When comparing RoboForm vs GPG encrypted text file, the Slant community recommends RoboForm for most people. In the question“What are the best offline password managers?” RoboForm is ranked 13th while GPG encrypted text file is ranked 15th. The most important reason people chose RoboForm is:
RoboForm's toolbar allows accessing all logins and associated websites. Clicking a website will navigate the browser to the appropriate place and peform the login sequence. It even takes care of multiple identities allowing multiple people to quickly switch between, for example, webmail accounts.
Specs
Ranked in these QuestionsQuestion Ranking
Pros
Pro RoboForm's toolbar can be used as a bookmark's bar that automatically logs in
RoboForm's toolbar allows accessing all logins and associated websites. Clicking a website will navigate the browser to the appropriate place and peform the login sequence. It even takes care of multiple identities allowing multiple people to quickly switch between, for example, webmail accounts.
Pro Portable versions available
Pro Sophisticated form fill
In addition to being capable of filling in usernames and passwords even in places other popular password managers tend to fail, RoboForm can also fill in a wide variety of other form fields such as long registration or checkout forms that require personal, credit card, banking and other information.
To enable form fill functionality an identity has to be created and all relevant information supplied. It's possible to use multiple identities and identities created from login credential entries. In case of multiple identities a drop-down will offer choice in which to use.
Pro Adding new passwords and updating existing one's requires little manual work
When logging in a website for the first time, RoboForm will offer to save the login credentials via a pop-up. The pop-up allows creating a new entry or replacing an existing one with the information supplied. And if a password has been changed without updating the entry in RoboForm, the application will offer to update the password next time it's used.
Pro Virtual keyboard support for added security
If worried about keyloggers, you can use a virtual keyboard to log in.
Pro Fingerprint verification
Some fingerprint readers can be set up to be used to access RoboForm instead of a master password.
Pro Strong Password Generator
Choose the length and characters you want to use and get a great random password that is one click copy and then saved in Roboform. Quick and effective.
Pro Safenotes allow saving free-form data
Pro Free tier
Roboform for desktop permits the user one license to install one system for free. Paid version, Roboform Everywhere, offers syncronization across multiple platforms for a yearly subscription fee.
Pro Can be easily integrated with other command-line tools
For example, I can run GITHUB_TOKEN=$(gpg -d GITHUB_TOKEN.gpg) some_tool
Pro Outstanding compatibility
GPG is standard on most operating systems, and is compatible with "too many to list". A GPG API is currently being developed for further integration.
Pro Free to use and modify
GPG does not use patented algorithms, so this service is free to use and modify without restrictions.
Pro Can be used with any system that understands text files
Text files are ubiquitous. They can be read across any modern platform and many obsolete one's.
Pro No dependencies
GnuPG does not depend on a reading program in order to be functional.
Pro Offers an installation package for Windows and OS X
"Gpg4win" is the installation package for Windows, and "GPGTools" is the package for Mac. The purpose of these packages is to equip users with everything needed in order to effectively keep information private.
Pro Uses symmetric key encryption to ensure that emails are secure
Symmetric key encryption not only protects emails from unauthorized access, but it ensures that the sender and receiver are legitimate.
Cons
Con WEAK hashing algorithm (4096 instead of 10,000 iterations)
Weak Hashing algorithm. Roboform only uses 4096 iterations of PBKDF2 with SHA-256, while other password managers use 100,000 iterations. NIST Guidelines require AT LEAST 10,000 iterations of PBKDF2 with SHA-256.
Con Does not help with updating weak and old passwords
You will have to step through the entries yourself.
Con Requires knowledge of the command line
GnuPG requires technical knowledge, but their FAQ is incredibly helpful for people who want to get started.