First page Back Continue Last page Summary Graphic
35. Create Trojan Keys
- Generate new private keys for users
- Plant Trojan horses in their system to have the new keys registered without their knowledge or consent.
- Then you will have a copy of their (your) private key. 
Notes: