logoalt Hacker News

masfuerteyesterday at 2:06 PM2 repliesview on HN

Then what stops the malware accessing the keyring?


Replies

1718627440today at 12:06 AM

The security boundary on the OS is the user of the process. If you run the malware under the same user as the key, than yes of course it has access. But in production you don't run software under the same user, and on the developer machine you wouldn't put the production key in the user keychain.

mxeyyesterday at 6:52 PM

On disk, it’s encrypted. The running service, at least on macOS, only hands the item out to specific apps, based on their code signing identity.

show 1 reply