Decoy Phrase Generator

Inside the Decoy Phrase Generator, there are two main components: Mapping Maker and Text Generator. Both have different functions.

Mapping Maker
Text Generator

Transform sensitive text into decoy text. (such as seed phrases, passwords, private keys, and similar data)

Recover the original sensitive text

Create and generate the Mapping File

Recover or test decoy text to verify and preview the transformation results

How to Use Mapping Maker

1

Enter Your Sensitive Text in the ASCII Text Field

Place your seed phrase, password, private key, or other sensitive text into the ASCII Text field.

2

Click “Generate Draft Mapping”

Click the “Generate Draft Mapping” button to display the Draft Mapping table.

3

Fill in the Decoy Text Column in Draft Mapping

Fill the decoy text column in the Draft Mapping with the characters or words you want.

circle-info
  • To make this easier, use the “Bulk Edit” feature by selecting the target “Draft”, then enter your characters or words horizontally in the bulk field according to the number of ASCII columns shown in the draft mapping.

  • The draft mapping is arranged sequentially based on the ASCII characters found in the entered sensitive text, making it easier for users to fill in decoy values.

  • At this stage, you can already view and download your decoy text in decoy preview, which will be used as one of the required elements to recover your sensitive text later.

4

Fill in the Decoy Text Column in Final Mapping

After completing the Draft Mapping, it will automatically be transferred into the Final Mapping and filled according to the system order. Your task is to fill in the remaining empty decoy text columns.

circle-info

Decoy text entered in the Draft Mapping is automatically mapped into the Final Mapping according to the standard ASCII order:

  • Uppercase letters (A–Z)

  • Lowercase letters (a–z)

  • Numbers

  • Spaces

  • Symbols

circle-exclamation
triangle-exclamation
5

Download Final Mapping and Decoy Text

Download the Final Mapping and Decoy Text by clicking the download icon.

triangle-exclamation

How to Recover Your Original Sensitive Text

1

Select Decoy → ASCII Mode

Choose the Decoy → ASCII mode to indicate that you are recovering sensitive text from a decoy text using an ASCII-based mapping.

circle-info

This mode tells the system to interpret the decoy text according to the ASCII mapping rules.

2

Enter Your Decoy Text

Paste or type your generated Decoy Text into the input field.

circle-exclamation
3

Upload Your Mapping File

Upload the corresponding Mapping File that was generated when you created the decoy text.

circle-info

This file contains the transformation rules required to reconstruct your original sensitive text.

circle-exclamation
4

Click “Generate Result”

Click the “Generate Result” button to start the recovery process.

circle-info

The system will reconstruct and display your original sensitive text based on the uploaded mapping file and the provided decoy text.

Last updated