Password machine

how to create passwords that are unbreakable but easy to remember


    STEP1
    a. input:
    select a file from your device (pc, usb key ...):

    b. output: text string representing your file, that has to be copied before going to step 2:




    FOR THOSE WHO WANT TO KNOW MORE

    The engine of the "password machine"

    The engine of the "password machine"

    Basically, we’ll let you generate a hyper-secure, inviolable and unassailable password starting from two basic elements that will be the input of a cryptographic function that will return your password. What you need to remember is not the password (which is impossible to remember by heart) but the input elements you used to generate it.

    In this way, you can also not write down the password anywhere (so no one can find out). In just two simple steps, you will always be able to regenerate it and use it to reopen the files.

    The procedure is based on two elements:

    • any file resident on your computer or on a USB stick (for example, a photo you will never delete, the pdf of an article, the video of a dive in the sea, ….)
    • a traditional password, not trivial but easy to remember

    We will show you the two steps that make up the procedure because it is essential that you can replicate anywhere and everywhere. And above all without necessarily accessing our site. Due to this need to ensure maximum independence, we have based the procedure on the SHA256 cryptographic hashing function, which we will chain-apply on the two elements mentioned above.

    It is important to know that:

    • the hashing function is a non-invertible function that produces the equivalent of the fingerprint for the man for the files. Each person has a unique fingerprint, but from the fingerprint it is not possible to trace the hair colors or the face of the person who generated it.
    • If the algorithm is as safe as SHA256, there is no computer in the entire Universe that is capable of violating it.
    • the SHA256 is a public mathematical function and certified by the American NIST.
    • There are countless sites that calculate the SHA256 online for files and text strings

    Why is t necessary to have unbreakable passwords?

    Why the password machine?

    The problem of password security is of crucial importance in the digital world and in the defense of intellectual property. Consider the issue of protecting corporate secrets: if a formula or a particular procedure were “disclosed”, your company could instantly lose all the competitive advantages accumulated over years of activity.

    To prevent someone from intruding on your computer or peeking at your smartphone and accessing your files, it would be advisable for your most valuable files to be encrypted using the most secure software. But even the safest software becomes vulnerable if you choose a “trivial” password like “123” or as your birth date.

    This is why we have created the “Password Machine”. Basically, we’ll let you generate a hyper-secure, inviolable and unassailable password. What you need to remember is not the password itself, but the input elements you used to generate it.

    In this way, you can also not write down the password anywhere (so nobody can find out) and forget about it. In just two simple steps, you will always be able to regenerate it and use it when you need to reopen the files.

    The selection of the file that generated the password

    Tips for choosing the generator file

    How to create passwords that are both “unassailable” and “easy to remember”? Just move the problem and look at it from another angle … and that’s what we did with our “Password Machine”.

    With this procedure you can not only produce bomb-proof passwords, but you can also easily “remember” them because … you only need to remember the two elements you used to generate it. All very simple and safe, as long as you follow these absolute common sense tips when choosing and storing the files you will use to generate passwords.

    The files you choose must have the following features:

    • you never have to delete them (so here’s why a souvenir photo or video)
    • you have to be able to easily duplicate them on more “devices” (computer, usb key, smartphone, dropbox, …) without arousing any suspicion
    • you never have to modify them (that’s why a photo is fine, a Word or Excel document no)