
Visual Password Denis Tulupov מאת
A generator for strong and secure passwords using simple actions that are easy to remember and don't need to be written down.
אין משתמשיםאין משתמשים
יש צורך ב־Firefox כדי להשתמש בהרחבה זו
נתוני העל של ההרחבה
צילומי מסך

על אודות הרחבה זו
A generator for strong and secure passwords using simple actions that are easy to remember and don’t need to be written down. This makes your passwords 100% secure because they cannot be stolen.
Don’t store your passwords in a password manager, notes, or on paper. Simply memorize a few emojis and a keyword to instantly recover a complex password when needed.
Visual Password generates passwords entirely locally on your device. No internet connection required. It does not store any generated passwords.
To create passwords, Visual Password uses a multi-layered cryptographic password-generation algorithm that takes your input data (keyword, PIN, visual password). It applies multi-stage AES-GCM encryption, bit mixing for maximum entropy, and multi-stage SHA-256 hashing for cryptographic strength. PBKDF2 key derivation protects against rainbow-table attacks and adds computational complexity beyond the reach of modern supercomputers. Multiple cascade-encryption layers enhance overall resilience and provide cryptographic redundancy. The final step uses a high-entropy pseudorandom generator based on cryptographically secure data, ensuring the uniqueness and complexity of the password even with very similar inputs.
Don’t store your passwords in a password manager, notes, or on paper. Simply memorize a few emojis and a keyword to instantly recover a complex password when needed.
Visual Password generates passwords entirely locally on your device. No internet connection required. It does not store any generated passwords.
To create passwords, Visual Password uses a multi-layered cryptographic password-generation algorithm that takes your input data (keyword, PIN, visual password). It applies multi-stage AES-GCM encryption, bit mixing for maximum entropy, and multi-stage SHA-256 hashing for cryptographic strength. PBKDF2 key derivation protects against rainbow-table attacks and adds computational complexity beyond the reach of modern supercomputers. Multiple cascade-encryption layers enhance overall resilience and provide cryptographic redundancy. The final step uses a high-entropy pseudorandom generator based on cryptographically secure data, ensuring the uniqueness and complexity of the password even with very similar inputs.
מדורג 0 על־ידי 0 סוקרים
הרשאות ונתוניםמידע נוסף
הרשאות נדרשות:
- קבלת נתונים מלוח העריכה
- הזנת נתונים בלוח העריכה
מידע נוסף
- גרסה
- 1.2.0
- גודל
- 25.84 ק״ב
- עדכון אחרון
- לפני חודש (16 אוג׳ 2025)
- קטגוריות קשורות
- רישיון
- כל הזכויות שמורות
- היסטוריית הגרסאות
- תגיות
- הוספה לאוסף
הערות שחרור עבור 1.2.0
Improved interface. Work on bugs.
עוד הרחבות מאת Denis Tulupov
- אין דירוגים עדיין
- אין דירוגים עדיין
- אין דירוגים עדיין
- אין דירוגים עדיין
- אין דירוגים עדיין
- אין דירוגים עדיין