top | item 21367171

(no title)

sha666sum | 6 years ago

It runs locally, and if the attacker has that much access, in most scenarios there isn't anything stopping your adversary from just logging your keystrokes and curling the keystore to a remote server.

discuss

order

No comments yet.