I heard people recently talking about using _multiple_ OTP's. Not sure how that helps anything but it sounds nice and paranoid.
That's probably describing "multiple encryption", cascade, or composition. https://en.wikipedia.org/wiki/Multiple_encryption In the case of properly used OTP's with TRNG's, multiple doesn't help anything since the info theoretic security of that system has been proven. But for all other classes of algos such as the common asym/symm/hash, multiple can be used as a safety backup in case a sole use algo might be broken, but is no good if they all are fail... ie: md5 + sha1 != good or if use of all N of them was poor, thus = fail too. PS: Now for the more interesting thing in this note... Notice how GoldBug et al happened to sneak themselves onto that page too. Someone really needs to start a formal project to publicly investigate and debunk or clear their software claims and fishy methods once and for all, for any user's sake since they can get hurt. https://en.wikipedia.org/wiki/Special:Contributions/Fuchshuber https://en.wikipedia.org/w/index.php?fulltext=1&search=goldbug+messenger Is GoldBug yet another example like the bugged "Swiss encryption devices", an exploit that should not be trusted? Journalists, activists, human rights work, etc would probably want to know.