![]() Maybe you have threat scenarios that mean the sacrifice is worth those gains for you, but for me (and most users, I'd guess) it would be paranoia and unnecessary hassle. Your "careless" is me not wanting to significantly increase the complexity and difficulty of using my password manager, something I use daily, for what I consider negligible benefit. The "harm" of the redundant encryption comes from decreased usability. It is used to maintain a user's list of pass. But since I use Drive, if they have access to my storage they likely have access to my primary email as well, in which case most of my accounts are already potentially compromised anyway. KeePass2 is an Open Source application available on Apple, Android, Windows, Linux, and other operating systems. Someone with that much info about me already knows a lot more important things about me than the modification date of my password manager. The only scenario I can dream up where that might actually matter, is if someone already suspects I created or modified an account login at a certain date, had already traced the account back to me, somehow gained access to my cloud storage, and.now I guess they have one more piece of circumstantial evidence that I modified an account at the time of interest. Size of the file and modification date I do not see as particularly sensitive. Mobile apps allow you to access the password database from your smartphone or tablet. At this point, please do not panic: If the file falls into the wrong hands, it will be worthless without the associated master password. ![]() ![]() I do not consider it an information leak that an encrypted file on my cloud storage contains KeePass data. To make KeePass cloud-ready, the file can be synced via any cloud provider (Dropbox, Google Drive, OneDrive, NextCloud). The fact that I use KeePass is basically public information.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |