For example, it won't protect against stealing the .ssh folder and installing a keylogger at your computer.
For example, it won't protect against stealing the .ssh folder and installing a keylogger at your computer.