Yandex.Browser applies additional password protection against:
Identical passwords. This is a serious security threat. By getting the password to one account, an attacker can gain access to all the other accounts.
For example, if you use the same password for your online bank and for an online store, employees of the online store can get access to your personal bank account without you knowing it.
It is particularly dangerous to use the same password for HTTPS and HTTP websites. As passwords for HTTP websites are not encrypted, they can be intercepted by hackers who can use these passwords on an HTTPS website to steal personal data or money.
Once you enter a password on an important website, Yandex.Browser uses it to create a fingerprint (hash) and saves it in its database. When you enter passwords to other websites, the browser will compare their hashes with the database. If a match is found, the browser will ask you to confirm that you want to use the same password on several websites before sending your password to the server:
Yandex.Browser protects passwords to popular websites such as VK or Mail.ru. The browser makes a list of important websites, but you can add websites you need (for example, a website where you make online payments).
Passwords for important sites are saved by Yandex.Browser as hashes. Because passwords are not stored as plain text, malicious users will not be able to get access to your personal information even if they steal the password database.
Cryptographic hashing helps transform a password into a unique character sequence that can be easily used for password identification, but it is practically impossible to restore an original password using it. For example, the string “hello” after hashing can be transformed into the sequence “2cf24dba5fb0a30e26e83b2ac5b9e29e1b161e5c1fa7425e73043362938b9824”.
Yandex.Browser uses the SCrypt algorithm for hashing. This algorithm generates a hash using not only the central processor, but also multiple read/write operations in the memory. Such an approach makes it difficult to crack passwords, so as an example, a hacker will not be able to speed up brute force hacking using the video card processor. The SCrypt algorithm is used, for example, in LiteCoin crypto currency.
As a result, it will take a malicious user more than 100 years to match a six-digit password, including uppercase letters, lowercase letters, numbers, and special characters.