No revealing in plaintext, no copying to clipboard
tl;dr: PlusPassword is:
…………………………………………………………………………………………………
Sharing password.
1. Set security options such as:
2. Generate access link.
3. Share link.
Accessing password.
1. Install browser extension.
2. Decrypt & paste password into password input field via browser extension. (Never revealed in plaintext or copied to clipboard.)
* With enough malicious intent, one technically can see the plaintext of the password by inspecting the value attribute of the password input field or listening to the POST request when the form is submitted (although most websites only send the hash of the password over the wire). But the thing is, if someone has that much malicious intent to begin with (i.e. going out of their way to dig up the plaintext of the password), you probably shouldn't be sharing the password and giving this person access to your account anyways.
** We never store anything on our servers that can ever decrypt your encrypted passwords (zero-knowledge). We use PBKDF2 (with 101,004 iterations) for key derivation and AES-GCM for symmetric encryption, both utilizing the Web Crypto API. PlusPassword is developed adhering to the compliance requirements of SOC 2 (PlusIdentity is SOC 2 Type II compliant).