A modern, cross-platform GUI for pass.
Get Started GitHub IJHack/QtPass
QtPass is part of the pass ecosystem - the standard UNIX password manager. Your passwords are encrypted with GPG and can be synced across all your devices using Git.
Unlike many password managers, QtPass isn't tied to one platform or cloud service. Use it alongside other pass-compatible clients on mobile, CLI, or browser.
Supports smartcards and YubiKeys for extra security - your private keys never leave the device.
New to QtPass? Follow the getting started guide.
pacman -S qtpass
yum install qtpass
dnf install qtpass
apt-get install qtpass
emerge -atv qtpass
pkg install qtpass
cd /usr/ports/sysutils/qtpass/ && make install clean
Latest stable on the releases page, latest build via AppVeyor.
Via Chocolateychoco install qtpass
Latest stable on the releases page.
Via Homebrewbrew install qtpass --cask
Build on Linux/BSD:
qmake && make && make install
Build on macOS:
brew install qt
qmake && make && macdeployqt QtPass.app
QtPass uses GPG encryption - your passwords are never stored in plain text. Using a smartcard or YubiKey keeps your private keys secure even if your computer is compromised.
Your password store syncs via Git, so you control where it's hosted and always have a backup. Per-folder encryption lets you share passwords securely with family or team members.
For detailed security analysis, see the whitepaper.
QtPass is open source. Contributions are welcome!
All passwords generated with QtPass' built-in password generator prior to 1.2.1 are possibly predictable and enumerable by hackers.
The generator used libc's random(), seeded with srand(msecs), where msecs is not the
msecs since 1970 (not that that'd be secure anyway), but rather the
msecs since the last second. This means there are only 1000 different
sequences of generated passwords.
Read more about this issue on Github.
Please note that this is an issue with the QtPass GUI and not in pass or the greater password-store ecosystem.
We advice to update to 1.2.1 or later as soon as possible and change any password you may have generated with the QtPass' password generator.
~/.gnupg/gpg-agent.conf containing:enable-ssh-support
write-env-file
use-standard-socket
default-cache-ttl 600
max-cache-ttl 7200
See the pass FAQ for more troubleshooting tips.