I’ve been using Beancount for 4+ years now, managing my personal finances and rental properties. But something happened last month that made me rethink my entire security setup.
A friend who runs a small bookkeeping practice got hit with a ransomware attack. Not because of poor security on her end—her client’s laptop got compromised, and the attacker used her saved cloud accounting credentials to lock her out of 12 client accounts. The kicker? The cloud provider’s support took 72 hours to respond because it was a weekend.
This got me thinking about the security paradox we’re all living with in 2026:
Clients expect to access their financial data from anywhere, anytime… but also want “bank-level security.”
How do we actually deliver both?
The 2026 Remote Access Reality
Here’s what I’m seeing among friends who do bookkeeping professionally and from my own experience managing family finances:
What people expect:
- Upload receipts from phones at 11 PM
- Check account balances from vacation
- Approve expenses from airport WiFi
- Share access with business partners across multiple locations
What they also worry about:
- Data breaches and ransomware
- Competitors or hackers getting access
- Compliance with regulations they barely understand
- “Is my data safe if you work from a coffee shop?”
The same person who demands instant access from their iPhone will panic when you mention working remotely.
My Journey: From Convenient to Paranoid (And Back)
When I started with Beancount in 2021, I kept everything simple:
- Beancount files in Dropbox
- Worked from wherever
- Shared access via Dropbox links
- “Good enough” security
Then I read about the 2024 cloud accounting breaches. Then I learned about deepfake wire transfer scams. Then my friend’s ransomware incident.
So I went to the other extreme:
- Air-gapped computer only for financial work
- No cloud storage at all
- Manual USB backups only
- Refused to check anything from my phone
This lasted exactly 6 weeks.
Why? Because I was traveling and needed to check if a rent payment cleared before approving a contractor invoice. My paranoid setup made it literally impossible to help my tenant remotely.
The Middle Path: Practical Security for Real Life
After some soul-searching (and research), here’s what I landed on. I’m sharing because I want critique from this community—what am I missing?
1. Encrypted Everything (Non-Negotiable)
- FileVault on my Mac, VeraCrypt on my Windows desktop
- Beancount files in encrypted containers with unique passwords (not the same as my login)
- If someone steals my laptop, they get expensive hardware—not my financial data
The beauty of plain text accounting: I can verify the files are actually encrypted. With cloud accounting, I just trust the vendor’s marketing claims.
2. Git for Version Control + Audit Trail
- Private GitHub repo with SSH key authentication (not password)
- Every change is logged: who, when, what
- Can roll back to any point in history
- Full transparency—if someone compromises my account, I’ll see it in the commit log
This is where Beancount shines vs. cloud platforms. My audit trail is cryptographically signed Git commits, not “trust the vendor’s black box.”
3. VPN for Public Networks (With Exceptions)
Here’s where I’d love feedback. I use VPN when:
- Working from coffee shops, airports, hotels
- Accessing anything over public WiFi
- Uploading/downloading from GitHub
But I DON’T use VPN when:
- Working from my home network (already behind router firewall)
- Just reading Beancount files locally (they’re already encrypted)
Question: Is this reasonable, or am I creating a false sense of security?
4. Password Manager + 2FA Everywhere
- 1Password for all credentials (yes, I pay for it)
- 2FA on email, GitHub, anything that touches financial data
- Unique 20+ character passwords for everything
I know this is security 101, but I’ve seen smart people reuse passwords because “it’s just my personal accounting, not banking.”
Your Beancount files ARE your banking. Protect them accordingly.
5. The Backup Trinity
- Local encrypted backup (Time Machine to encrypted drive)
- Cloud encrypted backup (Backblaze with private encryption key)
- Git history (GitHub private repo)
If my house burns down, I can restore from cloud. If GitHub disappears, I have local backups. If my laptop dies, I have both.
Overkill? Maybe. But I sleep better.
The Beancount Security Advantage (And Honest Trade-offs)
After talking with my bookkeeper friend who got ransomwared, I realized why I feel more secure with Beancount than I would with cloud accounting:
Advantages:
- I control the encryption keys (not a third party)
- I can verify security (plain text = I can inspect everything)
- No vendor to get breached (2024 was brutal for cloud accounting platforms)
- Air-gappable if needed (can work fully offline, sync later)
- Audit trail I trust (Git commits vs. vendor logs)
Honest trade-offs:
- I’m responsible for patches (no 24/7 security team watching my back)
- I’m responsible for backups (cloud platforms auto-backup)
- Clients find it weird (“Wait, it’s just a text file?!”)
- No fancy mobile apps (Fava works on mobile, but it’s not native)
- Requires technical literacy (not everyone can Git + command line)
So here’s my question for the community: Is self-hosted Beancount + encryption actually more secure, or does it just feel more secure because I control it?
Cloud providers have dedicated security teams, automated patch management, and SOC 2 compliance. I’m one person trying to remember to update my software.
Maybe convenience + professional security teams beats DIY paranoia?
What I Still Haven’t Solved
Despite 4 years with Beancount, I still struggle with:
1. Mobile access
- I want to check balances from my phone
- But I don’t want my full financial data on a device I might lose
- Fava web interface works, but requires server setup
- Commercial apps are convenient but defeat the point of self-hosting
What’s your mobile strategy?
2. Sharing with family members
- My spouse needs access, but different security tolerance
- How do you grant access without compromising your security model?
- Shared password manager vault? Separate encrypted containers?
3. Client education (for bookkeepers)
- My bookkeeper friends struggle explaining Beancount security to clients
- Clients hear “text file” and assume it’s insecure
- How do you communicate that plain text + encryption is secure?
4. Compliance questions
- Some businesses ask about GDPR, SOC 2, etc.
- Do these even apply to self-hosted bookkeeping?
- How do solo practitioners handle compliance?
The Real Question: Security vs. Usability
Every security measure adds friction:
- VPN slows down connections
- Encrypted containers require extra unlock steps
- 2FA adds 30 seconds to every login
- Air-gapping makes remote access impossible
At some point, security becomes so inconvenient that people bypass it. My 6-week air-gap experiment proved that.
Where’s the line between prudent security and paranoid unusability?
I don’t need NSA-level security. I need to protect my financial data while still being able to check if my tenant paid rent when I’m visiting my parents 500 miles away.
What I Want From This Community
I’m not here to preach—I’m here to learn. What’s your security setup?
- VPN always? Sometimes? Never?
- Self-hosted or cloud backups?
- How do you handle mobile access?
- Am I paranoid, or not paranoid enough?
- What failed spectacularly for you?
Let’s have an honest conversation about real-world security in 2026. Not best practices from vendor marketing—actual practices from actual people managing actual financial data.
I’ll share what didn’t work for me (looking at you, air-gap phase) if you share yours.
Update: After my friend’s ransomware incident, she switched to Beancount specifically because Git version control meant she could recover even if someone encrypted her files. The attacker got her laptop, but her Git repo on GitHub was untouched. She lost 6 hours of work, not 6 months of data.
That incident convinced me: plain text + Git + encryption isn’t security theater. It’s a fundamentally different (and arguably more robust) security model than trusting cloud vendors.
But I could be wrong. Convince me otherwise.