20Ağu
What prevents applications from misusing private keys?
For example PGP keys imported to a program like Thunderbird. Is there any reason why Thunderbird, due to a rogue programmer or just a bug in the code, can't send your private key off to a malicious actor or make copies of it once imported?
Perhaps I am misunderstanding how such programs work?