<div dir="ltr"><div class="gmail_extra"><div class="gmail_quote"><blockquote class="gmail_quote" style="margin:0px 0px 0px 0.8ex;border-left:1px solid rgb(204,204,204);padding-left:1ex">we really need some kind of FAQ on this - this question is asked about<br>
once a month.<br></blockquote><div><br><div>Sorry for opening this can of worms again. I had searched
<a href="http://lists.zx2c4.com">lists.zx2c4.com</a> for things like "map" and "mappings" but didn't find any
related threads. :(<br><br></div><div>The fact that this is asked repeatedly maybe shows that it's not as clear to everyone so maybe it's worth mentioning this on <a href="http://passwordstore.org">passwordstore.org</a>.<br></div><div><br></div><blockquote class="gmail_quote" style="margin:0px 0px 0px 0.8ex;border-left:1px solid rgb(204,204,204);padding-left:1ex">
now let's take a look at your threat model. There are three cases:<br>
1) someone has access to your git and can see your folder structure.<br>
2) someone has access to your harddisk<br>
3) someone has access to your system while it is on and can read your<br>
home directory<br></blockquote><div><br>2) and 3) were actually not my
concern (due to the reasons given in your response and last week's
thread). I was actually worried about 1) though since backing up and syncing passwords through a remote repository would be part of my workflow. That being said, it looks like
git-remote-gcrypt is a viable way around this. Thanks, I wasn't
aware this existed! :)<br></div></div></div></div></div>