It's opensource, has better UX and fewer requested permissions than every other PGP extension IMO.
It uses passkeys as the primary flow (but you can use passwords) to fully E2EE your secrets. You can choose the synced storage (syncs between devices and touches google's servers) or you can just keep everything local.
There are no calls to external services like analytics or any of my own servers.
The Crypto side of this is based off of SequoiaPGP, compiled to WASM.
It lets you drag & drop files, lets you add in text and just saves time.
acorn221•1h ago
It's opensource, has better UX and fewer requested permissions than every other PGP extension IMO. It uses passkeys as the primary flow (but you can use passwords) to fully E2EE your secrets. You can choose the synced storage (syncs between devices and touches google's servers) or you can just keep everything local.
There are no calls to external services like analytics or any of my own servers. The Crypto side of this is based off of SequoiaPGP, compiled to WASM.
It lets you drag & drop files, lets you add in text and just saves time.
I made this because I personally wanted it, I had to encrypt my vulnerability reports (which put me on the Center for Cyber Security Belgium Wall of Fame https://ccb.belgium.be/cert/vulnerability-reporting-ccb/wall...)
Going between the console and my email was a pain, and there were no other easy solutions so I decided to make one.
If you want to go browse the code or submit issues/PRs, feel free: https://github.com/Am-I-Being-Pwned/PGP-Tools