Ranked in these QuestionsQuestion Ranking
Pro Single tap login to websites and other apps on mobile version
PasswordBox remembers login credentials and syncs them over devices for one stroke login every website on every device. PasswordBox also remembers login information for apps.
Pro Automatically logs in
Pro Guides new users with video tutorials and a setup task list
PasswordBox guides users so setup can be fast and painless.
Pro A system for transferring password ownership after death
PasswordBox lets users assign a "digital heir" who will be able to receive stored credentials with proof of death.
Pro Automatically captures login information
PasswordBox will automatically add passwords to its database when logging in a site.
Pro Offers automatically generated passwords
PasswordBox can generate complex passwords for maximum protection. Fortunately, these passwords never have to be memorized because of PasswordBox's auto-login.
Pro Allows sharing passwords with other PasswordBox users
Password box allows users to share login credentials to trusted friends or family. PasswordBox never actually displays the username or password to the recipient, and access can be revoked at any time.
Con No Linux version
This plugin/app is not available on Linux.
Con No way to organize entries
There is no way to customize how information is categorized.
Con Performs no security audit on stored passwords
Con Can't import browser passwords
If a browser already has password data, that information cannot be migrated to PasswordBox.
Con Remembers incorrect login attempts
PasswordBox automatically remembers login information for new sites, so if the first login attempt fails, the credentials must be changed manually.
Con Mobile version requires that internet browsing is done through the PasswordBox app
PasswordBox is not compatible with any mobile browser.
Con No BlackBerry or Windows Phone version
PasswordBox is only compatible with iOS and Android mobile devices.
Con No Web form filling
PasswordBox only fills in username and password information, not other things like address or email.
Con No two-factor authentication
There is only one line of authentication, which is a password. If the master password is compromised, all of the other ones are compromised as well.