This is not about proving CarryPass is unbreakable. It's about showing that a stateless password manager can remain secure — even when fully open and the master password is known — because guessing the right inputs is computationally hard.
Use the public CarryPass generator with this known master password:
Let’s assume the user owns an account at carrypass.net, and this master password was used to generate a login credential for that service.
Your task is to determine the exact combination of service input, password length, charset, and security number — and enter the correct variant of the generated passwords to solve the challenge.
Try to derive the password that grants access to this challenge.
Congratulations — you’ve successfully derived one password using CarryPass. But here's the key difference compared to a traditional vault:
This is what makes CarryPass resilient by design: you cracked one door, not the building.
Congratulations on completing the challenge! To have your solution evaluated, please send an email with the required information listed below.
📩 Email: info.carrypass@proton.me
📜 Please include the following in your email:
netseclover67
or John D.
)🔒 We only use this information to validate challenge submissions. For more information, please see our Privacy Policy.