• refalo@programming.dev
      link
      fedilink
      arrow-up
      4
      ·
      edit-2
      7 days ago

      You’re right, there isn’t one, my apologies; I edited the comment.

      You could use some kind of encrypted container on the desktop though, or maybe run it as a separate user that has an encrypted home folder. The problem is you need to define a threat model first. Depending on what you’re afraid of, any particular “solution” could either be way overkill, or never enough.