• br3ad
    link
    fedilink
    English
    arrow-up
    1
    ·
    11 months ago

    Fantastic writeup. I wonder, how does a threat actor get access to a signing key like this? There was no mention of how the key got leaked in the first place.