This strategy deftly sidesteps three potential problems:
* Oh great, I forgot to sync my password list on my MacBook before I left the house with only my iPhone
* Oh great, my MacBook got stolen and my backups are all corrupted
* Oh great, my MacBook got stolen and I don't know the password to my backup service that has all my passwords because the password was stored on the machine that just got stolen
Yes, all solvable problems. But, essentially, if you can commit this algorithm to memory, you can always retrieve your passwords, no matter what hardware, backups, or 3rd-party systems go missing.
* Oh great, I forgot to sync my password list on my MacBook before I left the house with only my iPhone
* Oh great, my MacBook got stolen and my backups are all corrupted
* Oh great, my MacBook got stolen and I don't know the password to my backup service that has all my passwords because the password was stored on the machine that just got stolen
Yes, all solvable problems. But, essentially, if you can commit this algorithm to memory, you can always retrieve your passwords, no matter what hardware, backups, or 3rd-party systems go missing.