• Herowyn@jlai.lu
      link
      fedilink
      English
      arrow-up
      1
      ·
      1 year ago

      It doesn’t need to be physical breach. If it’s stored somewhere it can (and might) be accessed by someone else and reconstructed.

      • MostlyHarmless@sh.itjust.works
        link
        fedilink
        English
        arrow-up
        0
        arrow-down
        1
        ·
        1 year ago

        And still useless unless they also steal your phone. You are still safe from the hackers on the other side of the planet