The issue devolves to be that the device has On 2025-07-15 06:21, Stephen M. Webb via linux wrote:
to be in your exclusive possession.
That is a good reason that email (to same computer as one is working on) is weak as security, in the same way that a stolen phone is weak. In such cases we're down to the password alone as obstacle. In the case of thefts like "apple picking" where thief gets unlocked device, one less barrier. JN To unsubscribe send a blank message to linux+unsubscribe [ at ] linux-ottawa [ dot ] org To get help send a blank message to linux+help [ at ] linux-ottawa [ dot ] org To visit the archives: https://lists.linux-ottawa.org