|
QtPass 1.6.0
Multi-platform GUI for pass, the standard unix password manager.
|
QtPass is a multi-platform GUI for pass, the standard Unix password manager, providing a secure and intuitive way to manage your passwords.
Available in 42 languages
Logo based on Heart-padlock by AnonMoos.
OpenSUSE & Fedora yum install qtpass dnf install qtpass
Debian, Ubuntu and derivates like Mint, Kali & Raspbian apt-get install qtpass
Arch Linux pacman -S qtpass
Gentoo emerge -atv qtpass
Sabayon equo install qtpass
FreeBSD pkg install qtpass
macOS brew install --cask qtpass
Windows choco install qtpass
Runtime dependencies:
Your GPG must be configured with a graphical pinentry when applicable. Same goes for Git authentication. On macOS, pinentry-mac from Homebrew works best (gpgtools also works).
On most Unix systems all you need is:
See Windows.md for Windows-specific installation and build instructions.
Profiles allow grouping passwords. Each profile might use a different Git repository and/or different gpg key. Each profile also can be associated with a GPG key to sign and verify the .gpg-id file for integrity. A typical use case is to separate personal and work passwords.
Hint
Instead of using different git repositories for the various profiles passwords could be synchronized with different branches from the same repository. Just clone the repository into the profile folders and checkout the related branch.
The following commands set up two profile folders:
Note:
Once the repositories and GnuPG-ID's have been defined the profiles can be set up in QtPass.
This is done with make check
Codecoverage can be done with make lcov, make gcov, make coveralls and/or make codecov.
Be sure to first run: make distclean && qmake6 CONFIG+=coverage qtpass.pro
Using this program will not magically keep your passwords secure against compromised computers even if you use it in combination with a smartcard.
It does protect future and changed passwords though against anyone with access to your password store only but not your keys. Used with a smartcard it also protects against anyone just monitoring/copying all files/keystrokes on that machine and such an attacker would only gain access to the passwords you actually use. Once you plug in your smartcard and enter your PIN (or due to CVE-2015-3298 even without your PIN) all your passwords available to the machine can be decrypted by it, if there is malicious software targeted specifically against it installed (or at least one that knows how to use a smartcard).
To get better protection when using a smartcard even against a targeted attack I can think of at least two options:
FAQ and CONTRIBUTING documentation. CHANGELOG
Official QtPass site Source code Issue queue
AI Assistance
Parts of this project were developed with assistance from AI tools (such as OpenCode). AI-generated code is reviewed and tested before inclusion.
This repository follows the REUSE Specification v3.2. Please see LICENSES/, REUSE.toml and the individual *.license files (if any) for copyright and license information.