@monpop @bagder Is control of the command line in the threat model? I would be surprised if it is, I guess. Then the attacker has your machine already.