First page Back Continue Last page Summary Graphic
35. Create Trojan Keys
Generate new private keys for users
Plant Trojan horses in their system to have the new keys registered without their knowledge or consent.
Then you will have a copy of their (your) private key.
Notes: