To add to this, public and private has a domain specific meaning in cryptography that doesn't match the laymans terminology.
The server side should have private keys. The client side should have public keys. Now it'd raise some eyebrows for Hunter to have public keys (because there's no good reason for him to have them), but I can think of several plausible reasons that aren't very exciting. E.g. if he had access to a DoD associated email address because one of the companies he owned was conducting contracting work for the DoD such as Ukranian biolabs.
That's interesting and reeks of corruption, but hardly a massive security breach. If his laptop had private keys, I can think of very few good reasons for those to be present. They're generally only used for server-side encryption so them being present at all would be pretty much nonsensical unless he were stealing them as part of some type of blackhat operation he doesn't have the technical aptitude for.
(post is archived)