-----BEGIN PGP SIGNED MESSAGE-----
If they for some reason bother looking around for private data, and realize
you have encryption in place, it'll likely perk their interest enough to
just sit back and wait for you to give them what they need. All they need
to do is have their trojan lurk around waiting for you to pop in your
secret key and password. My point is, that if your system is broken, no
matter what you're doing to protect yourself, it's all going through your
now insecure computer so you're basically adding a lot of work for yourself
for fairly slim security benefits. That is, of course, only my opinion.
If I were a cracker I wouldn't bother sharing at all considering the
likelyhood of a firewall being present. Not to mention the insane bandwidth
consumption of Microsoft's protocol.
I don't see why this is a complicating factor. If the system's compromised
without the user's knowledge it won't matter how often the trojan "calls
home" as long as it does so in a way that circumvents any outgoing firewall
Why on earth would you feed a shared computer your secret key + passphrase?
That's just asking for a compromise.
Unless baddies are hiding in the next room ready to run in after you leave
the machine, "Auto unmount after X minutes of inactivity" set to 1 minute
should cover that base fairly good.
-----BEGIN PGP SIGNATURE-----
Version: PGP 8.0.2
-----END PGP SIGNATURE-----