And what prevents the sys admin from installing a program that intercepts your private data the next time you get it out of the keychain?
Point is: If you can't trust root, don't use the system.
And what prevents the sys admin from installing a program that intercepts your private data the next time you get it out of the keychain?
Point is: If you can't trust root, don't use the system.