5) Back up the encrypted cypher-text file across multiple computers, laptops tablets, smart-phones etc. Include all computers and devices you regularly use. If malware is a concern for example a Microsoft Windows computer, do not decrypt the file on that computer or transfer the file back to a computer where the coins can be spent except as a last resort where all other backups have failed. Also include old and vintage computers if you have them, these are an excellent for this purpose. How many current bitcoin stealing malware applications run on a 286 processor or on an old Windows 3.1 computer?
The idea is to be able to access your BTC in all sorts of scenarios ranging from a simple hard disk failure to having to flee your home, city and even country with nothing but the shirt on your back.
*** Very Important ***
Last but not least ensure that your loved ones / and or executors of your estate can access your BTC after your demise in all sorts of scenarios ranging from a simple hard disk failure to having to flee their homes, cities and even countries with nothing but their shirts on their backs.
That was helpful, thanks. I use Truecrypt, but I don't like it--too complicated--things like 'mount' and 'dismount' are sort of alien, I wouldn't be able to teach my family that very easily. That it's open source is good though.
Plus, I'm paranoid that I'm somehow screwing up whenever I overwrite the old wallet!