Which is still easily stolen. If the attacker has remote access to the machine via a trojan he can still steal coins in a variety of ways.
1) simply use wallet to transfer them out to an address he owns.
2) grab decrypted keys from memory.
3) decompile the client to determine what hardware specific strings are used to generate the decryption key and decrypt the wallet file.
Tip for next time. You might get more interest without stupid claims like "impossible to steal".
But wouldnt be able to access the wallet file at all due to the file protection, not to mention as soon as it trys to access the wallet or any of the files, It would get blocked. That is as long as the application service is running.
It would be much more work than what is currently required to copy the file, and log the passphrase.
Not impossible to steal i guess, but impossible to steal the funds from it
Soooooo..... how does it work? if there is no passphrase, how do you spend the coins? how does it prevent the attacks you describe?
Your claims imply a grand innovation in computer security!