top | item 14979494 (no title) tomtoise | 8 years ago Ah. Thanks. So the idea is to stop the user before they get that far, I suppose.Doesn't this hark back to "If the attacker has local access, it's already game over"? discuss order hn newest annabellish|8 years ago Not really, the databases are designed to be effectively public information. The security comes from the encryption, not OS-level file permission controls! jezclaremurugan|8 years ago Has local access plus has a weak master password.
annabellish|8 years ago Not really, the databases are designed to be effectively public information. The security comes from the encryption, not OS-level file permission controls!
annabellish|8 years ago
jezclaremurugan|8 years ago