Mapping Maker

What Is the Mapping Maker

Mapping Maker functions as the core transformation engine within the Decoy Phrase system. This component takes the original sensitive data as input and produces two separate outputs that have no meaning or value when standing alone.

The primary roles of the Mapping Maker include:

  • Generating decoy text that appears normal and non-suspicious

  • Generating a mapping file that serves as a technical guide for recovering the original data through the Text Generator

What it contains

Mapping Maker provides a set of components and information designed to help users create decoy text and mapping files accurately, consistently, and securely.

1. ASCII Text

The primary input field for entering a seed phrase, password, or other sensitive text.

circle-check

2. Details

This section displays statistical summaries of the text entered in the ASCII Text field, including:

chevron-rightTotal Charhashtag

The total number of characters in the text, including:

  • Uppercase letters (A–Z)

  • Lowercase letters (a–z)

  • Numbers

  • Symbols

  • Spaces

chevron-rightSymbolshashtag

The number of symbol characters in the text.

chevron-rightWordshashtag

The total number of words in the text.

chevron-rightMax Frequencyhashtag

The highest occurrence count of any single character in the text. This value is used as the basis for calculating the final mapping size.

chevron-rightFinal Slotshashtag

The total number of slots in the final mapping, calculated using the formula:

95 standard ASCII characters × Max Frequency

This value determines the final size of the mapping file.

chevron-rightFilled Slotshashtag

Indicates how many decoy slots have already been filled.

  • The final mapping cannot be saved if there are still empty slots

  • This ensures the mapping file is always complete and valid


3. Draft Mapping

Draft Mapping is a temporary mapping provided to help users fill in decoy values more easily.

Its purposes include:

  • Acting as a preparation stage before generating the final mapping

  • Preventing users from having to work directly with a very large table

  • Serving as the primary interface during the decoy text creation process

The final mapping will contain all 95 standard ASCII characters, with each character repeated until it reaches the Max Frequency value.

For example, with a 12-word seed phrase, the final mapping may contain thousands of entries (e.g., 95 × ~20), making Draft Mapping essential for keeping the user experience manageable.


4. Decoy Preview

A preview of the decoy text generated from the Draft Mapping.

circle-info
  • This preview is the actual decoy text

  • The decoy text must be saved by the user

  • It is used together with the mapping file during recovery


5. Bulk Edit Decoy Values

A feature that allows mass editing of decoy values without modifying them one by one through the table. It can be applied to:

  • Draft Mapping

  • Final Mapping

This feature significantly speeds up large-scale decoy text adjustments.


6. Final Mapping

The Final Mapping is the completed mapping file generated by the Mapping Maker.

circle-info

Key characteristics:

  • Serves as the primary reference for recovery in the Text Generator

  • Must be used together with the decoy text

  • Does not contain ASCII Text, Decoy Preview, or Draft Mapping.

  • Has no meaning or value on its own

  • Sequential pattern of the 95 standard ASCII characters, repeated until Max Frequency is reached.


7. Auto Fill

Auto Fill is a method for automatically filling any remaining empty decoy slots in the final mapping.

Available modes include:

chevron-rightEnglish Wordshashtag

Uses approximately 460,000 English words

chevron-rightRandom 1 Charhashtag

One random ASCII character

chevron-rightRandom 2 Charhashtag

Two random ASCII characters

chevron-rightRandom 3 Charhashtag

Three random ASCII characters

chevron-rightRandom 4 Charhashtag

Four random ASCII characters

circle-check

Separation by Design

The Mapping Maker is built on a separation by design principle, enforcing security from the earliest stage.

This principle ensures that:

  • Decoy text and the mapping file are always created as two separate artifacts

  • No single file has standalone value or risk

  • The Final Mapping contains only the finalized mapping structure

circle-check

Recovery can only be performed intentionally by the user through the Text Generator

Last updated