Tether Introduces PearPass as a Peer-To-Peer Password Management Application


Tether Introduces PearPass as a Peer-To-Peer Password Management Application


Tether has announced the launch of PearPass, a password management application that does not rely on centralized servers or cloud-based storage. 

According to the company, the application is designed so that login credentials remain stored on users’ local devices rather than on external infrastructure.

Tether stated that PearPass uses a peer-to-peer architecture to synchronize credentials directly between selected user devices. 

The company said the system avoids the use of third-party intermediaries or centralized databases, with encrypted data shared only across devices controlled by the user. 

Recovery and synchronization are handled using cryptographic keys held by the user, rather than external services.

The release comes amid ongoing concerns about large-scale data breaches and credential leaks affecting cloud-hosted password management services. 

Tether said that by removing cloud storage, PearPass is intended to reduce risks associated with centralized data repositories and network-based attacks.

The company positioned PearPass within its broader development efforts focused on decentralized and user-controlled technologies. 

Tether said the application is intended to give users direct control over credential storage and synchronization, without reliance on institutional or corporate custodians.

“Every major breach proves the same point: if your secrets live in the cloud, they’re not really yours,” said Paolo Ardoino, CEO of Tether. 

“PearPass removes the single point of failure. No servers, no intermediaries, no back doors. Recovery and synchronization across users’ devices happens peer-to-peer, with your keys, under your control, without gatekeepers. This is security that can’t be switched off, seized, or compromised, because it was never in someone else’s hands to begin with.”

According to Tether, PearPass offers local credential storage with peer-to-peer synchronization, end-to-end encryption, and a built-in password generator, and has been independently audited by Secfault Security. 

The application uses open-source cryptographic libraries, does not rely on external recovery systems, is designed to function during outages, and is part of the Pear ecosystem, where it is described as the first fully open-source application.

Share this article

The link has been copied!





Source link