WelcomeUser Guide
ToSPrivacyCanary
DonateBugsLicense

©2025 Poal.co

1.2K

(post is archived)

[–] 0 pt

Look here dumb shit, your comment: "Public-private keys is legit how the public-private key scheme works moron."

Doesn't make any fucking sense.

I will state very clearly. There are no Public keys for anything related to the DoD.

[–] 2 pts

I will state very clearly. You do not understand how encryption works.

[–] 1 pt

I'm really not certain if he's trolling, or doesn't grasp that basically everyone working for a three letter agency has public keys from NIPR on their laptop so they can autheticate to Teams, email, etc. Which is a world away from "Hunter has private keys from root CAs".

[–] 2 pts

Um, I think you should understand what a public key is first.

Hint, public key does not mean you can get it at Walmart or ace hardware.

In cryptography, a public key is a large numerical value that is used to encrypt data. The key can be generated by a software program, but more often, it is provided by a trusted, designated authority and made available to everyone through a publicly accessible repository or directory. In other words, it isn't hidden and doesn't do anything by itself without the private key which is the actual lock.

[–] 1 pt

To add to this, public and private has a domain specific meaning in cryptography that doesn't match the laymans terminology.

The server side should have private keys. The client side should have public keys. Now it'd raise some eyebrows for Hunter to have public keys (because there's no good reason for him to have them), but I can think of several plausible reasons that aren't very exciting. E.g. if he had access to a DoD associated email address because one of the companies he owned was conducting contracting work for the DoD such as Ukranian biolabs.

That's interesting and reeks of corruption, but hardly a massive security breach. If his laptop had private keys, I can think of very few good reasons for those to be present. They're generally only used for server-side encryption so them being present at all would be pretty much nonsensical unless he were stealing them as part of some type of blackhat operation he doesn't have the technical aptitude for.

[–] 0 pt (edited )

All of you dumbshits seems to think public commercial services are the same as Department of Defense.

Holy fucking shit. You think telling me about how encryption work has anything to do with the ecosystem the Department of Defense uses!?

Bahahahahahahaha!

[–] 0 pt

Bahahahahahahaha!

Oh no some random dipshit is laughing let's all abandon what we know so we aren't humiliated further.

[–] 0 pt

Wow, you are so clueless you think you know what you are talking about. I will say this, I can't argue with your logic.

[–] 2 pts

I will state very clearly. There are no Public keys for anything related to the DoD.

Then how do they connect to remote servers at the DoD dumb shit?

[–] 0 pt

Lol. Because there aren't any "remote DoD servers" faggot.

[–] 0 pt

Lol. Because there aren't any "remote DoD servers" faggot.

Lol, stay mad glowshill faggot.