Runtime status
Everything required for password stretching, AEAD decryption, and bech32 conversion ships directly with this page.
Bring your ncryptsec, pull the plug, and recover the private key entirely inside this single, auditable HTML file.
Everything required for password stretching, AEAD decryption, and bech32 conversion ships directly with this page.
No telemetry, no calls home, no external dependencies. Take your device offline, paste your encrypted key and password to extract the 32-byte secret HEX and its bech32 nsec.
Follow these steps each time you unlock your nsec from a NIP-49 secret.
Save this HTML file and open the page in your browswer, then disable Wi‑Fi and/or unplug Ethernet, the "Decrypt your ncryptsec" window will activate.
Enter the full ncryptsec string and your password. The app derives the scrypt key and attempts XChaCha20-Poly1305 decryption locally.
Copy the 32-byte hex key or the regenerated nsec. Re-enable your connection only after you have safely stored the output.
A curated bundle of battle-tested libraries, baked directly into the source so you can inspect every byte.
crypto_aead_xchacha20poly1305_ietf_decrypt for authenticated decryption.ncryptsec payloads and emit friendly nsec outputs.Keep your keys safe with these quick reminders.
You don't need to trust anyone to run this code.