WelcomeUser Guide
ToSPrivacyCanary
DonateBugsLicense

©2025 Poal.co

924

You're basically giving out a nicely categorized and updated list of all your possible aliases and their credentials to whomever owns the company.

If you don't control the servers that contain your data, it's not safe.

You're basically giving out a nicely categorized and updated list of all your possible aliases and their credentials to whomever owns the company. If you don't control the servers that contain your data, it's not safe.

(post is archived)

[–] 2 pts

You don't have to control the server, just make sure the server doesn't touch the key. Decrypt locally, with FOSS tools. So long as you keep the key off the cloud, the files are completely safe. If you're telling their website your key to decrypt, there's no guarantee it's not stealing your key - your data privacy is a fiction.

that too.

do you know of any services that do this?

what do you recommend for storing passwords, especially for macos?

[–] 1 pt

Stickynotes all over your house.

really important passwords should be memorized.

dang thats hardcore, but I'm more or less thinking about things like keepass, etc

but thats actually a bad method because the FBI could just raid your house and you would be fucked in the ass

Sadly I wouldn't know for macos. Though, if you use something like chrome, there's an extension call ChromeIPass (Might be an I or L, can't 100% remember) if you use it with keypass (local keystore) you can autofill forms based on urls.

I'd search for better options on macos though.