Dropbox has announced the discontinuation of its password management service, Dropbox Passwords, effective October 28, 2025, as the company shifts focus toward enhancing core product features.
The cloud storage giant is urging all users to export their stored password data before the final shutdown date, after which all password information will be permanently deleted from company servers.
The discontinuation will occur in phases, beginning with limited functionality in late August and culminating in complete service termination by late October.
Dropbox officially announced the discontinuation of Dropbox Passwords on July 29, 2025, citing strategic business decisions to concentrate resources on improving other core product offerings.
The company has established a phased shutdown approach with three critical dates that users must understand to avoid data loss.
Starting August 28, 2025, Dropbox Passwords will transition to a view-only mode in both mobile applications and browser extensions, preventing users from adding new passwords while maintaining access to existing stored credentials.
The autofill functionality will also be deactivated during this phase, significantly limiting the service’s practical utility.
The second phase begins September 11, 2025, when the mobile application will completely cease operations, though users will retain access through browser extensions until the final shutdown.
This graduated approach provides users with multiple opportunities to export their data while maintaining some level of access throughout the transition period.
The final and most crucial date is October 28, 2025, when Dropbox Passwords will be entirely discontinued and all stored data will be permanently and securely deleted from company servers.
Users who fail to export their password data before this deadline will lose access to their information permanently, with no possibility of data recovery.
The export process is straightforward and can be completed through either the browser extension or mobile application.
Users can access the export function by navigating to their profile settings, selecting preferences, and choosing the export option to generate a CSV file containing all account logins and payment card information.
For optimal results, Dropbox recommends using the browser extension for the export process.
Team administrators face additional responsibilities, as each team member must individually export their own password data.
Administrators can identify which team members are actively using Dropbox Passwords by checking the admin console’s Passwords page, where active users display a password security score while inactive users show as “Inactive”.
Despite the discontinuation announcement, Dropbox has emphasized that it will maintain the same high standards of encryption and security throughout the transition period.
The company has also clarified that it never has access to users’ plaintext passwords, maintaining its commitment to user privacy even during the shutdown process.
Dropbox has specifically recommended Password as the preferred alternative password manager, describing it as “a highly trusted and secure password manager”.
The company has provided direct integration support, offering detailed instructions for importing Dropbox Passwords data into Password through dedicated support documentation.
For users preferring alternative password management solutions, Dropbox advises contacting other providers after exporting data to CSV format.
Current Dropbox subscriptions will remain unaffected by the password service discontinuation, and users are encouraged to explore other security features within the main Dropbox platform.
Find this Story Interesting! Follow us on LinkedIn and X to Get More Instant Updates.
PortSwigger has leveled up Burp Suite's scanning arsenal with the latest Active Scan++ extension, version…
Unit 42 researchers at Palo Alto Networks exposed serious flaws in the Model Context Protocol…
Polish police have arrested three Ukrainian men traveling through Europe and seized a cache of…
Google has launched its most significant Chrome update ever, embedding Gemini AI across the browser…
Attackers exploit this vulnerability through the router's web interface components, specifically "cgibin" and "hnap_main," by…
Security researchers have uncovered a severe flaw in Apache Tika, a popular open-source toolkit for…