Not their passwords, tho. I am not trying to be difficult here, just trying to understand the reasoning behind leaving the passwords stored in plain text.
If someone can read the files in .ssh, chances are they can also add an alias to the ssh command that steals your passphrase. As for the "stolen laptop" scenario, whole disk encryption is preferable.
jamesponddotco|6 years ago
rkudiyarov|6 years ago
__david__|6 years ago
What? Mine aren't, nor have they ever been…
If you are storing ssh private keys on disk without a password you are doing something wrong.
icebraining|6 years ago