Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

I mean, most users don't root-install, but anyway the GUI application can drop a different age binary higher on the user's PATH. Or change their shell. Or a million other things.

There really isn't a point to defending against code running unsandboxed on a single-user machine.



I password protect my key for the sole threat model of me physically losing my device. I am aware that all other threat models that involve someone taking remote control of my device are not fully protected against, but it at least requires significantly more effort on their part versus just doing a scan for private keys on the file system.


Why not use disk encryption for this threat model?


> Why not use disk encryption for this threat model?

Most people don’t add a password to the disk encryption, meaning the keys can “easily” be extracted by MITM the contacts on the chip.


Fair enough. I believe I can mitigate enough of these to continue the utility of password-protecting my keys, but I take your point.




Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: