OK someone breaking AES-256 encryption is not in my threat model. and i also can and do have a secure offline backup that can be restored anytime. it doesn't require chasing down stray bits. but its a difference in design philosophy and I respect your approach.