My post was not clear (possible confusion between "Nitrokey" and "GPG private key"):

If you use a program with a vulnerability that is exploited, then the attacker may be able to read your files in your home folder (no need for root permissions) including your private GPG key. With that *private GPG* key, the attacker can then usurp your identity (e.g., sign emails) and decrypt encrypted messages that were addressed to you.

Reply via email to