https://github.com/ndaidong/priv-triad
PrivTriad - Make private keys safer
https://github.com/ndaidong/priv-triad
crypto encryption-decryption security-tools
Last synced: 2 months ago
JSON representation
PrivTriad - Make private keys safer
- Host: GitHub
- URL: https://github.com/ndaidong/priv-triad
- Owner: ndaidong
- License: mit
- Created: 2023-04-08T15:13:31.000Z (about 2 years ago)
- Default Branch: main
- Last Pushed: 2024-09-30T02:57:05.000Z (9 months ago)
- Last Synced: 2025-03-27T01:15:45.848Z (3 months ago)
- Topics: crypto, encryption-decryption, security-tools
- Language: Svelte
- Homepage: https://priv-triad.pages.dev
- Size: 232 KB
- Stars: 1
- Watchers: 1
- Forks: 1
- Open Issues: 0
-
Metadata Files:
- Readme: README.md
- License: LICENSE
Awesome Lists containing this project
README
# [priv-triad](https://priv-triad.pages.dev)
[PrivTriad](https://priv-triad.pages.dev) enhances the security of sensitive text such as mnemonic phrases by converting into 3 pieces of meaningless info.

## Screenshot

## Setup
Please fork this repo, then:
```sh
git clone [email protected]:{YOUR_NAME}/priv-triad.git
cd priv-triad
cp example.env .env
npm i
npm run dev
```Please change the default value of `VITE_CRYPTO_SALT` in .env and keep it safe for your own system.
This app was built with [Svelte](https://svelte.dev/), [chota.css](https://jenil.github.io/chota/) and [Vite](https://vitejs.dev/).
## Secret store strategy
We have 2 recommended methods to store 3 secret pieces of encrypted data.
- You can store each value in a different place. For example:
- password 1 in Bitwarden
- password 2 in a paper
- encrypted string in an encrypted folder at [Filen](https://filen.io/r/e7758fe5b033ed143e73a3cbafa3ff2f).
- The second way is to divide into 3 pairs of values, save them in 3 different places. For example:
- Bitwarden: password 1 + password 2
- Filen: password 1 + encrypted string
- Paper: password 2 + encrypted stringWith the first option, you need access in 3 different places to get enough decryption information.
With the 2nd option, you only need to access 2 places to have enough decryption information. This is also the method that Ledger has recently tried to apply.---