• refalo@programming.dev
    link
    fedilink
    arrow-up
    3
    ·
    edit-2
    6 months ago

    You’re right, there isn’t one, my apologies; I edited the comment.

    You could use some kind of encrypted container on the desktop though, or maybe run it as a separate user that has an encrypted home folder. The problem is you need to define a threat model first. Depending on what you’re afraid of, any particular “solution” could either be way overkill, or never enough.