• Gt5@lemmy.zip
    link
    fedilink
    arrow-up
    0
    ·
    1 day ago

    Yes, buts it’s not something that can be easily guessed or found on a post it on the monitor

    • BCsven@lemmy.ca
      link
      fedilink
      arrow-up
      0
      ·
      1 day ago

      True dat. But if they compromise your computer the first thing the look for is key files.

      Like my ssh keys are in a root permission file. Protected from general sight, but if somebody compromises my PC with a CVE on then goodbye keys.

      At least with hardware key it is removable and requires a button press.

      So accessing becomes physical access or quantum computer cracking