(no title)
ravloony | 9 years ago
Also by using GPG as an encryption mechanism it allows you to use your gpg-agent so you only have to authenticate when you log in to your computer.
Basically it relies on existing tools to solve existing problems (sync, encryption) and concentrates on the added value: listing, storage and retrieval of passwords.
A greatly useful application of the unix philosophy.
No comments yet.