• Herowyn@jlai.lu
    link
    fedilink
    English
    arrow-up
    6
    ·
    1 year ago

    It doesn’t need to be physical breach. If it’s stored somewhere it can (and might) be accessed by someone else and reconstructed.

    • MostlyHarmless@sh.itjust.works
      link
      fedilink
      English
      arrow-up
      4
      arrow-down
      1
      ·
      1 year ago

      And still useless unless they also steal your phone. You are still safe from the hackers on the other side of the planet