
Naturally this will limit the number of places from which you can access your password protected stuff. A highly paranoid user will never enter their passwords from a machine they do not control, and only ever send passwords over the Internet via https.

See for more details.Īny security measure you take will be a trade off between convenience and security. I actually use this technique (with modifications to increase entropy by including numbers and punctuation) to create master passwords that are very secure which I can remember. difficult to crack) passwords that are still memorable. Create passwords by using the first letter of long phrases as this will enable you to generate long (i.e. If you want to avoid password managers entirely but still have memorable passwords, then I recommend the approach advocated by University of Cambridge security researcher Ross Anderson.
#Lastpass pocket for mac install
Of course, if they have enough access to install a keylogger, they may well have enough access to grab your database file off your local storage anyway.

Another possibility is to keep your password database on a Truecrypt encrypted USB key, or encrypted in some way on your iPhone rather than an online file sharing service, making it even trickier to get hold of your password file, as it will never be stored anywhere except where you physically are. Your account will be pre-associated with your computer, and you will not be typing in your Dropbox password, so there's little chance of them grabbing it with a keylogger.

You can minimise the risk of it by using the Dropbox client rather than accessing Dropbox over the web. The scenario you suggest is theoretically possible.
