A lot of password managers force you to create and remember a long and complex master password. Even if you use biometric data (e.g. fingerprint) you still need to write it down somewhere or actually memorize it for possible usage. Furthermore you are often allowed to create weak master passwords (which you might consider to better remember it).

With ANOTHERpass you can not create your own Master Password, it will be generated for you, so it is very strong. Instead of memorizing you export it as QR code or NFC tag (or still write it down once) and store it at a safe (analouge) place. So a so called Exported Master Password is comparable to a physical door key; if you own it you can access the room. To add an additional layer of security, you can protect the Exported Master Key by obfuscating/veiling them with a codeword of your choice (or a password, a short pin, whatever you want).

What you definitely need to memorize is a self created PIN. This PIN can be much easier and shorter (at least 6 characters, but please not 123456 or similar ;-)) and is your primary security factor. When login into the app you just need to remember this PIN and own the Exported Master Password (QR code or NFC tag) as second factor. (The codeword of a protected Exported Master Password would be the third factor.)

To make the app more convenient you can store the master password in the app (which is done encrypted of course!). If supported by your device the stored master password will be protected by your enrolled biometrics (e.g. fingerprint). So you just need the PIN to login and your finger. Here if you enter a wrong PIN X times (default is 3), the stored master password will be deleted from the device and you need the Exported Master Password directly to login the next time.

If you feel uncomfortable to carry the Exported Master Password as NFC tag or QR code and you don’t want to store it on your device you can carry instead a so called Master Password Token. This is not the real master password but a token to login to the app. Also here, after X times of wrong entered PIN, this token will become invalid and you need the Exported Master Password again. And if you loose it, just create a new token and the old becomes invalid and gets useless. Indeed it is recommend to use this Master Password Token for your daily login process (and keeping the Exported Master Password at a safe place). You can add it as NFC tag to your real-world keyring.

And if you fear somebody copies your Master Password Token without noticing it? Well, this might be a problem if you have the Master Password Token on a printed QR code. Then only your PIN protects the vault. So better you have it as copy-protected NFC token. Copies of that token are useless and are rejected by the app.

Password generation

Almost all other password managers have password generators but it is on you to use them. You can still create your own (weak) passwords there. ANOTHERpass has another approach. The app generates passwords for you. You may edit them manually, but remember, generated passwords are mostly more secure than human ones.

The problem with generated passwords is they are hard to read and to type. ANOTHERpass uses therefore so called Pseudo Phrases which are more readable and sound like real words. To increase readability they are displayed as 4 character long words. See an example here which represents the password “Qicayripevomnewafahe” with 20 characters:

missing image

To guess this password you need to try over 3×10²⁴ ( combinations! This is more than a random 16 character password containing just lower case letters.

To ensure a hard to crack password this kind is longer then usual generated passwords. In fact the longer a password the un-crackable it is. Better longer than mixed upper case and digits and special chars but short. This is what ANOTHERpass does. Pseudo Phrase passwords have a length of 4 words á 4 characters (16 characters totally) or more! Of course you can also generate ordinary random passwords (which are a bit shorter). And you can always specify to add digits and special characters as well, because this is often required. It is recommend to use Pseudo Phrases with a length of 20 characters (5 words) to be prepped against the raising power of super computers.

Password obfuscation

You can decide to protect some passwords in your vault by obfuscating/veiling them. Hopefully never but if somebody forces you to reveal your PIN and Master Password (e.g. by torture or blackmail) all credentials are exposed to them. To protect these super important passwords you can obfuscate them by setting another codeword or password only for this credential password. Now the credential password is obfuscated by the other codeword, which means it is still readable and appears as a real password but only with the correct codeword it can be unveiled to the real one. In other words, all possible codewords would let the credential password appear real but only you know the real codeword and therefore the real password. Note that only common letters, digits and some common special chars (!?-,.:/$%&@#) can be obfuscated. If you use other chars (e.g. German umlauts) they will remain unobfuscated.

Example: Your real (pseudo-phrase generated) password is “odmi ubew negy cire”. By obfuscating them with the codeword “MAGIC” it will appear “epcy ygoj hicu laka”. Any other codeword than “MAGIC” will show different passwords than your origin one.

