▲ | SXX 3 days ago | |||||||
AFAIK "secretive" SSH agent is not actually running inside SEP when it using the keys. So when keys are actively used they are exposed in main OS RAM and only protected by macOS security model (so are safe unless there is jailbreak / actual root exploit). So "secretive" and similar software is not as secure as let's say hardware token. If I'm wrong please correct me, but when I researched the topic I come to this conclusion. | ||||||||
▲ | cyberax 2 days ago | parent [-] | |||||||
Ah, I see that Secretive is a victim of feature creep. I think it still can use the SE to store the private key, but it also has more ways to do it. This is the initial inspiration for Secretive: https://github.com/sekey/sekey - it uses the SE to generate and store the actual private key, so it never leaves the machine. Hence its limitations. | ||||||||
|