You must log in or register to comment.
I wonder why they used an assymetric algo.
Maybe for performance so as to decrease the chances of detection
Edit: sorry disregard my comment, I read that as “symmetric”. In the case of asymmetric they can only deploy one part of the key which if intercepted cannot be used to decrypt.
Yeah that makes sense, I figured they’d just spin up a symmetric key, use it, send it home and delete it locally.
Can someone elaborate? I’m not as informed…
Check my comment to flyswat.