Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

I put a tiny Truecrypt container on my file hoster (HiDrive, Skydrive, Dropbox, etc.) in which I store the KeePass keystore. The keystore itself can't get decrypted, but in case AES has weaknesses one first needs to crack the triple encryption of AES+Serpent+Twofish of the Truecrypt container.


You've added another dependency into the mix here.

I've been comfortable storing my database in Dropbox, with a decent length master password (15char+) on the assumption that it uses a high quality hash that would make bruteforcing the encryption impractical, without having to add another layer of encryption above it. Curious if others feel this is a reasonable assumption?


I do that and keep a Key file locally off Dropbox. The combination should be pretty secure.


I do the same. 20+ character master password and Dropbox. Not worried at all.




Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: