
If a threat actor then comes along and compromises that machine, then they can of course use dump whatever is in their user profile. And all of a sudden, they are inside that um yeah, that same context that that uh key program is. And on Linux it would be yeah, on your dot config or whatever, right? Um these are all like sometimes they're encrypted, sometimes they're plain text, and so on, but what what's sort of a good rule of thumb is that do you need to enter a password every single time you're using this? No. So, then they're probably a reversible encryption. Right? So, the easiest way, like you can probably dump this in a really fancy
cool way, but the easiest way is probably just copy everything that is in that config folder, paste it on your own machine, and then all of a sudden it just works.