Skip to content

flower-org/phraser

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

214 Commits
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 

Repository files navigation

Phraser - USB Hardware Password Manager

phraser.jpg

Phraser is a compact and secure USB hardware password manager designed to keep your passwords safe and easily accessible. Built on the Thumby platform, which is based on the RP2040 microcontroller, Phraser combines portability with robust security features.

Features

  • Secure Storage: Stores your passwords securely with AES-256 encryption.
  • Compact Design: Keychain form factor for portability (props to Thumby team).
  • Emulates USB Keyboard: Helps you to fill in pass- and other -words by emulating a USB keyboard.
  • Open Source: Fully open-source firmware, Apache 2.
  • Flash-friendly DB design: Facilitates uniform flash sector wear and bit rot protection (more info).
  • Up to 3 Password Banks: Up to 3 independent password databases, each with it's own password. (DOWN+A+B on Unseal)

Phraser Manager

Phraser Manager is a desktop application designed to work seamlessly with your Phraser device and Phraser DB backups. It provides a user-friendly cross-platform interface for managing your password databases with the following features:

  • Backup Password Database: Create backups of your password database to ensure your data is safe and recoverable.
  • Restore Password Database: Easily restore your password database from a backup file.
  • Modify Password Entries: Update existing password entries or metadata in DB backup files from the desktop application.
  • DB Maintenance: Compact, resize, change AES key, change password etc.

Prerequisites

  • Thumby device
  • Micro-USB cable for connection

Acknowledgements

Credits

Notable project milestones

  • Apr 06, 2025: First real life use for actual passwords.

    • Migrated passwords for several accounts to Phraser.
  • Apr 07, 2025: DB Backup management, the way I'm doing it:

    • In an ideal world, these operations should be performed on an offline machine:
    • Download DB from token into a backup file using Phraser Manager;
    • Encrypt the backup file with Cryptor (I use PKCS#11 + RSA);
    • Date the encrypted file;
    • Store the encrypted file reliably - multiple copies, local, cloud.
      • Beware of a situation when your cloud password is in the Thumby DB Backup, which is stored in the cloud only.
    • Q: DB is encrypted, why encrypt it again with RSA?
      • A: Yes, the DB is stored and transferred in an encrypted state, but if somebody gains access to a backup file, they could theoretically bruteforce its master password (even though it's very hard given PBKDF2, double-layered encryption with Key Block, and NO metadata leaks).
      • To reduce that risk to an absolute minimum, I additionally encrypt backup files with RSA, which is not considered bruteforceable.
      • Even if the RSA private key is compromised, one would still have to decrypt the DB itself.
      • To make bruteforcing the master password even more difficult, use a non-standard number of PBKDF2 iterations (UP+A+B on Unseal).
      • Additionally, changing your passwords regularly will reduce the relevance of older backups.
  • Apr 07, 2025

    • 0.0.2 released!

About

Hardware password token

Resources

License

Stars

Watchers

Forks

Packages

 
 
 

Contributors