blindpass: Password entry tool

[ gpl, library, program, utilities ] [ Propose Tags ]

Please see the README on GitHub at

[Skip to Readme]
Versions [faq] 0.1.0
Change log
Dependencies base (>=4.7 && <5), blindpass [details]
License GPL-3.0-only
Copyright Jonathan Lamothe
Author Jonathan Lamothe
Category Utilities
Home page
Bug tracker
Source repo head: git clone
Uploaded by jlamothe at 2020-12-11T22:21:02Z
Distributions NixOS:0.1.0
Executables blindpass
Downloads 18 total (3 in the last 30 days)
Rating 2.0 (votes: 1) [estimated by Bayesian average]
Your Rating
  • λ
  • λ
  • λ
Status Hackage Matrix CI
Docs available [build log]
Last success reported on 2020-12-11 [all 1 reports]


[Index] [Quick Jump]


Maintainer's Corner

For package maintainers and hackage trustees

Readme for blindpass-0.1.0

[back to package description]


Your Rights

Copyright (C) 2020 Jonathan Lamothe

This program is free software: you can redistribute it and/or modify it under the terms of the GNU General Public License as published by the Free Software Foundation, either version 3 of the License, or (at your option) any later version.

This program is distributed in the hope that it will be useful, but WITHOUT ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU General Public License for more details.

You should have received a copy of the GNU General Public License along with this program. If not, see


This is a simple program that allows you to enter a command that requires a password without leaving a record of that password in hour history file.

Instead of running a command as:

somecommand my-super-secret-password

You can instead enter:

somecommand `blindpass`

You will then be prompted twice for a password (whithout echoing to the screen). If the passwords match, the password will be passed to your command as though it had been entered from the command line. If the passwords do not match, you will be prompted again. No record of this password will be kept anywhere.