this post was submitted on 13 Mar 2026
1303 points (98.2% liked)

Programmer Humor

30409 readers
2681 users here now

Welcome to Programmer Humor!

This is a place where you can post jokes, memes, humor, etc. related to programming!

For sharing awful code theres also Programming Horror.

Rules

founded 2 years ago
MODERATORS
 
you are viewing a single comment's thread
view the rest of the comments
[–] BCsven@lemmy.ca 2 points 2 days ago

True dat. But if they compromise your computer the first thing the look for is key files.

Like my ssh keys are in a root permission file. Protected from general sight, but if somebody compromises my PC with a CVE on then goodbye keys.

At least with hardware key it is removable and requires a button press.

So accessing becomes physical access or quantum computer cracking