I think this points to slightly wrong-headed thinking. If you're relying on the complicity of a compromised machine to protect the contents of your USB key, you've likely already lost. Since you're write protecting your key in software - software running in a dirty environment - you can't trust that there will…