Quote:
Originally Posted by jbjb
That's why I like my home-brew approach. I'm the only one who uses it, so it's not a high value target, is very unlikely to be vulnerable to any exploits of known commercial systems, and nothing is stored in the cloud.
|
You're hardly the only person who uses an encrypted file. And I wouldn't necessarily say it is harder to attack than something built into a browser, only that the attack vectors are different. For example, do you use a cloud backup solution like Backblaze, or a cloud sync solution like OneDrive or Dropbox?
It's things like these which are why I suggest and recommend paper.