So, if the attacker has both the encrypted and unencrypted versions, can they work out the private key? I assume not, since, thinking about it, that would make encryption about as useful as Theresa May.
Not a member of The Register?
Create a new account
Remember me on this computer?
The Register - Independent news and views for the tech community. Part of Situation Publishing
Join our daily or weekly newsletters, subscribe to a specific section or set News alerts
Biting the hand that feeds IT © 1998–2019