Password Manager vs Encrypted Notes
When should you use a password manager and when does a zero-knowledge encrypted note app make more sense? A technical comparison without fluff.
What problem are you trying to solve?
“Should I use a password manager or an encrypted note app?” is the wrong first question. The right one is: what kind of secret are you trying to protect and how do you need to use it?
Broadly:
- Password managers are built to store many small, structured secrets (credentials, TOTP seeds), integrate with browsers, and auto-fill.
- Zero-knowledge encrypted note apps are built to store free-form, unstructured data (incident notes, API walkthroughs, onboarding docs, runbooks) with strong client-side encryption and minimal identity.
If you try to make a password manager behave like a note-taking system, you get painful editing and sharing. If you use an encrypted note app as your only password store, you lose auto-fill, per-site metadata, and sane credential hygiene.
The rest of this article assumes a modern, zero-knowledge encrypted note app that uses PBKDF2 (310k iterations), AES-256-GCM, and the Web Crypto API in the browser—like Inkrypt does.
How password managers handle encryption
A typical modern password manager:
- Derives a key from your master password using a KDF (PBKDF2, scrypt, Argon2).
- Encrypts a vault of entries with a symmetric cipher (commonly AES-256).
- Syncs the encrypted vault across devices, often via the vendor’s infrastructure.
- Decrypts locally when you unlock, then integrates with the browser or OS to auto-fill.
Security properties you get:
- Strong at-scale credential storage: thousands of small entries with consistent crypto.
- Per-entry metadata: URLs, tags, last-changed timestamps, and sometimes audit history.
- Multiple devices: same vault available on desktop, mobile, and browser.
Risk profile:
- The vault is high value—if someone gets the vault file and can guess or brute-force your master password, they get everything.
- You trust a specific vendor for:
- Crypto correctness and implementation.
- Handling updates and sync logic.
- Not weakening the design to support “convenience” features.
For passwords and small secrets, a good password manager is the right baseline. It is not, however, a pleasant or flexible way to write, share, and expire larger chunks of text.
How zero-knowledge encrypted notes handle encryption
A zero-knowledge encrypted note app like Inkrypt typically works note-by-note instead of vault-wide:
- You pick a note URL and a password—no account.
- In the browser, the app derives a key from the password using PBKDF2 with 310k iterations.
- Content is encrypted with AES-256-GCM using a fresh random IV per save via the Web Crypto API.
- The server stores only ciphertext, salt, IV, and minimal metadata.
- Decryption always happens in the browser; the server never sees your password or key.
Instead of one global vault, you get many independent encrypted documents. Compromise of one note password does not give access to the rest.
Trade-offs:
- No central “account” means:
- No password reset.
- No server-side search across notes.
- No automatic device sync tied to an identity.
- In return, you get:
- A very small trust surface.
- Isolated blast radius per note.
- Minimal data about you on the server side.
For design docs, incident write-ups, snippets of sensitive context, and self-destructing messages, this model is often more appropriate than shoehorning everything into a password vault.
When a password manager is the right tool
Use a password manager when:
- Primary content is credentials: website logins, database passwords, SSH keys, TOTP seeds.
- You need automation:
- Auto-fill in browsers.
- Password generation per site.
- Breach monitoring and rotation helpers.
- You manage many accounts and must avoid password reuse.
- You have multiple devices and need the same set of credentials everywhere.
Examples:
- Storing and rotating credentials for hundreds of SaaS tools.
- Sharing internal service passwords with a small team using access policies.
- Keeping TOTP seeds and backup codes in one encrypted place.
What not to do:
- Don’t paste large operational docs or long-form incident reports into password manager “secure notes” and expect a good editing or collaboration experience.
- Don’t assume password manager “notes” are designed for fine-grained view limits or self-destructing behavior.
For credentials, the answer is simple: a mature password manager wins on usability, and with correct crypto, it’s the right default.
When an encrypted note app is the better fit
Use a zero-knowledge encrypted note app when:
- Content is text-first:
- Incident timelines.
- Sensitive customer communication.
- Internal procedures and runbooks.
- You want ad hoc sharing without onboarding someone into your password manager.
- You need expiry or view limits (for example, one-off secrets or temporary instructions).
- You don’t want to expose:
- All your other passwords.
- Your whole account graph.
- Detailed metadata about every site you use.
Examples:
- You need to send a short operational guide or credential usage note to an external partner.
- You want a zero-knowledge “scratchpad” for security-sensitive brainstorming.
