[1] Additionally, there are several unofficial ports for Windows Phone, Android, iOS, and BlackBerry devices, which normally work with the same copied or shared (remote) password database.
By default, the KeePass database is stored on a local file system (as opposed to cloud storage).
[10] It has a password generator and synchronization function, supports two-factor authentication, and has a Secure Desktop mode.
[11] A 2017 Consumer Reports article described KeePass as one of the four most widely used password managers (alongside 1Password, Dashlane and LastPass), being "popular among tech enthusiasts" and offering the same level of security as non-free competitors.
[13] In addition, several GitHub projects (KeeFarce, KeeThief, Lazanga) specifically attack a running KeePass to steal all data when the host is compromised.
"[14] The password list is saved by default as a .kdbx file, but it can be exported to .txt, HTML, XML and CSV.
When KeePass is running in the background (with an unlocked database) and user presses down the hotkey, it looks up the selected (or correct) entry and enters every login and/or password characters sequence.
[19] All fields, such as title, username, password, URL, and notes, can be drag and dropped into other windows.
KeePass may be configured to randomize characters' input sequence to make it harder to log keystrokes.
On previous Windows systems, KeePass falls back to using the ARC4 cipher with a temporary, random session key.
[28] KeePass at one time had a paste-once functionality, where after a single paste operation, the clipboard would be cleared automatically, but this was removed in version 2.x due to incompatibility and insufficient effectiveness.