she/her

  • 10 Posts
  • 375 Comments
Joined 1 year ago
cake
Cake day: August 3rd, 2023

help-circle





















  • You mentioned cloud, and that’s really not needed. If you need sync, you can use a P2P service like Syncthing, and while your data is transmitted over the Internet, any threat actor would need to

    a) identify your device IDs and intercept your traffic b) crack the encryption of the network traffic c) crack your password d) (if you used a key file, crack that as well)

    If that is not safe enough for your threat profile, sure, don’t use a password manager, but at that point you got bigger problems