Seed
Filter
New Account
Seed Code
Error while importing
Account import failed, the imported file may be invalid or the seed in use does not correspond to the imported file.
Password
Important
Delete action CANNOT be reversed.
Please confirm if you want to continue with the deletion.
How to use the LISTHASH password manager?
This article explains how to configure and use the highly secure password manager LISTHASH, which generates and manages your passwords using a unique seed provided by the user. Discover how to set up the seed, understand the process of creating passwords using hashes, and manage your accounts, ensuring that only you have access to your authentication data.
Hashes: What are they and why are they important for security?
Discover how hashes, mathematical functions that generate irreversible digital fingerprints, protect our data. This article shows you their key role in file verification, password protection and blockchain security. If you are looking to understand how these cryptic codes strengthen security in the digital environment, this article gives you a clear and practical overview of how they work and their relevance.
Delving into Hashes: Functions, Algorithms and Applications
This article explores how hashes ensure the integrity of information through unique properties such as irreversibility and efficiency, detailing the performance of key algorithms such as MD5, SHA-1 and SHA-256. In addition, their applications and limitations in digital security are discussed, opening the door to future advances such as quantum cryptography and artificial intelligence to protect data in the digital age.
What is a derivative password manager?
In a context of increasing cyber threats, this article presents LISTHASH, a derivative password manager that, through the use of a master seed, hash functions and three checkpoints (seed, account listing and secret codes), generates unique and robust passwords in a deterministic way, ensuring that failure in one or two checkpoints does not compromise the security of authentication data and offering a secure and decentralized alternative to traditional managers.