• ShaunaTheDead@kbin.social
    link
    fedilink
    arrow-up
    4
    ·
    11 months ago

    Do you think using a custom ssh key directory would prevent these malicious apps from working correctly or is there some environment variable that always points to the ssh key folder or I guess they could just run a search on the system for any files like *.pub. Are there any safety procedures that one can take to circumvent these kinds of attacks?