top | item 21367171 (no title) sha666sum | 6 years ago It runs locally, and if the attacker has that much access, in most scenarios there isn't anything stopping your adversary from just logging your keystrokes and curling the keystore to a remote server. discuss order hn newest No comments yet.
No comments yet.