Um, I think you should understand what a public key is first.
Hint, public key does not mean you can get it at Walmart or ace hardware.
In cryptography, a public key is a large numerical value that is used to encrypt data. The key can be generated by a software program, but more often, it is provided by a trusted, designated authority and made available to everyone through a publicly accessible repository or directory. In other words, it isn't hidden and doesn't do anything by itself without the private key which is the actual lock.
To add to this, public and private has a domain specific meaning in cryptography that doesn't match the laymans terminology.
The server side should have private keys. The client side should have public keys. Now it'd raise some eyebrows for Hunter to have public keys (because there's no good reason for him to have them), but I can think of several plausible reasons that aren't very exciting. E.g. if he had access to a DoD associated email address because one of the companies he owned was conducting contracting work for the DoD such as Ukranian biolabs.
That's interesting and reeks of corruption, but hardly a massive security breach. If his laptop had private keys, I can think of very few good reasons for those to be present. They're generally only used for server-side encryption so them being present at all would be pretty much nonsensical unless he were stealing them as part of some type of blackhat operation he doesn't have the technical aptitude for.
All of you dumbshits seems to think public commercial services are the same as Department of Defense.
Holy fucking shit. You think telling me about how encryption work has anything to do with the ecosystem the Department of Defense uses!?
Bahahahahahahaha!
Bahahahahahahaha!
Oh no some random dipshit is laughing let's all abandon what we know so we aren't humiliated further.
Wow, you are so clueless you think you know what you are talking about. I will say this, I can't argue with your logic.
(post is archived)