Question regarding risk of confirming malicious transactions

If someone signs or confirms malicious transactions (for example from a malicious “bridge”), while using a password protected Trezor T, will there theoretically be a possibility that funds can be drained by the hacker?

Important question: will the hacker be able to view or get access or drain all the other password protected accounts in Trezor T if indeed just one password protected account was hacked through signing a malicious transaction?

2 posts were merged into an existing topic: Using Trezor on infected computer