![]() ![]() ![]() ![]() This algorithm acts as a security shield to keep your data safe and breaking the code is near impossible. The input is your unencrypted data and the output is your encrypted data. XChaCha20 can be described as a complex mathematical set of instructions that changes the data of an input into a different output, similar to how an Excel spreadsheet performs calculations. However, unlike its competition, who use AES-265 (a super-secure encryption protocol), NordPass uses an exciting new encryption technology called XChaCha20. Like all other password managers, NordPass uses encryption to protect your data against any unauthorized access. This feature is unique to NordPass and sets the industry standard that other password managers should follow. To address this, NordPass introduced a feature called Trusted Contacts whereby users can manually share encryption keys to eliminate the possibility of attacks. The auditors identified password sharing as an area that could open the possibility of man-in-the-middle attacks where the attacker secretly relays and possibly alters the communications between two parties. The pentest also led to the enhancement of existing features and the addition of new features such as password sharing. Source code of the NordPass background application and its codebaseĪll identified weaknesses and possible security issues were rectified to eliminate threats to end-users, like you and me.Source code of the desktop and mobile software.Cryptographic premise (encryption protocols used to transform passwords into secret codes).The audit and pentest focused on four key areas: Before NordPass was launched, its security model was subjected to a stringent audit by a well-respected independent auditor, Cure53, to identify any possible security issues and to strengthen their security model. ![]()
0 Comments
Leave a Reply. |