logoalt Hacker News

1718627440today at 12:06 AM0 repliesview on HN

The security boundary on the OS is the user of the process. If you run the malware under the same user as the key, than yes of course it has access. But in production you don't run software under the same user, and on the developer machine you wouldn't put the production key in the user keychain.