If an attacker wants to crack the data you store on PassLock, how much will it cost? Let’s talk about the answer first: Assume you have a supercomputer that can calculate 2 billion times per second and calculate continuously. It will take about 210400000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 o Lifespan is 6*10^9 billion years. It's harder than boiling all the water on earth. PassLock uses the AES256 encryption algorithm, and the difficulty increases geometrically over the time required for AES128. The actual time required is beyond the scope of human and computer knowledge.

Why is it harder than 2104 billion years? We will talk in detail about **PassLock’s** efforts to ensure the security of your data, mainly from aspects such as Apple ecosystem, modern cryptography, Bitcoin (or Web3), and open source.

1. Focus on the Apple ecosystem, we do not have our own servers

PassLock has been positioned to focus on the Apple ecosystem from the beginning. This is one of the reasons why we have been compatible with iOS, iPadOS, and macOS since 1.0.0. We will also launch Apple watch and Apple Vision clients in the future. We only support logging in through Apple ID, thus ensuring that only people with this Apple ID can use our applications. You can use facial recognition, fingerprints (Mac), digital passwords, etc. to ensure that the visitor must be you to access Access rights.

In other words, if an attacker wants to peek into your data, he must first break into Apple's account system. Security has been a major feature of Apple products since the days of Steve Jobs. As one of the world's most valuable technology companies (not even one), attackers need to contend with Apple's massive security team, and this is just the first step.

Untitled

In addition to strict login methods, the data storage area is only stored in your private iCloud. We do not have our own cloud server, so you don't need to worry about your data being peeked by developers. You only need to ensure that your iCloud has enough remaining space. Even if the iCloud space is full, after our testing, you can still store non-image data. Even plain text data is 1MB, which is more than 1 million characters long. of data, it is more than enough to store tens of thousands of data.

2. Super strong encryption algorithm! AES symmetric encryption and RSA asymmetric encryption

As a product that focuses on privacy and security, relying solely on the ecosystem provided by Apple may not be enough. Encrypting data is an indispensable step. Therefore, we use a hybrid encryption algorithm of AES-256 and RSA-1024, which is probably the strongest in modern cryptography.

Every piece of data you store on PassLock, whether text or images, is AES-256 encrypted. This ensures that the data you store on iCloud will not be viewed by Apple or iCloud center staff. Even if a data leak occurs one day in the future, they will only access the data that has been encrypted by AES-256. Humans can read your real data. In fact, since the Hollywood nude photos scandal in 2014, there has never been a leak of iCloud.

AES-256 is one of the strongest symmetric encryption algorithms in modern cryptography. It has been widely used by the U.S. military and large financial institutions since 2002. Its history of more than 20 years is enough to prove its power. As mentioned before, it takes 2104 billion years to crack an AES-128 encrypted data, not to mention that we use AES-256.

Security On-bro.svg

Although the algorithm is impeccable, in modern cryptography, the algorithm is not the only guarantee of data security. For example, if you invent a door lock so powerful that it would take a thief hundreds of millions of years to try all possible keys. But where the correct set of keys is hidden is another question. A thief might not be stupid enough to make hundreds of millions of keys to try to unlock your door, but he might find a way to steal the right key from you. Considering this issue, we have taken the following measures:

# Decentralized storage key: