Re: Compromised host tolerance?
I don't see how that could work, you need to access your password store, however many passwords you want out of it. Once you've typed that password into a compromised host you're toast, all your stored passwords are then available.
You can access KeePass on your phone and do a manual copy / paste onto the bad host. You're only risking one password then, I don't really see any other way.
Another question for the techies: SpiderOak's Android client (last time I looked) fails their zero knowledge bit because it doesn't do local [en|de]cryption. How does Encryptr manage this?