@anonymous@menherahair If you can't trust your own system, I recommend you cease running proprietary software. Keys have the advantage of not being replayable. Technically a sufficiently advanced password manager could change the password after every login, which would still be replayable in the case of a read-only mitm (lol), and also require compliance on the remote server's part. The only reason password managers exist in the first place is because certain servers don't give a fuck.
@Zerglingman@menherahair > If you can’t trust your own system
I don’t trust the external world more than I don’t trust my system. In fact I trust my system more than some of my own family members.
>Keys have the advantage of not being replayable.
Can’t someone just copy whatever you’re using for a key?
>certain servers don’t give a fuck.
All major servers to be accurate.
@anonymous@menherahair Your key never leaves your system (unless you are the average AWS customer and can't into keys kekw) So paras 1 and 2 are N/A: If you trust your system that much, storing a key on it is fine. It's never going anywhere else anyway. And, nobody can copy the key unless they get into your system. Unlike with a password where the actual auth gets transported.
@Zerglingman@menherahair >unless they get into your system
There would be the rub. I suppose what I am saying is that keeping your authentication is good, and virtually everything I do is local so it’s sort of a non-issue for me whether my email gets hacked or whatever. I’m more concerned about if the system is compromised somehow. Everything can be hacked, and there’s always the cops who will shoot you if you try to turn your computer off because fuck you that’s why.
@anonymous@menherahair No not like that. Just that if you have a key stored on a USB device that device could just be whatever you have sitting around.
@Zerglingman@menherahair Keys outside the system is a great idea, I just don’t see the practicality of that over writing down passwords in an obscure manner. At least as far as local goes. If the system ever becomes compromised you’re fucked no matter what you did, even if you use RAM disk (at least if you encrypt anyway)