Authentication Reimagined

It's about time to
change your password.

Fuzzypass uses cued recall to help you remember 100 bits of entropy. A truly secure passphrase that's actually memorable.

No more Tr0ub4dor&3 vs Tr0ubad0r&3. Remember associations, not specifics.

Free forever with Locke ID. Patent pending.

The Problem

Chances are your password is weak

Weak passwords

Not Enough Entropy

99% of passwords people choose will never provide enough entropy to securely encrypt data. Most can be cracked in hours.

Hard to remember

Impossible to Remember

Humans are famously bad at remembering exact information. Which letter did you capitalize? Where was the exclamation mark?

Device dependency

Passkeys Need Devices

Passkeys are great, but they require possession of a device. A strong password lives only in your brain—no hardware needed.

The Solution

Fuzzypass leverages cued recall

Human memory is unintuitive. It's much easier for us to remember fuzzy associations than exact pieces of information.

With Fuzzypass, you pick 8-12 words. Each word is associated with a numbered "lock"—a number from 1-10, each with a distinct color and symbol. When you login, you only need to remember 3 words at a time.

check_circle Remember 30% of your secret to authenticate
check_circle Error-correction when your memory is "fuzzy"
check_circle ~100 bits of entropy with 10 words
Fuzzypass login interface showing numbered locks with colors and symbols

Security

~100 bits of entropy
you can actually remember

We use the cryptographic concept of perplexity to measure the predictability of your word sequence. Fuzzypass guides you toward phrases that are grammatically correct but semantically strange—maximizing entropy while remaining memorable.

Coherent sentence (8 words) ~45 bits
Fuzzypass nonsense phrase (8 words) ~90 bits
Fuzzypass (10 words) ~100 bits
Fuzzypass (12 words) ~155 bits

10

words recommended

3

words to login

720

permutations (+9 bits)

Security Properties

Defense in depth

devices

Device-Bound 2FA

Known devices use a local 256-bit key for automatic 2FA. New devices require your full Fuzzypass.

shuffle

Rotating Permutations

Different 3-word combinations each attempt. Attackers must track all 720 permutations.

visibility_off

Shoulder Surf Resistant

Observers can't determine which words map to which numbers by watching a single login.

keyboard

Keylogger Resistant

Capturing 3 words doesn't reveal your full Fuzzypass or which words map to which locks.

psychology

Perplexity Scoring

We measure your phrase's predictability and guide you away from common patterns.

enhanced_encryption

Full Entropy Backup

Your backup key is encrypted with all 10 words—~100 bits for strong single-factor recovery.

How Fuzzypass compares

Password
Passkey
Fuzzypass
High entropy (80+ bits)
Rarely
check
check
Actually memorable
close
N/A
check
No device required
check
close
check
Error correction
close
N/A
check
Works on any device
check
close
check