Ask Question
20 October, 11:00

Other attacks include the use of viruses and Trojan horses. Eve might design a virus that infects PGP software and sits quietly inside Alice's computer. When Alice uses her private key to decrypt a message, the virus would wake up and make a note of it. The next time that Alice connects to the Internet, the virus would surreptitiously send the private key to Eve, thereby allowing her to decipher all subsequent messages sent to Alice. One way to better connect with this excerpt is to tell about an experience with a computer virus. define the specific details of a PGP virus. research decryption viruses on the Internet. contrast viruses with Trojan horse attacks.

+2
Answers (1)
  1. 20 October, 12:34
    0
    "tell about an experience with a computer virus." is the correct answer i just took the quiz
Know the Answer?
Not Sure About the Answer?
Find an answer to your question ✅ “Other attacks include the use of viruses and Trojan horses. Eve might design a virus that infects PGP software and sits quietly inside ...” in 📘 English if you're in doubt about the correctness of the answers or there's no answer, then try to use the smart search and find answers to the similar questions.
Search for Other Answers