Capture arbitrary bits to build a true random password by moving your mouse/finger across the noise below. This utilizes your mouse/finger movements as a source of entropy. Inspired by KeePass.
Collected: 0 samples (0 bits)
Current rank:
Cadet
Next rank: in
bits
FAQ
- What is the goal? To add entropy to the browser CSPRNG to produce a true random password.
- Do I need it? Most likely not. Your passwords are already secure even if you don't use this tool.
- Why then? Paranoia—you suspect the browser CSPRNG is compromised or not sufficiently seeded.
- What is a "sample"? It's 16 bits that can be used for a passphrase word or password character.
- How much do I need? You'll need about 5-7 samples per passphrase, and 11-15 samples per password.
- Then what? Go back to the password generator, check "Add entropy?", then the purple "Generate" button.
- Star Trek? Seriously? A bit of fun collecting entropy. The more bits you collect, the higher your rank.
- What are the ranks? There are 13 ranks from "Cadet" to "Fleet Admiral". It grows exponentially.
Technical
- The noise above is generated with the browser's CSPRNG.
- When your mouse or finger is moved, the bit at the xy-coordinate is collected.
- When two bits are collected, they are decorrelated using John von Neumann's randomness extractor.
- 16 decorrelated bits are stored in an array as 1 sample.
- During password generation, each 16-bit sample is mixed with the browser CSPRNG using XOR.
- Each used 16-bit sample is then discarded.