• refalo@programming.dev
        link
        fedilink
        arrow-up
        4
        ·
        edit-2
        6 months ago

        You’re right, there isn’t one, my apologies; I edited the comment.

        You could use some kind of encrypted container on the desktop though, or maybe run it as a separate user that has an encrypted home folder. The problem is you need to define a threat model first. Depending on what you’re afraid of, any particular “solution” could either be way overkill, or never enough.