In split-gpg, can the client qube maliciously access other gpg keys present in the backend?

Understood.

  1. Is this also the same for split-ssh setups? That is, the user should segregate his ssh keys in categories as he sees fit, as in, work-ssh, anon-ssh, community-ssh, each holding ssh keys that constitute a specific scope of his online activities (that is, the anonymous online activity specific ssh keys are on anon-ssh, and the activities that are tied to his real world identity are on work-ssh, etc.)
  2. Can you also take a look at this question of mine on this topic: Split SSH - #8 by tanky0u