LastPass is one of the most recognized names in password management. With over 30 million users and a decade-long track record, it became the default recommendation for anyone looking to secure their passwords. But that reputation took a serious hit in 2022 and 2023 when a series of security incidents exposed fundamental weaknesses in its architecture.
UnveilPass is a newer entrant built from the ground up with zero-knowledge encryption and modern cryptographic primitives. In this article, we compare both products honestly — covering architecture, encryption, features and trust — so you can make an informed decision about where to store your most sensitive data.
Understanding what went wrong at LastPass is important context for this comparison. These are well-documented facts, not speculation.
August 2022 — Source code stolen. An attacker compromised a LastPass developer's machine and gained access to the company's development environment. Source code and proprietary technical information were exfiltrated. LastPass initially described this as a limited incident with no access to customer data.
December 2022 — Encrypted vault data stolen. Using information obtained in the August breach, the attacker accessed a cloud storage environment containing backups of customer vault data. This included encrypted vault entries but also unencrypted metadata: website URLs, company names and email addresses. The attacker obtained a copy of the entire vault database.
2023 — Crypto theft linked to stolen vaults. Security researchers and blockchain analysts linked a series of cryptocurrency thefts — totaling tens of millions of dollars — to the stolen LastPass vault data. Victims had stored their crypto seed phrases in LastPass. The attackers apparently cracked master passwords of users with weaker passwords or older accounts that used low PBKDF2 iteration counts.
These events are not ancient history. They represent one of the most significant breaches in password manager history and raised fundamental questions about LastPass's architecture decisions.
Both UnveilPass and LastPass describe themselves as zero-knowledge password managers, meaning the server never has access to your plaintext passwords. But the implementations differ in important ways.
LastPass: Encrypts vault entries (usernames and passwords) client-side with AES-256-CBC. However, metadata such as website URLs were stored unencrypted in the vault structure. This was confirmed during the 2022 breach. Email addresses are also stored in plaintext on LastPass servers.
UnveilPass: Encrypts all vault entry data client-side with AES-256-GCM, including URLs and all metadata. Additionally, user email addresses are encrypted at rest using AES-256-GCM with a SHA-256 hash maintained separately for lookups. If the UnveilPass database were stolen, an attacker would see only ciphertext — no URLs, no email addresses, no metadata.
The key derivation function (KDF) is arguably the most important cryptographic choice in a password manager. It determines how hard it is for an attacker to crack your master password if they obtain your encrypted vault.
LastPass uses PBKDF2-SHA256. For many years, LastPass defaulted to just 5,000 iterations — far below security recommendations even at the time. They eventually increased the default to 100,100 iterations and later to 600,000. However, existing accounts were not automatically upgraded, meaning many users were still protected by dangerously low iteration counts when the breach occurred.
UnveilPass uses Argon2id. Argon2id is the winner of the Password Hashing Competition (2015) and is specifically designed to resist modern attack hardware. Unlike PBKDF2, which only requires CPU time, Argon2id is memory-hard — it requires 64 MB of RAM per hash computation. This makes it extremely expensive to attack with GPUs or ASICs, which have limited memory per core.
| Property | PBKDF2 (LastPass) | Argon2id (UnveilPass) |
|---|---|---|
| Algorithm type | CPU-bound (iterative hashing) | Memory-hard + CPU-bound |
| GPU resistance | Low — GPUs excel at SHA-256 | High — 64 MB per attempt |
| ASIC resistance | Low | High |
| Memory requirement | Negligible | 64 MB per computation |
| Parallelism control | No | Yes (4 lanes) |
| Industry recommendation | Legacy (NIST SP 800-132) | Current (OWASP, ANSSI) |
UnveilPass also uses HKDF-SHA256 for key separation, deriving the Key Encryption Key (KEK) from the Argon2id output with a dedicated info string. This ensures the authentication key sent to the server is cryptographically independent from the encryption key — even if the server is compromised, the encryption key cannot be derived from the authentication key.
| Feature | UnveilPass | LastPass |
|---|---|---|
| Zero-knowledge encryption | Yes — all data encrypted | Yes — but URLs were unencrypted |
| Email encryption at rest | Yes (AES-256-GCM) | No |
| Key derivation | Argon2id (memory-hard) | PBKDF2-SHA256 |
| Vault encryption | AES-256-GCM | AES-256-CBC |
| Built-in TOTP authenticator | Yes (included free) | Premium only |
| Secure Notes | Yes | Yes |
| Identity storage | 6 types (Address, Bank, Card, Document, Insurance, Medical) | 4 basic types |
| Password sharing with TTL | Yes (5 min to 30 days) | Yes (Premium) |
| Team management | Yes (ECDH encrypted) | Yes (Business plan) |
| Emergency Access | Yes | Premium only |
| Phishing & Malware Protection | Yes | No |
| Breach Scanner | Yes | Yes (Premium) |
| Recovery QR Code | Yes (PIN-encrypted) | No (SMS recovery) |
| Device Trust | Yes (email verification) | Yes |
| Passkeys / Face ID | Yes | Yes |
| Free plan limit | 10 entries | 1 device type |
| Annual price | $19.95/yr | $36/yr (Premium) |
Trust is earned through transparency and tested through adversity. Here is where the two products stand.
LastPass has experienced multiple security incidents over the years. Beyond the major 2022-2023 breach, there were earlier vulnerabilities reported in 2015, 2017 and 2019. The company's communication during the 2022 breach was widely criticized as slow and misleading — the initial disclosure downplayed the severity, and the full scope was only revealed months later.
UnveilPass has had zero security breaches since its launch. While a clean record does not guarantee future safety, the architectural choices — Argon2id, full data encryption, email encryption at rest — mean that even in a worst-case scenario where the database is stolen, the attacker faces significantly higher barriers than they did with LastPass.
It would be unfair not to acknowledge LastPass's strengths. Despite its security history, it remains a capable product in several areas:
UnveilPass has distinct advantages in security architecture and value:
If you are considering switching, UnveilPass makes the process straightforward. The import tool auto-detects LastPass CSV exports and maps all fields automatically — including folders, notes and URLs.
LastPass remains a functional password manager with broad platform support and name recognition. But the 2022-2023 breaches exposed real architectural weaknesses — plaintext URLs, PBKDF2 with historically low iterations and a communication approach that left users in the dark.
UnveilPass was built with the lessons of those breaches in mind. Argon2id instead of PBKDF2. Full encryption of all data including metadata and emails. A recovery system that does not rely on SMS. And a price point that is nearly half of LastPass Premium.
If encryption strength, privacy and trust are your top priorities, UnveilPass is the stronger choice. If you need native mobile apps from an app store or enterprise SSO integrations, LastPass may still be the better fit for now.
The best password manager is the one you trust with your data. Choose accordingly.
Create your free vault in under a minute. No credit card required.
Get Started Free