No matter whether the HW4 is based on an x86 or ARM CPU, Linux has the strace that can be used by any admins or attackers to easily capture the password entered by victim to security software, such as ssh, gpg, you name it.
I always said that if info can be secure, you must use the software that can give you true zero-trusted command execution environment, true zero-trusted privilege delegation software. Without the help from the right software, all security software is very vulnerable to system tools' attacks, info can hardly be secure.
If you want to solve this problem, let me know.