You can do so if you like, but personally, i always found keyrings to be security theatre, unless they are set up to ask for confirmation on every access, which almost no one ever does. And note that some systems, especially linux ones may not have a functional keyrin at all, so you will need to have a fallback mechanism in place as well.
|