They'd have to know they were compromised first. I think that is a big 'if', and creation of a centralized repository of backdoor keys makes for tempting targets.
They'd have to know they were compromised first. I think that is a big 'if', and creation of a centralized repository of backdoor keys makes for tempting targets.