1257
you are viewing a single comment's thread
view the rest of the comments
[-] BCsven@lemmy.ca 2 points 16 hours ago

True dat. But if they compromise your computer the first thing the look for is key files.

Like my ssh keys are in a root permission file. Protected from general sight, but if somebody compromises my PC with a CVE on then goodbye keys.

At least with hardware key it is removable and requires a button press.

So accessing becomes physical access or quantum computer cracking

this post was submitted on 13 Mar 2026
1257 points (98.2% liked)

Programmer Humor

30365 readers
1063 users here now

Welcome to Programmer Humor!

This is a place where you can post jokes, memes, humor, etc. related to programming!

For sharing awful code theres also Programming Horror.

Rules

founded 2 years ago
MODERATORS