Practicalities, implementation, and weaknesses of simple symmetric encryption for plain text files

For about 20 years, I’ve been using gnupg to encrypt a plain-text file containing my passwords. (The actual per-site passwords are generated using a hash function.) It’s worked OK for me, but gnupg is a very heavy-weight system that’s real… Continue reading Practicalities, implementation, and weaknesses of simple symmetric encryption for plain text files

What is the best way to protect public keys sitting on server against MITM attack with this zero-trust & end-to-end secure structure? [closed]

This one is a handful to describe. I’ve got on offline first stricture, server is only used for client database sync. This is a zero-trust structure. I don’t care how secure my BaaS provider is, how secure my server is or who my threat act… Continue reading What is the best way to protect public keys sitting on server against MITM attack with this zero-trust & end-to-end secure structure? [closed]