Classic Yandex.Browser applies additional password protection against:
Identical passwords. This is a serious threat to security. By getting the password to one account, an attacker can gain access to all the other accounts.
For example, if you use the same password for your online bank and for an online store, employees of the online store can get access to your personal bank account without you knowing it.
It is particularly dangerous to use the same password for HTTPS and HTTP websites. Because passwords for HTTP websites are not encrypted, they can be intercepted by hackers who can use these passwords on an HTTPS website to steal personal data or money.
Once you enter a password on an important website, classic Yandex.Browser uses it to create a fingerprint (hash) and saves it in its database. When you enter passwords on other websites, the browser compares their hashes with the ones in its database. If a match is found, the browser doesn't send your password to the server until you confirm that you want to use the same password on multiple websites:
Passwords for important sites are saved by classic Yandex.Browser as hashes. Because passwords are not stored as plain text, malicious users will not be able to get access to your personal information even if they steal the password database.
Cryptographic hashing helps transform a password into a unique character sequence that can be easily used for password identification, but it is practically impossible to restore an original password using it. For example, the text “hello” after hashing becomes “2cf24dba5fb0a30e26e83b2ac5b9e29e1b161e5c1fa7425e73043362938b9824”.
Yandex.Browser uses the SCrypt algorithm for hashing. This algorithm generates a hash using not only the central processor, but also multiple read/write operations in the memory. Such an approach makes it difficult to crack passwords. For example, a hacker will not be able to use video card acceleration for brute force hacking. The SCrypt algorithm is used, for example, in LiteCoin crypto currency.
As a result, it will take a malicious user more than 100 years to match a six-digit password that includes uppercase letters, lowercase letters, numbers, and special characters.