⚠️ Important note first

Don't let AI generate your passwords

If you ask ChatGPT, Claude or Gemini to generate a secure password, you get something that looks secure — but isn't. This isn't a matter of opinion; it's a technical problem: AI language models cannot produce genuine randomness.

They are trained to predict the most probable next character — the exact opposite of what a secure password requires. Security researchers at Irregular Security tested this systematically in February 2026:

27 Bit
Actual entropy of AI-generated passwords — instead of ~98 bits for cryptographically secure ones
18×
One AI model repeated the same password 18 times in 50 attempts

The practical difference: instead of billions of years, a standard computer needs only hours or minutes to crack an AI-generated password — even though it looks complex at first glance. More on this at heise online (February 2026) and SwissCybersecurity.net.

What actually works: Password managers with a built-in generator. These use so-called CSPRNGsCSPRNGCryptographically Secure Pseudo-Random Number Generator — produces characters with no detectable pattern that attackers could exploit., which deliver genuine randomness. That is exactly what this article is about.

Contents

The Problem with Passwords

Anyone who uses the internet regularly today has an average of more than 50 password-protected accounts — that was the finding of a survey by the Verbraucherzentrale NRW among 1,203 participants conducted between August and September 2025. Email, banking, streaming, shopping, social networks, government portals — everywhere requires separate login credentials.

The theoretical security ideal is well known: a unique, long, random password for every service. In practice, this runs into one simple barrier: human memory.

57 %
of German internet users reuse the same passwords across different services
Statista / YouGov, March 2024
48 %
of respondents have more than 50 password-protected online accounts
Verbraucherzentrale NRW, Sep. 2025
#1
Most leaked password in Germany in 2025: "123456"
Hasso Plattner Institute, Jan. 2026

The risk is concrete: anyone who uses the same password for multiple services hands attackers access to everything after a single successful breach. This technique is called Credential StuffingCredential StuffingAn attack in which stolen login credentials (email + password) are automatically tried at thousands of other services — because many people use the same password everywhere. and is, according to HPI security expert Prof. Christian Dörr, one of the most common attack vectors of all: "Once a service has been hacked and the credentials are out in the open — which has happened billions of times — criminals try those stolen credentials everywhere."

⚠ Why weak passwords are so dangerous

The BSI identifies compromised, weak and reused passwords as one of the most common entry points in cyber attacks. The problem is not malice — it is simple convenience. Anyone expected to remember 50 different strong passwords will eventually fall back on "123456".

What is a Password Manager?

A password manager is a programme that stores and manages all your login credentials in one encrypted location. Instead of 50 different passwords, you only need to remember one: the master passwordMaster PasswordThe only password you need to remember. It decrypts the entire database. If it is lost, all stored credentials may become inaccessible in the worst case..

The manager then takes care of everything else: it generates a unique, random password for every new account — long, complex, with no pattern. When you log in to a website, it fills in the fields automatically.

💡 What a password manager actually does

Store: All login credentials (username, password, website) are saved in an encrypted database.

Generate: When creating a new account, the manager suggests a secure random password — you don't need to think one up yourself.

Fill in: On known websites, the manager recognises the login fields and fills them in automatically.

Warn: Many managers compare your passwords against known data breaches and alert you if one has been compromised.

More than passwords: Most managers can also store credit cards, debit cards, IBANs, ID numbers, insurance numbers and other sensitive data in encrypted form — and fill them in automatically during online purchases. Everything in one place, with the same strong protection.

How Does it Work Technically?

The technology behind it is not difficult to understand, even without an IT degree. The core principle: your passwords are transformed into unreadable data using a strong encryption method — and can only be made readable again with the correct master password.

How a login with a password manager works
You
Master Password
enter
decrypts
Password Manager
AES-256 Vault
all credentials
fills in automatically
Website
Login Fields
filled automatically

AES-256 — the industry standard

Good password managers encrypt the entire database with AES-256AES-256Advanced Encryption Standard with a 256-bit key. Considered practically unbreakable with current hardware. Also used by governments and militaries for classified data.. This is the same standard used by governments and military agencies for their classified data. Without the master password, the encrypted database is worthless data — even to the provider themselves.

