Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

How do you make sure that file does not end up corrupt?


copies and replication

I have used Keepass since before lastpass existed and sync with multiple machines/locations via syncthing (originally synced with rsync)


This. I have enough devices under frequent use of the keyfile that the chance of each of them beings corrupt is extremely unlikely (n>=3 at any given time).

That being said, not an approach useful for all and a good mental model and sharing system with redundant copies on flash media / live systems/ mobile devices can be an effective strategy.

Use case: 10+ year keepass user, never lost a credential or had one compromised that affected more than one account due to breach. Thank you Keepass devs!


So what if it does? Worst case you just go through the account recovery process at each institution. Password managers are a convenience. Data integrity isn’t critical but security is.


> Worst case you just go through the account recovery process at each institution

Well, worst case is your account with Google, which you can kiss goodbye.

But as we all know, that’s security. If the account recovery is the weakest link, it gets attacked.


That's insanity of cybersecurity.

In the real world, there's always a recovery procedure. It might involve visiting a court or some local administrative offices, but you can always recover access to anything that's important.

Not so with Google, or other on-line services that came from the tech industry side. Cybersecurity "best practices" is basically giving you a razor blade, and kicking you out if you hurt yourself with it.


More importantly, how do cloud providers make sure of that?


Why does my USB stick in a fire safe care what cloud providers think?


Redundant encrypted backups, error-correcting codes.




Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: