> From: , Christopher J" <http://www.optum.com/~Chris> > Date: Thu, 18 Jun 2015 14:43:42 +0000 > > Is it a good or bad idea to have an encrypted file on your computer with your > passwords? That's what Keepass does. > I suppose you can use PGP to encrypt it? I do this. (I actually used GnuPG and openssl.) The major downside is that if someone gets the file and also has your master password, you're screwed. According to http://lifehacker.com/391555/best-free-ways-to-protect-your-private-files it looks like you can keep passwords in separate files. That would probably be the most secure way since, if a virus on your computer picks up the Keepass database file, that would be insufficient alone to break into your passwords. > -----Original Message----- > From: robert [http://dummy.us.eu.org/robert] > Sent: Thursday, June 18, 2015 10:39 AM > To: http://dummy.us.eu.org/noelleg > Cc: Flora ; Chris; Chris;, Christopher J;, > Christopher J; Alexander ; Alexander ; Alexander ; Tim > ; Bhavani; Bhavani; Bhavani; Marnie; Nicholas ; > Richard; Richard; Richard; Flora E ; Flora E > Subject: Re: Terms of Service; Didn't Read > > > From: Noelle <http://dummy.us.eu.org/noelleg> > Date: Thu, 18 Jun 2015 > > 06:49:15 -0700 (PDT) > > advice on passwords: > > > > http://www.truthdig.com/avbooth/item/video_edward_snowden_teaches_john_oliver_create_strong_password_20150617 > > Good ideas. I use cracklib-check to try to find my passwords each time I come > up with a new one to make sure it's strong enough. > > Also, as Noelle knows, Keepass can generate uncrackable (yet unmemorable) > passwords for you. > > My personal philosophy on this is to have 2 parts to a password: a memorable > part and then an unmemorable part. Write down the unmemorable part and keep > the memorable part in your head. It's unlikely that a hacker would have both > pieces. ('Tho, of course, this doesn't completely prevent the rubber hose > problem https://en.wikipedia.org/wiki/Rubber-hose_cryptanalysis .)