A technological tool designed to protect confidential information and those holding it. You tell Zoldy how you want it to operate on your behalf. If all else fails, it then takes control and delivers the information you have uploaded to one or more preselected recipients, along with individualised messages.
Dependable, automated, ad-free service that’s easy to download, set up and operate.
To support holders of confidential information in a situation of risk, threat or danger caused by the possession of that information. The range of possible uses is tremendous. Furthermore, in a conflict involving an obvious power imbalance, Zoldy can play a decisive role in counteracting and compensating for that imbalance.
A unique, self-contained system that operates from your handset alone.
Select how often you want your Zoldy to contact you via Notifications. If you fail to reply to 3 consecutive Notifications, Zoldy will run your settings. This amounts to another level of security for both your confidential information and yourself.
In a worst-case scenario, reach for the flashing orange screen. If you tap the red-orange area even slightly, all of your confidential files will end up in safe hands.
Take a look at how the information is processed, it will give you confidence; https://www.zoldyapp.com/legal-info#privacy
Based on our record, KeePass seems to be more popular. It has been mentiond 207 times since March 2021. We are tracking product recommendations and mentions on various public social media platforms and blogs. They can help you identify which product is more popular and what people think of it.
Https://keepass.info and share the database file on a shared folder or sync it somehow. - Source: Hacker News / 9 months ago
And the best part is there are solutions already that do this: https://keepass.info/ Does it work on Android or iOS? - Source: Hacker News / over 1 year ago
The key difference here being that this is two way hashing so passwords can be decrypted. In reality, there are a lot of attack vectors like MITM, event logging or sometimes straight up storing data in plaintext. Through these hackers can generally get passwords of all users of these services. So, why don't people use local password managers? Just a txt file encrypted with "master password" should be pretty... - Source: Hacker News / over 1 year ago
When you're at a point where you're relying on a display name to make security-critical decisions, you've already lost. Character substitutions like ķeepass or ƙeepass or keypass are at least possible to spot if you know the name of the product, but not the full URL. But there are many ways to create lookalike domains that don't change the product name: https://keepass.org https://keepass.net https://keepass.info... - Source: Hacker News / over 1 year ago
> People love to hate on passwords but the reality is that for many circumstances (threat models) they are the best compromise. You can make them more than strong enough (take 32+ bytes out of /dev/random and encode however you like, nobody will ever brute force that in this universe) and various passwords managers solve the problem of re-use (never reuse a password). > And it comes with the benefit that you... - Source: Hacker News / over 1 year ago
Padlock - Padlock is an open-source password manager that is available as an app for multiple platforms. It can be used on Android and iOS devices, and it can also be installed as a Chrome extension.
1Password - 1Password can create strong, unique passwords for you, remember them, and restore them, all directly in your web browser.
bitwarden - Bitwarden is a free and open source password management solution for individuals, teams, and business organizations.
Masked Emails by 1Password - Taking control of your privacy and keeping your email private is now as easy as generating a strong password.
Lastpass - LastPass is an online password manager and form filler that makes web browsing easier and more secure.
Applocker - You can use AppLocker as part of your overall security strategy for the following scenarios: