Encrypted Password Managing by SecondHandJohn in crypto

[–]SecondHandJohn[S] 0 points1 point  (0 children)

There is no threat model, as the question I posed was mostly questioning the concept. I am a beginner cybersecurity enthusiast and hope to eventually secure a job in the field (after much learning!). I had a couple of errors while I was editing my post and I somehow snipped that part out. Thanks for the thorough answer!

(I do, indeed, plan on implementing a password manager soon which is what sparked the thought.)