UI that works in any modern browser without installation, while maintaining the same "local file" philosophy.

What threats Passary protects you from

We believe in honest security. No product protects against everything. Here is our threat model.

Protects Against

Confirmed Coverage
  • Cloud Database Breaches (Zero Servers)
  • Vendor/Insider Access (No Keys Held)
  • Mass Credential Leaks
  • Sync Server Compromise
  • Network Snooping (Local Only)

Does Not Protect Against

Out of Scope
  • Malware on an Unlocked Device
  • Physical Access to Unlocked Device
  • Weak Master Passwords (User Responsibility)
  • Browser Extensions with Malicious Permissions

Who uses Passary?

Developers & power users

Need a password manager that doesn't hide the details behind "easy to use" features? Passary is transparent about every aspect of its security and gives you complete control over your data.

Security-conscious individuals

If you don't want your passwords living in a big central database, Passary gives you complete custody. Nobody can access your encrypted vault except you. No "just trust us."

Minimalists & privacy fans

No sign-up. No app, no reset email. A traceless password manager with a dead simple model: one file, one password, your device, your data.

What you get with Passary

Security Center

Complete visibility into encryption methods and protection mechanisms.

Advanced strength analysis

Analyze your passwords for strength, reuse, and weak credentials. Generate strong passwords.

Folders & tags

Organize logins by folders, favorites, tags. Quickly filter and search by flexible labeling and smart views.

Fast keyboard-driven UI

Quick search, keyboard shortcuts, and a minimal design so you can find what you need and get back to work.

Local backups & portability

Export your encrypted vault file at any time. Easily import from KeePass. Keep backups on multiple devices.

Dark, distraction-free design

A clean, dark interface that feels like a developer tool. No clutter, just your passwords.

Honest Filtration

Who is Passary NOT for?

We are building for a specific type of user. If you fall into these categories, we might not be the best fit.

01

Automatic Sync Lovers

If you need your passwords to magically appear on all devices instantly without effort, Passary is not for you. We prioritize isolation over seamless sync.

02

Account Recovery

If you forget your master password, your data is gone forever. We cannot help you recover it. If that scares you, please stick to cloud managers.

03

Convenience Seekers

Passary adds friction by design. You manage the file. You manage the backups. If you want "set and forget", this is not the tool for you.

Under the hood

Passary uses industry-standard cryptography you'd expect — not proprietary obscure algorithms. Below is a clear rundown of the technical guarantees you should expect:

Key derivation

Argon2id with bounded time cryptographic hash using a large salt and key derivation function. High cost makes brute-force attacks impractical.

Authenticated encryption

Vault content encrypted with AES-256-GCM to provide confidentiality and integrity — encryption fails if even one bit is tampered with.

Memory-only decryption

When you open a vault, keys only exist in memory and are never cached, making it relatively clean (nothing in cleartext stored in directories, no sneaky caching on refresh or close).

Zero-knowledge design

Passary never sees your master password or decrypted vault. Without the key yourself, the vault is and will remain mathematically irrecoverable.

If this doesn't hit your spec, including latest PII parameters and encryption modes, see the detailed security model page.

Read the full security model →

Military-grade password generation

Stop using "Password123". Passary's built-in generator creates cryptographically secure passwords that are mathematically impossible to guess.

  • Cryptographically secure randomness (Web Crypto API)
  • Diceware passphrases (correct-horse-battery-staple)
  • Base64-safe API keys & PIN mode
  • 210+ bit entropy capability
  • Clipboard auto-clear & memory safety
Try it now
c8k#9L$v2@n5mP!q
Very Strong~104 bits
The Manifesto

Built for a post-cloud future

The era of "just put it in the cloud" is ending. With increasing data breaches, vendor lock-in, and privacy erosion, the future belongs to Local-First Software.

Passary is more than a tool; it's a philosophy. Your data should be yours. It should live on your device, under your control, encrypted by keys only you hold.

We pledge to never sell your data
100%
Data Ownership
0%
Vendor Lock-in
Offline
By Default
Open
Architecture

Roadmap & transparency

Product direction and current trajectory

Shipped

  • Secure Argon2 & password-kdf core
  • Folder organization & advanced search
  • Local-first encrypted vault with experiments
  • KeePass Import & Export
  • Advanced Keyboard Shortcuts

Coming next

  • Browser Extension
  • Mobile Apps (iOS & Android)
  • Secure Sharing

Privacy Policy Summary

Passary is designed to know nothing about you. We have no accounts, no analytics tracking, no telemetry, and no access to your data.

Frequently Asked Questions

Is Passary really offline?

Yes. Passary runs legally in your browser but never sends your vault data to any server. Once the app loads, you can even disconnect your internet. Your vault file is stored in your browser's local storage or saved to your file system.

What happens if I lose my vault file?

If you lose your vault file (and have no backups), your data is lost. Passary does not have a copy. We strongly recommend keeping backups on a USB drive or your personal cloud storage.

Can I sync between devices?

Not automatically. To use Passary on another device, you must manually transfer your vault file (e.g., via USB, Airdrop, or a synced folder like Dropbox/iCloud).

How is this different from KeePass?

Passary is inspired by KeePass but built for the modern web. It requires no installation, runs on any device with a browser, and uses a modern, user-friendly interface.

Is it safe to use in a browser?

Yes. Passary uses the Web Crypto API, which provides native, high-performance cryptographic primitives (AES-GCM, Argon2id) isolated within the browser context. We also use strict Content Security Policies.