Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

Backup, archivization, password managers, the list is long. Duplicity has many users: http://duplicity.nongnu.org Pass is also pretty popular on HN: https://www.passwordstore.org Both use GPG.


I use pass and I would switch in a heartbeat to a fork of it that used ssh keys or something similar instead of gpg. For something so amazingly simple and useful, its dependence on the klunky mess that is gpg key management is an anchor that weighs it down.


Key management is a burden in every cryptosystem. I'm using KeePass and can recommend it, it works well.


Would you know if it failed?


If it would "fail" and there would be no consequences so I could't tell if it failed or not - would it make a difference?


If the failure were discovered by you a year later, realizing that all you thought was protected was in an adversary's hands.

I'm suggesting that "seems fine so far" is not effective at evaluating solidity of cryptographical usage.




Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: