Limitations
Explicit limitations to set accurate expectations:
- No password recovery. Zero-knowledge means no backup.
- No semantic validation of outputs.
- No guarantee of external system compatibility.
- No protection against local device threats.
- Not a replacement for production crypto libraries.
- No legal or compliance advice.
- No protection against all attack vectors.
What These Tools Actually Do
| Feature | Supported |
|---|---|
| Client-side encryption | ✓ Yes |
| Browser-based hashing | ✓ Yes |
| Local password generation | ✓ Yes |
| Zero data transmission | ✓ Yes |
| Server-side processing | ✗ No |
| Data recovery | ✗ No |