Disk encryption is useful when the disk is stolen. Not when a vulnerability in a running program is exploited.
If you use a program with a vulnerability that is exploited, then the
attacker may be able to read your files in your home folder (no need for root
permissions) including your private GPG key. With that key, the attacker can
then usurp your identity (e.g., sign emails) and decrypt encrypted messages
that were addressed to you.
- [Trisquel-users] anyone heard of nitrokey? calmstorm
- Re: [Trisquel-users] anyone heard of nitrokey? calmstorm
- Re: [Trisquel-users] anyone heard of nitrokey? moxalt
- Re: [Trisquel-users] anyone heard of nitrokey? calmstorm
- [Trisquel-users] Re : anyone heard of nitrokey... lcerf
- Re: [Trisquel-users] anyone heard of nitrokey? calmstorm
- Re: [Trisquel-users] anyone heard of nitrokey? greatgnu
- Re: [Trisquel-users] anyone heard of nitrokey? blade . vp2020
- Re: [Trisquel-users] anyone heard of nitro... greatgnu
- Re: [Trisquel-users] anyone heard of ... calmstorm
- Re: [Trisquel-users] anyone heard of ... blade . vp2020
- Re: [Trisquel-users] anyone heard... greatgnu