Visual Password par Denis Tulupov
A generator for strong and secure passwords using simple actions that are easy to remember and don't need to be written down.
1 utilisateur·trice1 utilisateur·trice
MĂ©tadonnĂ©es de lâextension
Captures dâĂ©cran
Ă propos de cette extension
A generator for strong and secure passwords using simple actions that are easy to remember and donât need to be written down. This makes your passwords 100% secure because they cannot be stolen.
Donât store your passwords in a password manager, notes, or on paper. Simply memorize a few emojis and a keyword to instantly recover a complex password when needed.
Visual Password generates passwords entirely locally on your device. No internet connection required. It does not store any generated passwords.
To create passwords, Visual Password uses a multi-layered cryptographic password-generation algorithm that takes your input data (keyword, PIN, visual password). It applies multi-stage AES-GCM encryption, bit mixing for maximum entropy, and multi-stage SHA-256 hashing for cryptographic strength. PBKDF2 key derivation protects against rainbow-table attacks and adds computational complexity beyond the reach of modern supercomputers. Multiple cascade-encryption layers enhance overall resilience and provide cryptographic redundancy. The final step uses a high-entropy pseudorandom generator based on cryptographically secure data, ensuring the uniqueness and complexity of the password even with very similar inputs.
Donât store your passwords in a password manager, notes, or on paper. Simply memorize a few emojis and a keyword to instantly recover a complex password when needed.
Visual Password generates passwords entirely locally on your device. No internet connection required. It does not store any generated passwords.
To create passwords, Visual Password uses a multi-layered cryptographic password-generation algorithm that takes your input data (keyword, PIN, visual password). It applies multi-stage AES-GCM encryption, bit mixing for maximum entropy, and multi-stage SHA-256 hashing for cryptographic strength. PBKDF2 key derivation protects against rainbow-table attacks and adds computational complexity beyond the reach of modern supercomputers. Multiple cascade-encryption layers enhance overall resilience and provide cryptographic redundancy. The final step uses a high-entropy pseudorandom generator based on cryptographically secure data, ensuring the uniqueness and complexity of the password even with very similar inputs.
Noté 0 par 1 personne
Autorisations et donnéesEn savoir plus
Autorisations nécessaires :
- Lire les données du presse-papiers
- Ajouter des données dans le presse-papiers
Plus dâinformations
- Liens du module
- Version
- 1.2.0
- Taille
- 25,84Â Ko
- DerniĂšre mise Ă jour
- il y a 2 mois (16 août 2025)
- Catégories associées
- Licence
- Tous droits réservés
- Historique des versions
- Ătiquettes
- Ajouter Ă la collection