Zero-Knowledge — the provider knows nothing

Reputable password managers operate on the so-called zero-knowledge principleZero-KnowledgeThe provider stores your data but cannot read it — because encryption takes place on your device before any data reaches the server. Even in the event of a server breach, attackers only obtain encrypted data packets.: encryption takes place on your device — before any data reaches the server. The provider only sees an unreadable block of data. However, this is not the case with all managers — the comparison article looks at this in concrete detail.

The password generator — genuine randomness, not AI

Password managers use so-called CSPRNGsCSPRNGCryptographically Secure Pseudo-Random Number Generator — delivers random numbers that are unpredictable to attackers. The foundation of every secure password generator. for password generation — cryptographically secure random number generators. The result: passwords with no pattern, no repetitions, no recognisable structure. The exact opposite of what AI language models produce.

Local, Cloud or Browser — Three Types

Not all password managers work the same way. There are three basic variants, which differ in convenience and security profile:

💻
Local
The password database lives only on your device. No server, no cloud, no data transmission. Examples: KeePassXC (PC/Mac), KeePass2Android.
✓ Maximum control, no dependency on a provider
✓ Most privacy-friendly option per BSI/VZ test 2025
✗ No automatic sync between devices
✗ Backups are your own responsibility
☁️
Cloud-based
The encrypted database is stored on the provider's servers and synchronised between devices. Examples: Bitwarden, 1Password, Proton Pass.
✓ Access from any device, automatic sync
✓ Backups handled by the provider
✗ Trust in the provider required
✗ Server location and data protection law to consider
🌐
Browser-integrated
Built into the browser, no extra programme needed. Examples: Chrome Password Manager, Firefox Password Manager.
✓ No effort required, immediately available
✓ Well suited for beginners
✗ More vulnerable to malware per BSI
✗ Weaker encryption with some providers
📋 BSI recommendation on browser managers

The BSI explicitly points out that browsers are complex programmes for which password management is not the top priority. Stored passwords can therefore be read more easily by malware than with a dedicated password manager. Anyone who still uses the browser should set a strong master password and always keep the browser up to date.

More Than Passwords — Cards & Documents

A password manager is not just a password tool. It is an encrypted digital vault — and much more than login data fits inside. Many people don't realise they can also securely store their credit cards, debit cards, IBANs or ID details there.

💳 What else can be stored in the vault

Credit cards & debit cards: Card number, expiry date, CVV, PIN — stored in encrypted form. Many managers fill in the data automatically during online purchases.

Banking: IBAN, BIC, account numbers — handy when you need them quickly without reaching for your wallet.

Identity documents: Passport and national ID numbers, expiry dates — useful for online forms or travel bookings.

Insurance: Health insurance and policy numbers — instead of searching through your email archive.

Other: Wi-Fi passwords, software licences, tax ID numbers, security question answers, membership numbers.

The advantage over scraps of paper, photos in your camera roll or unencrypted notes: in a password manager, this data is protected with AES-256 — the same standard used by banks and government agencies. Anyone who keeps their card details in the vault no longer needs to type them out or photograph them. How this works in practice in KeePassXC, Proton Pass and 1Password is shown in article 3.

