Decoy Phrase Generator
Inside the Decoy Phrase Generator, there are two main components: Mapping Maker and Text Generator. Both have different functions.
Transform sensitive text into decoy text. (such as seed phrases, passwords, private keys, and similar data)
Recover the original sensitive text
Create and generate the Mapping File
Recover or test decoy text to verify and preview the transformation results
How to Use Mapping Maker
Fill in the Decoy Text Column in Draft Mapping
Fill the decoy text column in the Draft Mapping with the characters or words you want.
To make this easier, use the “Bulk Edit” feature by selecting the target “Draft”, then enter your characters or words horizontally in the bulk field according to the number of ASCII columns shown in the draft mapping.
The draft mapping is arranged sequentially based on the ASCII characters found in the entered sensitive text, making it easier for users to fill in decoy values.
At this stage, you can already view and download your decoy text in decoy preview, which will be used as one of the required elements to recover your sensitive text later.
Fill in the Decoy Text Column in Final Mapping
After completing the Draft Mapping, it will automatically be transferred into the Final Mapping and filled according to the system order. Your task is to fill in the remaining empty decoy text columns.
Decoy text entered in the Draft Mapping is automatically mapped into the Final Mapping according to the standard ASCII order:
Uppercase letters (A–Z)
Lowercase letters (a–z)
Numbers
Spaces
Symbols
You may use Auto Fill if the decoy text you entered in Draft Mapping consists of English words and random characters (1–4 characters).
If you used a different language or pattern that is not available in the Auto Fill options, you must manually fill the Final Mapping using the same language and pattern. This ensures that if the Final Mapping is found independently, it does not form a different or suspicious pattern.
To make this easier, use the “Bulk Edit” feature by selecting the target “Final” to quickly fill the remaining empty decoy columns.
How to Recover Your Original Sensitive Text
Last updated
