
You basically have to trust what it says if you plan to use it. So the extension is collecting the URL but claims it doesn't save it. When KeePassXC database is connected to the extension, and database is open, site URL is transmitted to KeePassXC for comparison. The extension does not collect any information about user data or save it. Other than fingerprinting, the extension says:

However, if this is what the extension says, you just have to trust that it is right when you use it. I don't know how exactly, but the addon may accidentally (or not) change something about your appearance to a website and make you visible. So in terms of the addon being detected and being used to fingerprinting you, it seems unlikely (but it is always possible - there is always a chance). However, pages cannot know the extension is used. The extension adds content to the page DOM when needed. On KeePassXC-Browser extension's private policy ( ) it states: (I believe) it's just not worth the risk given that even one error can completely deanonymize you. It's complicated and for me, I wouldn't use it. It does refer the reader to the Surveillance Self-Defense guide for KeePassXC, which includes instructions for the browser extension, but does not mention Tor (or Tor Browser).Īfter reading a bit, I've come to believe that this particular extension may or may not affect your anonymity. The Tails documentation for KeePassXC says nothing about the browser extension. This is not particularly helpful.Įdit: Tails includes both Tor Browser and KeePassXC, but not the browser extension. I found that the extension developers specifically worked on Tor Browser integration in issue #4123 and the extension is listed in the ArchWiki page for KeePass (with no comments on the extensions-in-Tor Browser issue). Is this of any concern with this particular extension? Tor Browser already comes with HTTPS Everywhere, NoScript, and other patches to protect your privacy and security. Plugins or addons may bypass Tor or compromise your privacy. We do not recommend installing additional add-ons or plugins into Tor Browser This all seems fine, except perhaps for the last item about update checks.Ĭrsi’s answer goes on to say (the cited page is also accessible via an onion service):īut you should not add extensions to your TBB.

To allow using KeePassXC-Browser on all websitesįor checking the latest KeePassXC version from GitHub
KEEPASSXC FIREFOX EXTENSION INSTALL
To show browser notifications on install or update

KEEPASSXC FIREFOX EXTENSION GENERATOR
Allows password to be copied from password generator to clipboardĪllows communication with KeePassXC applicationįor storing extension settings to localStorage
