kieyah
contestada

Other attacks include the use of viruses and Trojan horses. Eve might design a virus that infects PGP software and sits quietly inside Alice's computer. When Alice uses her private key to decrypt a message, the virus would wake up and make a note of it. The next time that Alice connects to the Internet, the virus would surreptitiously send the private key to Eve, thereby allowing her to decipher all subsequent messages sent to Alice. One way to better connect with this excerpt is to tell about an experience with a computer virus. define the specific details of a PGP virus. research decryption viruses on the Internet. contrast viruses with Trojan horse attacks.

Respuesta :

The first alternative is correct (A).

The text talks about virus infection on a person's computer, which can be monitored from there.

That is, the passage has a specific subject whose exchange of experiences can contribute to a better understanding of the problem. In this context, the interlocutor can, for example, tell a particular experience in which he or she had to deal with a virus in his computer, giving details of what happened and how it was solved.

Answer: The answer is B. ( on edg 2020)  People can invade your Internet privacy even if you code your information.

Explanation: im on edg 2020 right now lol