• @br3ad
    cake
    link
    English
    111 months ago

    Fantastic writeup. I wonder, how does a threat actor get access to a signing key like this? There was no mention of how the key got leaked in the first place.