#231338 - 09/03/11 11:30 AM
Re: Organizing the Important Documents Binder
[Re: Eugene]
|
Carpal Tunnel
Registered: 12/26/02
Posts: 2997
|
I have all my originals in my gun/fire safe at home. I saw the stories of people going back to NOLA to find their bank branch under water so the contents of their SDB were ruined. If we were ever in a similar situation where we had a couple days notice to leave like they did I want mine accessible to take with me.
|
Top
|
|
|
|
#231358 - 09/03/11 07:31 PM
Re: Organizing the Important Documents Binder
[Re: Eugene]
|
Old Hand
Registered: 03/03/09
Posts: 745
Loc: NC
|
If someone came to me with a "scanned" document, in this age of Photoshop and other programs like that - I would have to wonder.
Show me several documents with the same name and date, no problems there, no crook is going to go to a lot of work to scam someone, that's why they are crooks. But one, or two? I dunno.
This from the guy who is scanning documents tomorrow to start his binder. I will have hardcopies in the binder, originals are going to a SDB I get free, and 2d copies to a thumbdrive. I reckon if all the documents match so much the better.
Also, I have a list with important phone numbers and account/policy numbers that can be printed out after being reduced, rendering it wallet size. May take a magnifying glass to read, but better than nothing.
|
Top
|
|
|
|
#231362 - 09/03/11 08:59 PM
Re: Organizing the Important Documents Binder
[Re: Eugene]
|
Carpal Tunnel
Registered: 12/26/02
Posts: 2997
|
I suppose I should print a recent picture out, all our pictures are digital (thousands of them)
|
Top
|
|
|
|
#231368 - 09/04/11 02:08 AM
Re: Organizing the Important Documents Binder
[Re: Eugene]
|
Veteran
Registered: 09/01/05
Posts: 1474
|
And dont forget recent photos of your pets, along with spare ID tags, collar, leash and vaccination documents. Not all in the binder of course.
Oops, haertig already said it.
Edited by LED (09/04/11 02:09 AM)
|
Top
|
|
|
|
#231378 - 09/04/11 03:53 PM
Re: Organizing the Important Documents Binder
[Re: Eugene]
|
Pooh-Bah
Registered: 04/01/10
Posts: 1629
Loc: Northern California
|
If you're going to store info on the Internet, spend a little money and use a system that utilizes encryption technology. Your info can't be that important if you're not willing to spend $5 - $10 per month for a service that encrypts. By the way, a complicated password is not the same as encryption.
_________________________
If you're reading this, it's too late.
|
Top
|
|
|
|
#231390 - 09/04/11 09:08 PM
Re: Organizing the Important Documents Binder
[Re: haertig]
|
Pooh-Bah
Registered: 04/01/10
Posts: 1629
Loc: Northern California
|
I would encrypt all data myself, using a proven (and free) product like TrueCrypt, and not use built in encryption from some service. You don't know how good that services encryption is, or if they hold back door keys. I don't think that's necessary. Also, you could say the same thing about TrueCrypt because you didn't personally write their algorithm, did you? Also, using TrueCrypt would hinder the convenient process of syncing that an online services uses. If the online service uses 128-bit or 256-bit encryption BEFORE your data is sent to them over the Internet, then your data can't be decrypted by using another backdoor key besides the encryption key you created. If the service does not have the key, then the data cannot be decrypted and is garbage to anybody without the key. Of course, a hacker could guess your key via brute force, but you can make guessing basically impossible if you have a complicated key that's in your brain (or otherwise not on a computer anywhere).
_________________________
If you're reading this, it's too late.
|
Top
|
|
|
|
#231391 - 09/04/11 09:17 PM
Re: Organizing the Important Documents Binder
[Re: ireckon]
|
Pooh-Bah
Registered: 03/13/05
Posts: 2322
Loc: Colorado
|
If your service uses 128-bit or 256-bit encryption BEFORE your data is sent to them over the Internet, then your data can't be decrypted by using a backdoor key. And there's the catch. You may indeed be using your KEY, but you are using THEIR ALGORITHM. Good encryption requires both a strong key and a rock solid algorithm. And the algorithm should be open source so anybody and everybody can review it. A strong algorithm does NOT depend on secrecy for being strong. For all you know, the service providers algorithm may be nothing more than "take the first character of the users key and prepend that to their data stream". Of course that's a silly contrived example, but it illustrates my point. Also, if they use a proprietary algorithm, and then they go out of business, how are you going to unencrypt your own data (unless you stored a second copy elsewhere for your self)?
|
Top
|
|
|
|
|
1
|
2
|
3
|
4
|
5
|
6
|
7
|
8
|
9
|
10
|
11
|
12
|
13
|
14
|
15
|
16
|
17
|
18
|
19
|
20
|
21
|
22
|
23
|
24
|
25
|
26
|
27
|
28
|
29
|
30
|
31
|
|
|
|
|
|
0 registered (),
772
Guests and
0
Spiders online. |
Key:
Admin,
Global Mod,
Mod
|
|
|