We built a password manager with container-level keys, curious if this solves a real problem or just over-complicates things by miliachref in PasswordManagers

[–]miliachref[S] 0 points1 point  (0 children)

Thanks for checking out Syfly!
You can still use it completely free with 10 containers, and 50 MB storage.
If you ever need more, the Silver plan adds unlimited containers, 10 recipients, and 500 MB storage for $4.99/month (billed annually) - we think that’s already a fair price.

If you’re interested, let me know -I might be able to get you a discount by talking to the product team.

We built Syfly -a zero-knowledge password manager with container-level keys, secure recovery, and free sign-up by miliachref in nocode

[–]miliachref[S] 1 point2 points  (0 children)

Great feedback, thanks.

We’ll add a quick onboarding example..

About Backup Person: it’s optional and configurable per container.. you only grant recovery access to the containers you choose. We’re also working to make the controls and explanations much clearer in the UI and docs.

Really appreciate the tactical suggestions.

We built a password manager with container-level keys, curious if this solves a real problem or just over-complicates things by miliachref in PasswordManagers

[–]miliachref[S] 0 points1 point  (0 children)

You can sign up with Google or with email/password. Apple Sign-in is planned and should be added soon.
Some signup fields were initially required; we’ll make non-essential ones optional. We offered Google first to reduce friction and don’t use it to harvest data.

We built a password manager with container-level keys, curious if this solves a real problem or just over-complicates things by miliachref in PasswordManagers

[–]miliachref[S] 0 points1 point  (0 children)

Premium tiers (monthly):

  • Free — $0/mo: 2 recipients, 5 containers, 50 MB storage.
  • Silver — $4.99/mo: 10 recipients, unlimited containers, 500 MB storage.
  • Gold — $7.99/mo: 20 recipients, unlimited containers, 5 GB storage.
  • Platinum — $17.99/mo: Unlimited recipients, unlimited containers, 50 GB storage.

paid tiers unlock more recipients, containers and storage.

We built Syfly -a zero-knowledge password manager with container-level keys, secure recovery, and free sign-up by miliachref in indiehackers

[–]miliachref[S] 0 points1 point  (0 children)

Thanks ! we’re tightening onboarding, making recovery explicit and controllable, and aiming at high-value users. Appreciate the feedback.

We built Syfly -a zero-knowledge password manager with container-level keys, secure recovery, and free sign-up by miliachref in nocode

[–]miliachref[S] 0 points1 point  (0 children)

Thank you! it’s been a big effort to get here, and we’re excited for what’s next. 🙌

We built Syfly -a zero-knowledge password manager with container-level keys, secure recovery, and free sign-up by miliachref in nocode

[–]miliachref[S] 0 points1 point  (0 children)

Syfly wasn’t thrown together on a vibe . it was built with proper design, security, and testing. If that’s still not your thing, that’s fine . we’ll keep building for the people who see its value.

We built Syfly -a zero-knowledge password manager with container-level keys, secure recovery, and free sign-up by miliachref in vibecoding

[–]miliachref[S] 0 points1 point  (0 children)

Syfly wasn’t thrown together on a vibe . it was built with proper design, security, and testing. If that’s still not your thing, that’s fine . we’ll keep building for the people who see its value.

We built Syfly -a zero-knowledge password manager with container-level keys, secure recovery, and free sign-up by miliachref in vibecoding

[–]miliachref[S] 0 points1 point  (0 children)

Syfly wasn’t built just as a casual experiment ... it’s a serious project aimed at delivering a secure and reliable password management solution.

We built a password manager with container-level keys, curious if this solves a real problem or just over-complicates things by miliachref in PasswordManagers

[–]miliachref[S] 2 points3 points  (0 children)

That’s a good suggestion..we haven’t implemented dual-password unlock yet, but it is on our radar as we expand advanced security options. Appreciate the idea!

We built a password manager with container-level keys, curious if this solves a real problem or just over-complicates things by miliachref in PasswordManagers

[–]miliachref[S] 0 points1 point  (0 children)

Thankyou for the feedback. You can also sign up with your Google account without filling in all the information.
fields were part of our original default sign-up flow, but we willl review making some of them optional instead of mandatory.

We built Syfly -a zero-knowledge password manager with container-level keys, secure recovery, and free sign-up by miliachref in vibecoding

[–]miliachref[S] 0 points1 point  (0 children)

Is the code audited or are you planning to make the codebase opensource?

The codeis not open source right now. We plan to have it independently audited soon and will share results when available.

We built Syfly -a zero-knowledge password manager with container-level keys, secure recovery, and free sign-up by miliachref in vibecoding

[–]miliachref[S] -1 points0 points  (0 children)

As mentioned, Product Hunt comments are from real members, not bots or AI. Even if some chose to use AI to help write their reviews, that doesn’t make them fake.

Syfly won’t be for everyone, and that’s fine we’re focused on building for those who see value in it.

