Contact our support team
Do you have access to heylogin?
Logins are encrypted in strictly separated vaults with the security chips of the respective user devices. Encrypted vaults are automatically synchronized. The heylogin cloud serves as a simple data storage and has no means of decrypting the vaults. Only when an a security chip is unlocked, a temporary key is generated and transmitted over an end-to-end encrypted channel to the respective browser. This temporary key is used by the browser extension to decrypt passwords and other sensitive data to be used for logging end-users into websites.
How are passwords and other sensitive data stored in heylogin protected?
Logins are encrypted in strictly separated vaults with the security chips of the respective user devices. Encrypted vaults are automatically synchronized. The heylogin cloud serves as a simple data storage and has no means of decrypting the vaults. Only when an a security chip is unlocked, a temporary key is generated and transmitted over an end-to-end encrypted channel to the respective browser. This temporary key is used by the browser extension to decrypt passwords and other sensitive data to be used for logging end-users into websites.
How are passwords and other sensitive data stored in heylogin protected?
Logins are encrypted in strictly separated vaults with the security chips of the respective user devices. Encrypted vaults are automatically synchronized. The heylogin cloud serves as a simple data storage and has no means of decrypting the vaults. Only when an a security chip is unlocked, a temporary key is generated and transmitted over an end-to-end encrypted channel to the respective browser. This temporary key is used by the browser extension to decrypt passwords and other sensitive data to be used for logging end-users into websites.