A local-first password manager with secure desktop sync. No accounts, end-to-end encrypted backups.
Get 2FAS Password Manager


Source-available code ensures that every security feature we use can be verified by independent security experts.

100% anonymous use. Download the app and start using it without any registration.
2FAS Pass will be Source-available for two years after its release. After that, it will become fully Open-source and available to all to ensure full transparency.
You decide where to store your Items. You can store it in your own cloud or keep it as an encrypted file on an external drive.

All your Items are encrypted locally with Secret Words that only you know.
2FAS Pass supports 3 Security Tiers for protecting your Items.
2FAS Pass does not collect your emails, names, IPs or other personal identifiers.
Only you have access to your Items.
Download our White PaperYou have full control over the security at every stage.
Learn more about 2FAS Pass browser extension
All communication between your mobile device and your browser is always end-to-end encrypted.
Browser extension substantially speeds up the sign-in process while maintaining the security and privacy of your Items.
All your Items are stored and encrypted in the browser and are decrypted only upon the user's request, with possible additional authentication for Highly Secret Items.
Items assigned to the Secret Tier are stored securely on your mobile device. They are available in Autofill and the 2FAS Pass Browser Extension whenever you need them.
Items assigned to the Highly Secret Tier provide a higher security standard and require additional confirmation. Access through the Browser Extension or using Autofill must be confirmed in 2FAS Pass.
Items assigned to the Top Secret Tier are isolated and cannot be used with Autofill or 2FAS Pass Browser Extension. They must be entered manually.


Enjoy perfect integration with your device's operating system. 2FAS Pass is designed to align with the native user experience and security standards of iOS and Android.





Your data is stored on third-party servers. If their service goes down, you risk losing access to everything.
You decide where to store your Items. You can store it in your own cloud or keep it as an encrypted file on an external drive.
Cloud-based solutions may require you to create an account and collect metadata such as email addresses, IP logs, and device fingerprints.
It's not a matter of trust. You store everything where you choose, and you don't need the Internet to access your Items.
Storing the data of all customers makes it an attractive target for bad actors. A breach can expose vast amounts of data and user vaults.
Bad actors can't breach users' security data as there is no single point of attack, and every user stores their data privately.