I just use a simple text file and gpg.
Exactly how I manage my passwords. No browsers to fail or be compromised, no phones to lose / break / be compromised, and no paper copies.
With multiple (tons of?) OS and embedded OSes around, as long as one has my
I have to admit that I figured out, very early, that this poster was baiting to feed his ego (otherwise, he would have engaged with some of my questions). And even though the topic was fairly interesting (I would have been glued to more appropriate responses), I called him out and took him down. This is NOT a good example of appropriate behavior by anyone and I am speaking for myself, even though it takes two people for an argument. I could have stopped the thread very early, I could have just let him feed his ego and be done with it, or I could have saved everyone a lot of time and not replied at all.
Although it could be said that the OP / Submitter *might* take a word or two to heart and that, of itself, is a benefit, I believe that the time involved is more precious and, therefore, this thread should have been avoided.
The OP may return to this thread and post even more delirious nonsense - I recommend ignoring the rest of this thread.
The weight of knowing there are better examples to display to myself, mostly, is heavy enough to keep my away.
He has not acquired a fortune; the fortune has acquired him. -- Bion