Common Questions & Misconceptions

False
"If the password manager gets hacked, all my passwords are gone."
With reputable managers using zero-knowledge architecture, only encrypted data sits on the server. Without your master password, it is worthless to attackers. The LastPass breach of 2022 illustrates this: the attackers obtained encrypted data packets — they couldn't access the actual passwords as long as the master passwords were strong enough.
False
"I don't trust any software with all my passwords."
That's understandable — but the alternative is usually worse: the same password everywhere, a notebook, or an unencrypted spreadsheet. Anyone who won't trust a tool with their passwords is in effect trusting their memory or a scrap of paper. Local managers like KeePassXC solve the problem: no cloud, no servers, no provider you have to trust blindly.
Partly true
"Password managers are complicated to set up."
Cloud-based managers like Bitwarden or Proton Pass are ready in a few minutes — install the app, create an account, set a master password, done. Local managers like KeePassXC require a bit more setup, but offer maximum control in return. They are certainly no more complicated than setting up a new smartphone.
False
"Good password managers always cost money."
KeePassXC is free and open-source. Bitwarden has a fully-featured free version. So does Proton Pass. The comparison article looks concretely at which features are available for free and where paid versions actually make a difference.

What the BSI Recommends

The Federal Office for Information Security (BSI) explicitly recommends the use of password managers. On its website, the BSI states: "Yes, as a rule using a password manager is worthwhile. It is in any case better than repeatedly using common passwords."

In the first half of 2025, the BSI, together with the Verbraucherzentrale NRW and the FZI Research Centre for Information Technology, examined ten password managers. The results are available as a joint publication on the BSI website. Despite shortcomings with individual providers, the overall recommendation remains clear: use a password manager — and pay attention to security and data protection. What that means in practice is shown in the comparison article.

✓ BSI minimum recommendations for use

Strong master password: At least 20 characters, ideally a passphrase made up of several random words. The master password is the only one you really need to remember.

Enable two-factor authentication: Additional protection for the manager account itself — in case the master password is compromised.

Regular backups: For local managers: save the database in multiple locations. For cloud managers: keep an emergency export of your passwords.

Keep the manager up to date: Updates close security vulnerabilities. This applies especially to browser managers.


📌 Editorial Assessment — thx4data.de

A password manager is not a luxury solution for tech enthusiasts — it is the only realistic answer to the problem we all have: too many accounts, too little memory. Anyone who can remember 50 strong, unique passwords doesn't need one. Everyone else does.

The question is not whether, but which one. For maximum control with no cloud subscription: KeePassXC — free, open-source, local, rated as one of the most privacy-friendly options in the BSI/VZ test 2025. For sync between devices: Bitwarden — open-source, free to use, zero-knowledge. Neither requires a monthly fee.

What we strongly advise against: using AI to generate passwords — for the technical reasons outlined above. And: saving passwords in the browser without a master password — that is the kind of convenience that costs you security.

Which manager suits you?
In the comparison article, we go through all 10 managers tested by the BSI in detail — with ratings for encryption, privacy, price and everyday usability.
To the comparison →
Sources
01
Irregular Security — "Vibe Password Generation"
Systematic test of AI-generated passwords: ~27 bits of entropy instead of the required ~98 bits, 18-fold repetition of identical passwords
irregular.com/blog/vibe-password-generation
02
heise online — "Passwords created with ChatGPT are not secure"
German-language analysis of the Irregular Security test (February 2026)
heise.de/news/Mit-ChatGPT-erstellte-Passwoerter-sind-nicht-sicher
03
HPI — Most leaked passwords 2025
"123456" remains the most common password in Germany; credential stuffing as the most common attack vector (Prof. Christian Dörr)
hpi.de/artikel/hpi-veroeffentlcht-meist-geleakte-passwoerter-2025/
04
Verbraucherzentrale NRW — 10 password managers compared
Survey of 1,203 participants (Aug.–Sep. 2025): on average more than 50 password-protected accounts per person
verbraucherzentrale.nrw/wissen/digitale-welt/apps-und-software/10-passwortmanager-im-vergleich
05
BSI — Recommendations on password managers
Official BSI page with recommendations for using password managers and notes on browser managers
bsi.bund.de · Password Managers
06
BSI/VZ NRW/FZI — Password manager test H1 2025
Joint test report by BSI, Verbraucherzentrale NRW and FZI on 10 password managers — security, privacy, usability
bsi.bund.de · Password Manager Security & Privacy