When it comes to full disk encryption does /g/ use a triple cascade? AES --- > Twofish ---> Serpent seems to be the most common triple encryption method (supported in veracrypt, for example) but are there actually any non-neckbearded, real-world contexts in which this kind of overkill setup is even appropriate?
>inb4 go to stupid questions thread
this is fairly advanced if i do say so myself senpai
>>57260594
there's no reason to do this
>>57260639
THEN WHY DO PEOPLE DO IT
>>57260644
because they can / autism
>>57260741
so there's really no real world practical contexts for this is there
>>57260751
now you listen to me, eric
bother with one strong encryption method instead of 3 weak ones you don't know what the hell you're doing with.
are you listening to me? look at me when i'm talking to you.
>>57260594
The hope is that even if exploits are found for one of the cypher modes that the remaining two or one other modes would still protect your data.
Plus it makes bruteforcing longing and harder to judge if they are making success.