Mixture
In my case it was a single point of failure. Me. (re post #17)
Those regular USB stick copies (nested duplicates) + to my suprise, an encrypted copy of my Passwords in the "cloud" came in very handy. After 7 years use I had to really work hard to re establish a working system and I thought I was safe.
To back up your post - The rule of multiple paths of redundancy applies to everyone.
Re the later post, the bad ones and they are clever, will no doubt have a treasure trove, of grief, using techniques that cannot really be discussed here that could be applied across "families of operating systems"
To really look at the dark side of things, like the well known abuse of cryptography now being applied for extortion.
CAT III
Last edited by Guest 112233; 21st Dec 2013 at 22:14.
Reason: Clarification