That's concerning. So, logically there's also no way to prove that a particular encryption key wasn't actually the one used, despite it "working". I suppose the fact that the rest of the data would still be garbage might but...
That's concerning. So, logically there's also no way to prove that a particular encryption key wasn't actually the one used, despite it "working". I suppose the fact that the rest of the data would still be garbage might but...