Vault encryption
AES-256 protects your vault at rest. Keys are derived from your master password on-device—so decryption starts where you are, not in a browser tab you forgot to close.
Product
Novash focuses on the fundamentals: encryption, sync, generator, and day-to-day ergonomics. If a feature does not reduce risk or save time, it does not belong in the core path.
What to expect
AES-256 protects your vault at rest. Keys are derived from your master password on-device—so decryption starts where you are, not in a browser tab you forgot to close.
Phone and tablet layouts tuned for thumb reach, safe areas, and OS conventions—one vault, two polished clients.
Keep ciphertext aligned across devices with a sync path designed for confidentiality. Your keys stay where they belong.
Generate strong credentials with constraints that match real-world rules: length, symbols, and site-specific quirks.
Support for authenticator-style second factors where applicable—so “something you have” backs up “something you know.”
Biometrics where the OS supports secure enclaves. Fewer taps between you and the credential you need right now.
Share access with clear intent: time-bound sharing, scoped visibility, and revocation that does not require a support ticket.
Surface weak, reused, or exposed credentials with guidance that is actionable—not a wall of shame.