can these encryption methods for a text file protect against physical access to machine by adversary?

My threat model is that, the adversary has physical access to the machine and root access.
I don’t care about any data on the system other than a couple python scripts that contain sensitive information.
I will be protecting these text fil… Continue reading can these encryption methods for a text file protect against physical access to machine by adversary?

Is it normal, that some companies just sign the txt file which contains the sha value of the program?

Scenario A: Suppose I have an .exe file, the provider offers a sha1 txt file with hash value and this txt file is gpg signed. So I check if the hash value matches the exe file and then download the key either from the keyserver or directly… Continue reading Is it normal, that some companies just sign the txt file which contains the sha value of the program?