FAQs
This page covers frequently asked questions and their answers.
What is the password-only crypto wallet?
Password-only crypto wallet lets you create and access your digital wallet using just a password, without the need for seed phrases, site registration, 2FA, or KYC. Only the password determines the private key and wallet address, making it extremely convenient to use for sending and receiving blockchain assets.
What is the uniqueness, and advantage?
By utilizing a password as a single key, it eliminates the need for seed phrases, site registration, or separate private key storage, ensuring user-friendliness without compromising safety. It is self-custodial, decentralized, and hosted on a public domain. No KYC is required, and there are no suspensions of your funds.
What purpose can you use this wallet for?
You can use this wallet to securely store, transfer, and receive cryptocurrency. It is ideal for both permanent and temporary handling of your crypto. However, it is not intended for interaction with Web3/dApps.
What is the password and passcode?
The password is the primary field used to generate a private key and create your account. To avoid password duplication among users, we have also introduced a shorter secondary field called the passcode, which is about 6 characters long. These two fields are combined to generate a private key.
Is it free? is there any service fee?
The wallet itself is free to use, but standard blockchain transaction fees will apply. Your generous donations help us continuously enhance and improve our product.
Can I recover the password?
You can't reset or recover the password. Do not lose your password, and back it up.
How can I change or update my password?
There is no direct method to change the password. Each password generates a unique wallet. To update your password, create a new wallet with the desired password and transfer your assets to it.
Can different passwords generate the same account?
No absolutely! Each password uniquely generates its own corresponding private key and wallet address. The scrypt and keccak256 algorithms transform the password into a 256-bit private key. These two hash functions produce pseudo-random values and are widely verified and accepted across the industry.
Who can know/steal my password?
Malware can steal passwords by tracking keystrokes. Avoid using personal info like your name or birthday as passwords. There's no admin or database, so your passwords are safe with us.
What is the backup option?
You can back up private key itself as plain text. You can import the private key into other wallet like Metamask.
What is the risk or vulnerability?
A simple password is susceptible to brute force attacks, and there is no option to recover or reset the password. Once lost, you will lose your funds permanently.
Does it support privacy?
Absolutely! It does not require personal information, including an email address, and using a one-way hash function means sharing the wallet address does not compromise the private key or password.
I received cryptocurrency. but it is not shown in my wallet.
It may take a couple of minutes to update your balance in the wallet. Please ensure you have selected the correct blockchain network.
Why is my account locked automatically?
To safeguard your funds, the system locks your account after 15 minutes of inactivity.
Is it open source? can I review the codebase?
Yes, it is fully open source. You can review the codebase here. It is deployed into Github Pages by using Github Actions.
Can I store NFT in this wallet?
Currently, there is no UI to manage NFTs, but you can still store them in this wallet without any issues.
Can I connect DeFi apps to this wallet?
It is not designed for interaction with Web3/dApps, but you can extract the private key into MetaMask and connect to DeFi apps.
How can I trust this wallet?
We prioritize transparency. Our codebase, deployment processes, and actions are all managed on GitHub. You can verify the codebase, deployment history, and DNS configuration there.
How long does it take to brute force 12 length password?
A password with 94 possible characters (including uppercase and lowercase letters, digits, and special symbols) and a length of 12 would have approximately (94^12) possible combinations. Assuming each brute-force attempt takes less than 1 millisecond with a cutting-edge ASIC attacker, it would take about (5.36 * 10^23) milliseconds, or roughly (1.7 * 10^13) years, to exhaust all possibilities. This duration is extremely long and practically unbreakable by brute force methods.
What would be the size of a rainbow table required to store all possible 12-character passwords along with their corresponding hash results?
Storing a full rainbow table for all 12-character passwords with 94 characters each would need about (1.5 * 10^10) petabytes of storage. This shows that creating and storing such a large table is impractical, making longer, complex passwords more secure against these attacks.
Last updated