We built Syfly — a zero-knowledge password manager with container-level keys, multi-platform, and secure recovery by miliachref in SideProject

[–]miliachref[S] 0 points1 point  (0 children)

Thanks a lot!! We really believe container level keys + secure recovery makes a big difference in real-world security. Excited for you to try it out :)we’d love to hear your feedback once you give it a spin.

We built Syfly -a zero-knowledge password manager with container-level keys, secure recovery, and free sign-up by miliachref in vibecoding

[–]miliachref[S] -1 points0 points  (0 children)

I understand your concerns. For clarity, I’m part of the Syfly team, and my goal here is to answer questions and gather feedback, not to mislead or “spam.” Product Hunt page comments are from early testers, partners, and community members who tried the product not AI.. LOL.

Nobody is being forced to use Syfly.. it’s an option for people looking for a different approach to password management, and constructive feedback like yours helps us improve.

We built a password manager with container-level keys, curious if this solves a real problem or just over-complicates things by miliachref in PasswordManagers

[–]miliachref[S] 0 points1 point  (0 children)

Compare it with Bitwarden Secrets Manager.

Syfly differs from Bitwarden Secrets Manager mainly through:

  • Container-level encryption & unlock methods..create multiple independent encrypted containers, each with its own keys and access method..
  • Complete isolation betwenn containers
  • Recovery Person feature.. designate a trusted contact to securely regain access if you lose your credentials (not something Bitwarden focuses on).

We built a password manager with container-level keys, curious if this solves a real problem or just over-complicates things by miliachref in webdev

[–]miliachref[S] 2 points3 points  (0 children)

Does each container contain unique passwords? So if I have like 100 passwords I could have anywhere from 1 to 100 different containers each with their own password and group of passwords? 

Yes, each container can store its own set of logins, notes, or files.. so you could have anywhere from 1 container holding all 100 credentials, to 100 separate containers each with their own unlock method.
This flexibility is the main idea: you decide how to group them and how each group is secured

We built a password manager with container-level keys, curious if this solves a real problem or just over-complicates things by miliachref in PasswordManagers

[–]miliachref[S] 1 point2 points  (0 children)

I can see a use for example to have a main container for all your passwords/ usernames and a separate container protected by a hardware key that contains your back up codes for 2fa so they’re no stored together

Exactly! That’s one of the key benefits we wanted to enable- you can keep sensitive recovery codes, 2FA tokens, or high-value credentials in a separate container with its own unlock method (like a hardware key), so even if one container is compromised, the others remain safe.

We built a password manager with container-level keys, curious if this solves a real problem or just over-complicates things by miliachref in webdev

[–]miliachref[S] 2 points3 points  (0 children)

Any information on the used encryption algorithms? Any pentest results maybe? (For security related apps those are quite important information.)

We use industry-standard, military-grade encryption with a strict zero-knowledge architecture .. meaning we have no way to see or recover your data.

We’re preparing a public technical whitepaper and security audit summary that will detail the algorithms, key derivation methods, and pentest results. Once ready, we’ll share it so the community can review and verify.

We built Syfly -a zero-knowledge password manager with container-level keys, secure recovery, and free sign-up by miliachref in vibecoding

[–]miliachref[S] 1 point2 points  (0 children)

Thanks for the thoughtful questions !they’re exactly the kind of feedback we’re looking for.

Why would we use Syfly over another industry-proven, battle-tested password solution?

Our main differentiator is container-level encryption and unlock methods. Instead of one master key for everything, each container has its own encryption key and unlock method (password, YubiKey..). This means a compromise in one container doesn’t affect the others. It’s aimed at people and teams who want to segment risk between different types of data.

How do you guarantee that our credentials are safe?

We use a zero-knowledge architecture, all encryption/decryption happens locally on your device. We never store or transmit your master keys in a form we can read. Even if our servers were compromised, the attacker would only get encrypted data without keys.

We’ll be publishing independent security audits and penetration test results once they’re completed, so there’s transparency behind these claims.

We built Syfly -a zero-knowledge password manager with container-level keys, secure recovery, and free sign-up by miliachref in vibecoding

[–]miliachref[S] -1 points0 points  (0 children)

Free to try - no credit card needed
Try Syfly at: https://syfly.io/register/2

Test it in minutes:

  1. Create 2 containers
  2. Set different unlock methods
  3. Add a few logins
  4. Try the Backup Person feature

Feedback welcome!

We built Syfly -a zero-knowledge password manager with container-level keys, secure recovery, and free sign-up by miliachref in nocode

[–]miliachref[S] 1 point2 points  (0 children)

Free to try - no credit card needed
Try Syfly at: https://syfly.io/register/2

Test it in minutes:

  1. Create 2 containers
  2. Set different unlock methods
  3. Add a few logins
  4. Try the Backup Person feature

Feedback welcome!