Here's the tool: https://github.com/skeeto/passphrase2pgp
Why do this?
Much easier than typing it from a piece of paper! And means you can send that secure email / open your self-hosted password manager directly on any machine.
But wait - can't it be brute-forced?
Actually no, not easily - there's "proof of work" involved. Quote from the website:
Isn't generating a key from a passphrase foolish? If you can reproduce your key from a passphrase, so can any one else!
In 2019, the fastest available implementation of Argon2id running on the best available cloud hardware takes just over 6 seconds with passphrase2pgp's default parameters. That's 6 seconds of a dedicated single CPU core and 1GB of RAM for a single guess. This means that at the current cloud computing rates it costs around US$50 to make 2^20 (~1 million) passphrase guesses.
A randomly-generated password of length 8 composed of the 95 printable ASCII characters has ~52.6 bits of entropy. Therefore it would cost around US$ 158 billion to for just a 50% chance of cracking that passphrase. If your passphrase is generated by a random process, and it's at least this long, it is not the weak point in this system.
Does anyone have thoughts on this?