The zero-knowledge promise should include login
Most modern password managers claim to be zero knowledge, and they are, mostly. They encrypt vault contents before storage, which is the right foundation. But the login flow can still become a weak edge if the master password is sent directly to the service or exposed to server-side handling.
PassHero uses OPAQUE to close that gap. Your device proves it knows the master password through a cryptographic exchange instead of posting the master password as a reusable credential.
What truly zero knowledge means in PassHero
Zero knowledge means the service can help you store, sync, and share secrets without needing to know the contents of those secrets. In PassHero, secret values are encrypted in the client before they are sent to the API, then decrypted only by a user with the right private key.
Truly zero knowledge means the master password is treated with the same care. PassHero uses it locally to unlock vault key material and uses OPAQUE for authentication, keeping account verification separate from plain-text secret access.
Designed for real collaboration
PassHero combines zero-knowledge storage with encrypted sharing and delayed access controls. That means the same security model applies when a secret is created, updated, shared, or revealed.
The goal is practical privacy: secrets remain usable by the people who need them, while plain-text exposure is kept away from casual workflows such as chat, email, and shared documents.
How this shows up in PassHero
Login and registration use OPAQUE protocol flows.
Client-side encryption is used before create and update operations.
Shared secrets are encrypted for the recipient before they are saved.
Vault views separate secret metadata from secret values.
FAQ
Can PassHero see my stored passwords?
PassHero is designed so secret values are encrypted before they reach the service and decrypted only by authorised users with the right key material.
Why does OPAQUE matter?
OPAQUE lets PassHero verify password knowledge without receiving the raw master password during login. That makes the zero-knowledge claim stronger than vault encryption alone.
