Quote from: LouisCyphre on July 27, 2012, 03:27 pmQuote from: pine on July 26, 2012, 05:50 amProtip: Don't use the same or similar a password as that which you use on SR or the forums, also on any common web based service like Facebook, Gmail, Hotmail et al. That would catch out many people, what do you think are the odds that certain organizations receive a copy of the password list before they get stored in an encrypted database. Probably it is defacto state policy in many places once a corporation reaches a certain significance to install 'audit' software for 'Data Protection' or 'Consumer Protection' or what have you. I mean, that's what I would do. So I don't.ber-protip: Use a decent password manager like KeePass (Windows) or KeePassX (Linux and OS X) to generate complex random passwords and store them for you in an encrypted format.Hmmmmm, while I like the idea of doing that, because it is more secure and more convenient, I have always stayed away from such solutions in the past. This is because I didn't want a central point of failure by either an interception or me simply screwing up by losing my password.But... if you had a OTP for accessing the password manager, then I would be happy, because I could both have multiple encrypted database backups + ber-Security at the point of entry.Are there such solutions? Seems to me to be an obvious positive development, but a precursory look around yields nothing.