Happy valentine’s u too !!
Brute force. He's not using any information to mathematically derive information about the key, just trying all possibilities. With modern key sizes this is typically not a successful approach.
Answer:
No
Explanation:
I do not because it's working with skilled security researchers from all over the world is the key to identifying