- You’re documenting an incident and want everything encrypted client-side with no long-lived account.
Design-wise, a tool like Inkrypt:
- Uses PBKDF2 with 310k iterations for key derivation.
- Encrypts content with AES-256-GCM via the Web Crypto API, with a random IV each save.
- Stores only ciphertext and public parameters (salt, IV, metadata).
- Does not implement password reset or recovery, because it never sees your key.
That gives you a very strong default for storing and sharing sensitive text without turning it into a quasi-identity provider.
Can an encrypted note app replace a password manager?
Technically, you can put passwords into any encrypted blob and call it a day. Practically, that’s a bad idea for most people:
- You lose per-site structure: URLs, usernames, last-rotated timestamps.
- You lose browser integration: no auto-fill, no password generation API, no leak alerts.
- You risk building your own fragile workflows: copying from notes, forgetting to rotate, duplicating secrets across documents.
However, there are valid niche cases:
- High-threat models where you don’t want a single global vault containing every credential.
- One-off secrets that should not live inside a long-lived vault (for example, temporary access tokens or emergency-only passwords).
In those scenarios, pairing a password manager for day-to-day credentials with a zero-knowledge encrypted note app for ephemeral, contextual, or highly sensitive text is often the more robust pattern.
For Inkrypt specifically, we don’t position it as “yet another password manager.” We explicitly target:
- Zero-knowledge notes.
- Client-side encryption in the browser.
- Strong KDF (PBKDF2, 310k iterations) and AES-256-GCM.
- Simple, URL + password-based access without accounts.
How Inkrypt fits alongside your password manager
The sane design is “and”, not “or”:
- Keep your password manager for:
- Site and app credentials.
- SSH keys and API keys.
- TOTP seeds and backup codes.
- Use Inkrypt for:
- Text-heavy, sensitive content.
- Expiring or view-limited notes.
- Zero-knowledge sharing with people who don’t use your password manager.
Under the hood, Inkrypt:
- Encrypts in your browser using the Web Crypto API.
- Derives keys from passwords with PBKDF2 (310k iterations).
- Uses AES-256-GCM with random IVs per save.
- Stores only ciphertext and public parameters, never your password or key.
If you want to see the architecture in more detail, read:
- “Zero-knowledge encryption: what it actually means when we can't see your data”
- “Why we encrypt in the browser (and what happens to your password)”
You can try Inkrypt itself at https://www.inkrypt.online—a zero-knowledge encrypted notepad that complements, not replaces, your password manager.
FAQ: Password manager vs encrypted notes
Q1. Do I still need a password manager if I use an encrypted note app?
Yes. A password manager is still the right tool for most credentials because it gives you structure, auto-fill, and rotation workflows. A zero-knowledge encrypted note app is a better fit for free-form sensitive text, expiring notes, and one-off secrets.
Q2. Is an encrypted note app as secure as a password manager?
If it uses client-side encryption with AES-256-GCM and a strong KDF like PBKDF2 with 310k iterations via the Web Crypto API, the core crypto can be comparable. The difference is what you store and how you use it: password managers are optimized for credentials, encrypted notes for unstructured content and simple sharing.
Q3. Can I store all my passwords inside an encrypted note instead of a manager?
You can, but you probably shouldn’t. You lose auto-fill, per-site metadata, leak checks, and sane rotation support. A better pattern is to keep passwords in a manager and use encrypted notes for the surrounding sensitive context.
Q4. When should I prefer an encrypted note over a password manager “secure note” feature?
Prefer a dedicated zero-knowledge encrypted note when you need stronger isolation between documents, simple URL + password sharing, and features like expiry or view limits. Password manager “notes” are usually secondary features, not first-class, zero-knowledge collaboration tools.
Q5. How does Inkrypt handle encryption compared to password managers?
Inkrypt encrypts entirely in your browser using the Web Crypto API, derives keys with PBKDF2 (310k iterations), and uses AES-256-GCM with random IVs per save. We never see your password or key, and we don’t implement recovery. That’s closer to a pure zero-knowledge note architecture than a traditional account-based vault.
Where to go next
If you want to understand the zero-knowledge side in more depth:
- Read “Zero-knowledge encryption: what it actually means when we can't see your data”.
- Read “Why we encrypt in the browser (and what happens to your password)”.
Then try combining a solid password manager with Inkrypt at https://www.inkrypt.online. Use the manager for credentials and Inkrypt for the sensitive text and expiring notes that don’t belong in a long-lived vault.