On 27/08/2019 22:41, Peter Lebbing wrote: > If a computer is compromised, this is game over for cryptography. Full > stop. This is not true. Many crypto systems are designed to perform damage control and recovery in such cases. If the compromise is game over for the user - it depends on threat profile. Cheers, Chris Narkiewicz