how about if i have a hardware wallet connected to that pc, and have mining run on a underprivileged user. Or just remove any wallets from that pc and run them somewhere else like on my phone
thanks
Not the phone, that opens up another can of worms.
Removing the HW wallet while not using it is always a good idea.
User priviledge seperation is good. Network firewall seperation is better, Physical seperation is best.
It comes down to your risk tolerance and your instincts. Do you have good malware radar? Have you done
any research about the software you intend to use?
As long as you undertsand the risks and take measures to mitigate them you should be ok. But false confidence
can be dangerous.