top | item 45239484

Show HN: Paasword – a password vault that never stores your passwords

2 points| yoyo250 | 5 months ago |github.com

Warning: pre-release, unaudited, not for production use. (Though my password was generated with it)

Instead of saving secrets, it derives them on demand using domain + username + a short passphrase + a physical OpenPGP key (smartcard/YubiKey).

Passwords are reproducible but never persisted.

Currently tested only with RSA4096 on Windows + GnuPG 2.4.x.

2 comments

order

zahlman|5 months ago

> a physical OpenPGP key (smartcard/YubiKey)

I don't know how you get a reproducible value from this, but in the use described it isn't actually contributing a second factor.

yoyo250|5 months ago

You're right — it's not a true "second factor" in the 2FA sense.

The idea is to bind password derivation to a physical OpenPGP key.

Without the smartcard/YubiKey inserted, the program can't generate the same password, even if someone knows the domain/username/phrase.

So the key isn't used as extra entropy, but as an essential part of the derivation process.