Histórico de versões de EPM (Ez Password Manager) - 5 versões
EPM (Ez Password Manager) por s0ulz
Histórico de versões de EPM (Ez Password Manager) - 5 versões
Tenha cuidado com versões antigas! Estas versões são mostradas para fins de teste e referência.Deve sempre utilizar a versão mais recente de um extra.
Versão mais recente
Versão 1.0.6
Lançada em 7 de out de 2025 - 63,24 KBFunciona com firefox 58.0 e superiorv1.06 :D- We fixed the auto fill password system and duplicated lock icons for the auto fill.
- Added new features for example: when you login into a new site that you don't have a password for it asks if you want to save it and you can update this password the same way :D
Sneak Peak Features:
Sync - Syncing passwords through devices via WiFi with secure codes. :DCódigo fonte lançado sob MIT License
Versões antigas
Versão 1.0.5
Lançada em 24 de set de 2025 - 57,16 KBFunciona com firefox 58.0 e superiorEncryption and Security Fixes Summary
PBKDF2 Key Derivation
We replaced plain SHA-256 hashing with PBKDF2 using SHA-256. This applies thousands of iterations to the master password before generating an encryption key, which makes brute-force attacks far more difficult.
AES-GCM Vault Encryption
All stored passwords in the vault are now encrypted using AES-256-GCM. This provides both confidentiality (data cannot be read without the key) and integrity (modifications can be detected).
Unique Salts and Nonces
A random salt is generated for PBKDF2 and a random nonce (IV) is generated for AES-GCM during encryption. This ensures that even if two users set the same master password, their derived keys and encrypted vaults are different.
Secure Storage
The derived encryption key is never stored. Only the salt, nonce, and ciphertext are saved in browser.storage.local. This means that even if the storage is extracted, the vault cannot be decrypted without the correct master password.
Stronger Verification
During login, the master password is passed through PBKDF2 with the stored salt to re-derive the encryption key. That key is then used to attempt AES-GCM decryption of the vault. If decryption succeeds, the password is correct. If it fails, login is denied.Código fonte lançado sob MIT License
Versão 1.0.4
Lançada em 24 de set de 2025 - 56,92 KBFunciona com firefox 58.0 e superiorCódigo fonte lançado sob MIT License
Versão 1.0.3
Lançada em 23 de set de 2025 - 54,95 KBFunciona com firefox 58.0 e superiorFixed a lot of bugs, Password Imports not working, Autofill not filling, themes that suck and yeaCódigo fonte lançado sob MIT License
Versão 1.0.1
Lançada em 20 de set de 2025 - 39,49 KBFunciona com firefox 58.0 e superiorI removed emojis because they looked cringe and yea ugly not gonna lie.Código fonte lançado sob MIT License