Usage of passwords

ANOTHERpass supports the Android Autofill feature to easily choose a credential to autofill into login forms. Besides Autofill you can also display a certain password as Overlay Window over other apps. This is helpful if you want to type a password from ANOTHERpass into a different app by hand. Instead of switching between ANOTHERpass and the other app you can show the password in an overlay window as long as you need it. After that you just close the overlay window and the entire app by dragging and dropping it on the top edge.

missing image

Insecure clipboard usage

Many password managers allow copying passwords to the clipboard. This is dangerous because any other app on the phone can silently observe the clipboard and send its content away. This has actually been fixed with Android 10, so it is not possible to read the clipboard from background processes. But still, an active app could read it without your notice. Another problem are custom clipboards and history functions, which could also reveal your copied password. With ANOTHERpass you cannot copy passwords to the clipboard by default, but you can enable that feature in the settings if needed.

Sync to a cloud

A lot of password managers sync the data to their servers in the “cloud”. You don’t really have control over that data, even if it is end-to-end encrypted. ANOTHERpass works offline, but therefore you are self-responsible to sync or backup your data. There is a function to export the vault (all your data) to a file. You are self-responsible to transfer this file in a secure way to your wished destinations. You can of course import this file into any ANOTHERpass app. If the other app uses the same vault (same VaultId), you can directly import into that vault. Otherwise you can only import into a fresh blank app.

The vault backup file contains all your data of course encrypted by your PIN and master password. To make this vault file more secure, you can export it WITHOUT the Encrypted Master Key, which contains the master key to en- and decrypt your data. This key is encrypted with the above mentioned PIN and master password. The Encrypted Master Key can be exported as QR code or NFC tag and can be shared and stored separated from the vault file. If you want to restore from a vault file not containing this key, you will additionally need the Encrypted Master Key during the import flow.

Sync and share single credentials

ANOTHERpass provides options to export single credentials as NFC tag or QR code. You can choose to export it decrypted to share with other ANOTHERpass users or vaults. Or you export it encrypted to backup single credentials or to “outsource” them. That means you export it first and delete it afterwards from your vault. If you want to read or import it back, you just scan it within your vault. Since the credential is still encrypted with your Master Key, nobody else than you can decrypt it.

You can also import credentials from other sources like browsers from a CSV-file. Vice versa, you can also export all credentials of your vault decrypted(!!!) as CSV-file to use them in other applications, e.g. other password managers.

Autofill support

ANOTHERpass supports Android Autofill introduced since Android 8. You have to choose ANOTHERpass as Autofill service in the Android settings (“Autofill services”). The app provides two strategies to detect fields to autofill, one more and one less strict. If you encounter fields that are not detected for autofill, you could go to “Settings” / “Autofill” and enable “Autofill suggestion everywhere”.


All your credentials in your vault can be tagged with labels to categorize them. Labels are always UPPERCASE and unique. You can give labels different colors to distinguish them. You can also filter by them.

To effectively search and find certain credentials in the vault you can use the search function by clicking on the search icon and start typing. This search considers only the name of the credentials.

There is also an extended search available since version 1.8.0. By start typing with “!” you will see some command suggestions to search directly by specific fields of an credential, e.g. search by username or search all veiled/obfuscated credentials. Or just search in all fields. To mark the end of a search string you can use the semicolon (";"). E.g. to search the credentials with username “johndoe” you can type “!user:johndoe;”.

Expiring credentials

With version 1.8.0 an option to define an expiry date for a credential has been added. With that defined, you will retrieve a native notification once the expiry day has reached. All expired credentials are also tagged with an “Expired”-label. You can also search for these credentials with the Extended Search ("!expired").

Self destruction

If you like you can activate Self Destruction Mode to delete the complete vault after X failed login attempts. This makes the app more secure even if you loose your device and somebody tries to login.

Automatic logout

When you login into your vault you can read (and change) all containing credentials. If you are done you should lock the app or logout from your vault. That ensures that subsequent (unauthorized) usage of the app requires to login again. Also after x minutes of inactivity the app locks itself to prevent unauthorized access. This can be configured in the Settings among other things.

Download the app

Frequently asked questions