Historial de versiones de EPM (Ez Password Manager) - 5 versiones
EPM (Ez Password Manager) por s0ulz
Historial de versiones de EPM (Ez Password Manager) - 5 versiones
¡Ten cuidad con las versiones antiguas! Se suelen mostrar para pruebas y a modo de referencia.Deberías usar siempre la última versión disponible de un complemento.
Última versión
Versión 1.0.6
Lanzada el 7 de oct. de 2025 - 63,24 KBCompatible con firefox 58.0 y superioresv1.06 :D- We fixed the auto fill password system and duplicated lock icons for the auto fill.
- Added new features for example: when you login into a new site that you don't have a password for it asks if you want to save it and you can update this password the same way :D
Sneak Peak Features:
Sync - Syncing passwords through devices via WiFi with secure codes. :DSe publicó el código fuente bajo la licencia MIT License
Versiones antiguas
Versión 1.0.5
Lanzada el 24 de sep. de 2025 - 57,16 KBCompatible con firefox 58.0 y superioresEncryption and Security Fixes Summary
PBKDF2 Key Derivation
We replaced plain SHA-256 hashing with PBKDF2 using SHA-256. This applies thousands of iterations to the master password before generating an encryption key, which makes brute-force attacks far more difficult.
AES-GCM Vault Encryption
All stored passwords in the vault are now encrypted using AES-256-GCM. This provides both confidentiality (data cannot be read without the key) and integrity (modifications can be detected).
Unique Salts and Nonces
A random salt is generated for PBKDF2 and a random nonce (IV) is generated for AES-GCM during encryption. This ensures that even if two users set the same master password, their derived keys and encrypted vaults are different.
Secure Storage
The derived encryption key is never stored. Only the salt, nonce, and ciphertext are saved in browser.storage.local. This means that even if the storage is extracted, the vault cannot be decrypted without the correct master password.
Stronger Verification
During login, the master password is passed through PBKDF2 with the stored salt to re-derive the encryption key. That key is then used to attempt AES-GCM decryption of the vault. If decryption succeeds, the password is correct. If it fails, login is denied.Se publicó el código fuente bajo la licencia MIT License
Versión 1.0.4
Lanzada el 24 de sep. de 2025 - 56,92 KBCompatible con firefox 58.0 y superioresSe publicó el código fuente bajo la licencia MIT License
Versión 1.0.3
Lanzada el 23 de sep. de 2025 - 54,95 KBCompatible con firefox 58.0 y superioresFixed a lot of bugs, Password Imports not working, Autofill not filling, themes that suck and yeaSe publicó el código fuente bajo la licencia MIT License
Versión 1.0.1
Lanzada el 20 de sep. de 2025 - 39,49 KBCompatible con firefox 58.0 y superioresI removed emojis because they looked cringe and yea ugly not gonna lie.Se publicó el código fuente bajo la licencia MIT License